1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sloan [31]
3 years ago
13

A(n) ____________________ is hardware or software that blocks or allows transmission of information packets based on criteria su

ch as port, IP address, and protocol.
Computers and Technology
1 answer:
QveST [7]3 years ago
6 0

Answer:

The answer is "Packet Filter(144-145)".

Explanation:

This technique is used in firewalls, which monitors access to the network, track data transmission packets, transfer or stop based on IP protocols and ports.

  • This approach is often used to test modulation packets.
  • It also used to control performance and provides security.
  • This mechanism also used in the IPv6.
You might be interested in
Servlet session and JSP session have differentabilities.<br>? True<br><br>? False
xxTIMURxx [149]
Your answer is true your welcome!
5 0
3 years ago
The conflict between the user's goal for unfettered access to data and the security administrator's goal to protect that data is
rewona [7]

Answer: Access control

Explanation:Access control is the type of security facility that is provided to the systems in an organization. The functions carried out in maintaining the security of the system is done by authenticating , authorizing and identification of the users and related components . They are secured using the PINs , passwords, bio-metric scan etc.

The situation of the user wanting to have a unrestrained access towards data as well as maintaining the security is the done by access control.

8 0
2 years ago
Read 2 more answers
Which of the following are advantages of cloud computing?
Leona [35]
Hahahahaha lawllakad
7 0
3 years ago
Read 2 more answers
Which of these is one of the primary concerns for protecting your family when online?
Lady_Fox [76]
Sharing personal information
7 0
3 years ago
Read 2 more answers
What is the best response to cyberbullying?
astra-53 [7]
Answer is C





Braine list please:)
5 0
3 years ago
Read 2 more answers
Other questions:
  • Which area of physics governs wireless communication?
    10·2 answers
  • I’m nobody. Who are you?
    9·2 answers
  • Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's order takers often had difficulty de
    9·1 answer
  • HELPPPP KOKICHI IS OUT TO KILL ME
    11·1 answer
  • HELP PLS QUICK TRUE OR FALSE QUESTION
    7·2 answers
  • With a heat exchanger, the temperature of the process fluid can be measured with a temperature-
    14·1 answer
  • Which feature allows you to copy attributes of
    11·1 answer
  • Using C, Write a program that reads a series of strings from standard input and prints only those strings beginning with the let
    8·1 answer
  • Your agile team only has one database developer. So the other developers finish their tasks and then wait for their work to be I
    6·1 answer
  • Gaining information by tricking an individual into releasing information is often referred to as.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!