1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexandra [31]
3 years ago
14

Access control lists (ACLs) are used to permit and deny traffic in an IP router.

Computers and Technology
1 answer:
Blizzard [7]3 years ago
7 0

Answer:

A. True

Explanation:

  • ACLs are the packet filters of the network. They may restrict, allow or deny traffic necessary for safety.
  • When setting rules for ACLs, all traffic flow depends on the point of view of the router's interface (not other networks).
  • ACL allows you to control the flow of packets for a single or group of IP addresses or for protocols such as TCP, UDP, ICMP and so on.
  • Invalid interface or accidental change of source / destination may adversely affect ACL network
You might be interested in
Operating systems move code and data, as necessary, to a portion of the disk that is used as if it were memory, not just disk st
GalinKa [24]

Virtual memory frees up RAM by transferring data that hasn't recently been used to a storage device, such as a hard disk or solid-state drive (SSD). Virtual memory is useful for multitasking, running large programs, and speeding up the system.

<h3>What is the role of virtual memory in disk storage space?</h3>

Virtual memory fulfills two functions. First, by using disk, it enables us to increase the utilization of physical memory. Because each virtual address is converted to a physical address, it also enables memory protection.

An operating system may load programs larger than its physical memory thanks to virtual memory, which is its fundamental benefit. The users get the idea that the machine has boundless memory. Additionally, it offers memory security.

Therefore, operating systems move code and data, as necessary, to a portion of the disk that is used as if it were memory, not just disk storage space.

Learn more about virtual memory here:

brainly.com/question/13384907

#SPJ2

4 0
1 year ago
Read 2 more answers
Refer to the exhibit. A network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transact
Mnenie [13.5K]

Answer:

Binary file.

Explanation:

                           In this case, the network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transaction. However, the transaction data seems indecipherable. The explanation for this is that the TCP transaction file is a Binary File and because of this the network secuirty analyst is unable to decipher the transaction file.

                           The solution for this is to convert the binary file into text file which is human readable.

3 0
3 years ago
Assume that ip has been declared to be a pointer to int and that enrollment has been declared to be an array of 20 elements . As
Vitek1552 [10]

Answer:

ip = enrollment + section;

Explanation:

The variable ip has been declared to be a pointer to int.

int * ip;

The variable enrollment has been declared as an array of 20 elements .

int enrollment[20];

The variable section has been declared as an int.

int section;

In order to make ip point to the element in the array indexed by section, we can use the following statement :

ip = enrollment + section;

This will make ip point to enrollment[section].

5 0
3 years ago
hich type of denial of service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly map
shusha [124]

Answer:

DNS poisoning

Explanation:

This type of attack is known as DNS poisoning it is a very common attack that focuses on trying to redirect users of the site that has been attacked towards fake servers. These fake servers belong to the attackers and are used to collect the user's private data, which can then be used by the attackers for a wide range of malicious acts. Aside from stealing user information, this malicious data travels alongside regular user data allowing it to infect various servers easily.

7 0
3 years ago
Please select the word from the list that best fits the definition
Troyanec [42]

Answer

Linguistics

Explanation:

linguistics can be defined as scientific study of language and its structure, including the study of grammar, syntax, and phonetics.

there are some  Specific branches of linguistics  and that include computational linguistics, comparative linguistics, and structural linguistics.

study material into songs can also be defined as a linguistic hence linguistic is the correct option for you question

6 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the given original work is protected by the copyright law
    9·1 answer
  • Consider the following implementation of a class Square:
    12·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
  • When cleaning a firearm, what end of the firearm should you generally clean from?
    11·2 answers
  • The term “computer literacy” dates back to what decade? <br> 1960s<br> 1970s<br> 1980s<br> 1990s
    5·1 answer
  • Write the definition of a function named quadratic that receives three double parameters a, b, c. If the value of a is 0 then th
    12·1 answer
  • To communicate with an expansion card, one part of the ____ bus runs between RAM and the processor; the other part runs between
    13·1 answer
  • In rolling a die four times, what is the odds that at least one 5 would appear?
    6·1 answer
  • Which of the following statements accurately describes linked data?
    5·1 answer
  • 1) It is possible to email a document<br> directly from the Word application.<br> O FALSE<br> O TRUE
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!