1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
3 years ago
10

Explain why an organization's firewall should block outgoing packets the source addresses of which are not in the organization's

address space.
Computers and Technology
1 answer:
Ilya [14]3 years ago
5 0

Answer:

A firewall is used to monitor and control incoming and outgoing (or in better terms, inbound and outbound) traffic in a network based on some pre-defined  security rules set by either an individual or a business.

Now, using firewall to block outgoing packets that have source addresses which are not in an organization's address space means rejecting requests that, though originate from the organization's address space, are not in the organization's allowable address.

This is necessary and of utmost importance because even though an hacker (or simply an attacker) gains access into the organization's network, there is a limit to what harm they can do. If for example, they manage to get some malicious programs into the system's via network processes such as using infected e-mails or using a browser, they might also want to make some requests to the Internet to get some additional programs downloaded which altogether is harmful to the system. Disabling or blocking outgoing packets or traffic will stop this combined hazard from happening.

You might be interested in
John just bought a used iPad from a friend who had lost the charging cable. John notices that the cable is like the charging cab
7nadin3 [17]

Answer:

an iphone charger

Explanation:

5 0
4 years ago
Which of the following postfix expressions corresponds to the given infix expression?
Ivan

Answer:

C) 1 4 2 / + 1 + 2 + 3 * 2 /

Explanation:

Infix, Postfix and Prefix are 3 different ways of writing expressions which differ in relative placement of operator and operands.

In Infix , operator lies between the operands whereas in postfix operator is written after its operands.

For example: 1 + 2 is infix while 1 2 + is the corresponding postfix expression.

Converting the given infix expression (1 + 4 / 2 + 1 + 2) * 3 / 2 to postfix:

Let (1 + 4 / 2 + 1 + 2) be represented by x.

Converting x to postfix:

(1 + 4 / 2 + 1 + 2)  =>  1 4 2 / + 1 + 2 +       ------------------------- (1)

So the overall infix expression becomes:

x * 3 / 2

Converting it to postfix:

x 3 * 2 /

Replacing the value of x from (1)

1 4 2 / + 1 + 2 + 3 * 2 /

4 0
3 years ago
Después de un incidente de seguridad del cliente, el equipo realiza un análisis en profundidad de cada paso dado por los atacant
klio [65]

Explanation:

Respuesta al incidente

5 0
3 years ago
Hey guys can u tell me <br><br>5 advantages of spread sheet<br>kinda urngent ?​
olya-2409 [2.1K]

1. Spreadsheets Improve Data Organization

2. Easing Collaborative Data Collection

3. Spreadsheets Enable Dynamic Calculations With Built-In Formulas

4. Spreadsheets Are Equipped With Preset Functions

5. Spreadsheets Provide Functionality For Graphing And Visual Aids

hope it helps

5 0
3 years ago
Read 2 more answers
Once you fix the bug in a code, what is the last thing you should do?
aleksklad [387]

Answer:

Know what the code should do

4 0
3 years ago
Other questions:
  • What can help prevent bullying?
    8·2 answers
  • Which device should be used for enabling a host to communicate with another host on a different network?
    9·1 answer
  • Which visual aid would help a group of veterinary students study a dog's anatomy?
    14·1 answer
  • Brian is selecting an authentication protocol for a PPP connection. He would like to select an option that encrypts both usernam
    7·1 answer
  • Write a program that uses these bounds and bisection search (for more info check out the Wikipedia page on bisection search) to
    8·1 answer
  • Question 3.3. Which of the following is NOT a computer protocol? FTP SMTP ISP TCP
    11·1 answer
  • What is the default method of referencing cells in formulas?
    6·1 answer
  • Gary lives in an area that receives a lot of rain throughout the year. which device would be useful to him to maintain his compu
    8·1 answer
  • What are three to five (3-5) key differences and features in Windows Server 2016 versus 2012?
    14·1 answer
  • Assume that month is an int variable whose value is 1 or 2 or 3 or 5 ... or 11 or 12. Write an expression whose value is "jan" o
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!