1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
3 years ago
10

Explain why an organization's firewall should block outgoing packets the source addresses of which are not in the organization's

address space.
Computers and Technology
1 answer:
Ilya [14]3 years ago
5 0

Answer:

A firewall is used to monitor and control incoming and outgoing (or in better terms, inbound and outbound) traffic in a network based on some pre-defined  security rules set by either an individual or a business.

Now, using firewall to block outgoing packets that have source addresses which are not in an organization's address space means rejecting requests that, though originate from the organization's address space, are not in the organization's allowable address.

This is necessary and of utmost importance because even though an hacker (or simply an attacker) gains access into the organization's network, there is a limit to what harm they can do. If for example, they manage to get some malicious programs into the system's via network processes such as using infected e-mails or using a browser, they might also want to make some requests to the Internet to get some additional programs downloaded which altogether is harmful to the system. Disabling or blocking outgoing packets or traffic will stop this combined hazard from happening.

You might be interested in
The blank contains the computer's brain the central processing unit CPU
Ipatiy [6.2K]

The central processing unit (CPU), also called a processor, is located inside the computer case on the motherboard. Hope it helps (:

6 0
3 years ago
CHALLENGE ACTIVITY 4.2.2: Basic while loop with user input. Write an expression that executes the loop while the user enters a n
tino4ka555 [31]

Answer:

#include<iostream>

using namespace std;

int main()

{

int userNum;

userNum=9;

while(userNum>=0)

{

  cout<<"Body"<<endl;

  cin>>userNum;

}

cout<<"Done"<<endl;

return 0;

}

Explanation:

  • Use the userNum >= 0 expression that executes the loop while the user enters a number greater than or equal to 0.
  • Print the userNum inside the while loop.
3 0
3 years ago
Given the following code, what will it display?
trapecia [35]
Number#4 = 55 ; start counting from 0
4 0
4 years ago
Read 2 more answers
Which of the following identifies your location in a document? I-beam Icon Insertion Point Pointing Arrow
Delicious77 [7]
The answer is Insertion Point. In Microsoft Word, the insertion point is the blinking vertical line in the document. It will identify the location where you can enter or alter text on the page. When creating a new document, the insertion point is located in the top-left corner of the document. 
8 0
3 years ago
Imagine that you’re partner in a business firm that sells computers and other electronic goods. As part of your business organiz
WITCHER [35]

The best way to dispose of electronic goods is by recycling raw materials and correctly disposing of the remaining hazardous materials.

<h3>What does eco-friendly disposal imply?</h3>

This implies using disposal practices that have a low negative impact on the environment.

<h3>How do you dispose electronic goods?</h3>

The best way to do this is:

  • Appropiately collect electronic goods that cannot be used anymore.
  • Identify the materials or parts that can be recycled as this reduces the number of new parts that will be manufactured.
  • Separate the recycling materias from those that cannot be recycled.
  • Dispose of the remaining materials in the best way depending on the material as some of these are hazardous and require special disposing practices.

Learn more about recycling in: brainly.com/question/11861824

6 0
3 years ago
Other questions:
  • Under what driving conditions will 2019 Nissan LEAF’s available Rear Cross Traffic Alert (RCTA) warn the driver if a vehicle is
    11·1 answer
  • In order to recover from an attack on any one server, it would take an estimated 14 hours to rebuild servers 1, 2, 3, and 4 and
    6·1 answer
  • Match the careers with the education required for each job
    5·1 answer
  • In the context of the components of a typical expert system, _____ is a software package with manual or automated methods for ac
    15·1 answer
  • A startup disk cannot be detected when booting a computer. The disk's pressence is reported by the system firmware, But Windows
    9·1 answer
  • Describe the three essential characteristics of an object fromthe perspective of object oriented paradigm.
    7·1 answer
  • What computer would I need to set up my oculus quest 2 aka make my oculus quest 2 link to a computer?
    7·2 answers
  • Al these are benefits of computer literacy except
    14·1 answer
  • Pls help I will give points
    11·1 answer
  • What is the recipe for enchanting table?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!