1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gwar [14]
3 years ago
5

At _________ the ip header is exposed and so filtering or firewalls can be applied to ip addresses. select one:

Computers and Technology
1 answer:
zvonat [6]3 years ago
7 0
T<span>he IP packet header is what tells an IP-based host what to do with the packet that was received. 
</span>The TCP/IP<span> model describes the </span>protocols used by the Internet. The third layer is the Network layer and in the case of the Internet (the Internet Protocol IP). <span>The </span>Internet layer<span> is responsible for addressing, packaging, and routing functions.</span>
At layer 3 the IP header is exposed and so filtering or firewalls can be applied to IP addresses. 
You might be interested in
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
yaroslaw [1]

Answer:

Phishing

Explanation:

Phishing is a type of cyber attack in which the attacker masquerades as a trusted entity via e-mail and trick the recipient into clicking a malicious link that could steal user data including login details, credit card information e.t.c A phishing attack can have devastating effects such as Identity theft, Unauthorised purchase or stealing of funds on individuals.

The common types of phishing are<em>: Vishing, Smishing, Email Phishing, Search Engine Vishing, Whaling</em> e.t.c

3 0
3 years ago
Read 2 more answers
DHCP and FTP servers listen for and send network traffic on:
julsineya [31]

Answer: Well known ports

Explanation:

DHCP server transmit the response to the dynamic host configuration server protocol (DHCP) clients. DHCP default port is 67 and its port number is greater than the user data-gram specific port.

FTP server has its default listen at port 21 and file transition protocol(FTP) uses two transmission control protocol(TCP) connection for communication in the network. FTP passes information in port number 21, which is only used to send control information.

Well known port are use to identify the service of network on the public internet and private internet network. Therefore, port 21 and 67 are the well known ports.

 

5 0
3 years ago
5. Why do we need programming language?​
Natasha_Volkova [10]

Answer:

hajshshzjsjwb

Explanation:

bsbjsjsjwjwjs

3 0
3 years ago
Read 2 more answers
Find the largest and smallest byte,short,int,long,float, and double. Which of these data types requires the least amount of memo
gladu [14]
<h2>double, long, float, short, byte</h2>

Explanation:

The given data types are built-in types. According to java, the following holds right to justify the order.

Double:

  • This occupies 64 bits
  • It can hold decimal values
  • Example: "1.23456e300d, -1.23456e-300d, 1e1d"

Float:

  • It occupies 32 bits
  • Holds decimal values
  • Example: "1.23e100f, -1.23e-100f, .3f, 3.14F"

Long:

  • It occupies 64 bits
  • Example: "-2L, -1L, 0L, 1L, 2L"

Short:

  • It occupies 16 bits
  • Stores twos complement integer

Byte:

  • It occupies 8 bits
  • Stores twos complement integer
7 0
3 years ago
For your biology class, you have taken a number of measurements for a plant growth experiment. You wish to create a chart that s
Naya [18.7K]
Calc or Excel is the application best suited for this effort.
8 0
3 years ago
Read 2 more answers
Other questions:
  • What action makes RAM on your computer disappear?
    12·2 answers
  • What kind of game was pole position?
    6·2 answers
  • Computer can do work very___​
    7·2 answers
  • Which of the following statements best reflects the pros and cons of overtime potential for a line installer or repairer?
    15·1 answer
  • What kind of skill is persuasion?
    7·1 answer
  • In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption al
    14·1 answer
  • What are the characteristics of Instant Search in Outlook 2016? Check all that apply. A)Typing whole phrases makes your search m
    12·1 answer
  • Help plz (will give brainliest)
    9·1 answer
  • 2. what are the advantages of breaking up a single logical message into a number of fixed-sized packets and then sending each on
    5·1 answer
  • Answer the following question in 3-4 complete sentences. Define the following terms: - registration - press - keyblock.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!