1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zlopas [31]
3 years ago
8

What type of firewall blocks packets based on IP address or port?

Computers and Technology
1 answer:
Fynjy0 [20]3 years ago
6 0

Answer:

Packet Filter Firewall

Explanation:

  • Packet Filtering Firewall is responsible for filtering the packets based on the IP addresses (source and destination), source and destination port numbers and also the source and destination protocols.
  • These firewalls operate at the junctions such as switches and routers.
  • Packets that don't meet required criteria are dropped and they cannot further forwarded.
  • It is not fully secured and can be used by the malicious attackers.
  • So, option (c) is Correct.
  • Option (a), Application Layer Firewall is a firewall at the application level not at the packets level.So, option (a) is not the correct option.
  • Option (b), Stateful firewall is different and it is not the correct answer.
  • Similarly, option (d) is not the correct answer.
You might be interested in
The part of the computer that provides access to the Internet is the
andrew11 [14]

Answer:

MODEM

Explanation:

5 0
3 years ago
Interviews should never feel like an_________Instead, they should feel like a________
Rainbow [258]

Answer:

blank 1: interrogation

blank 2: getting to know

Explanation:

4 0
3 years ago
which of the following present the most significant obstacle to developing IT security if we consider commerce and marketing?
Dmitry_Shevchenko [17]

Answer:

There is no direct return on investment in building security systems.

Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.

There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.

Explanation:

Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers.  New programs and customized demand of IT systems need customized IT security systems.

4 0
3 years ago
How does design influence the product's function?
r-ruslan [8.4K]
I think the answer is
8 0
3 years ago
The list below show test scores for 3rd period on a recent test.
Serhud [2]

Answer:

dshfjkahsdfkjhasdkjfasd

Explanation:

this is what u get for doing this to others foool

6 0
3 years ago
Other questions:
  • An attribute whose value uniquely identifies an object is called a(n) _______.​
    15·1 answer
  • By Definition, a Small Business?
    9·1 answer
  • 2. Use inheritance to create a hierarchy of Exception classes -- EndOfSentenceException, PunctuationException, and CommaExceptio
    6·1 answer
  • When using correct ergonomic technique be sure to
    6·2 answers
  • What do developers do to support software products?
    5·2 answers
  • Using the Impress program, you can add multimedia files, including audio, image, and video files, to the presentation
    13·2 answers
  • Which of the following is an advantage of text HTML editors over plain text editors?
    5·2 answers
  • Data type can only be true or false <br><br> Answer: Bool
    15·1 answer
  • What does ATM mean on lego mario mean I know that this is not school related but I trying to help my brother ​
    5·1 answer
  • Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!