1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flura [38]
3 years ago
15

We have an internal webserver, used only for testing purposes, at IP address 5.6.7.8 on our internal corporate network. The pack

et filter is situated at a chokepoint between our internal network and the rest of the Internet. Can such a packet filter block all attempts by outside hosts to initiate a direct TCP connection to this internal webserver? If yes, design suitable packet filter rule sets (similar to those shown in the table below) that provides this functionality; if no, explain why a (stateless) packet filter cannot do it.
Table: Packet-Filtering Examples
Rule, Direction, Src address, Dest addresss, Protocol, Dest port, Action
1, In, External, Internal, TCP, 25, Permit
2, Out, Internal, External, TCP, >1023, Permit
3, Out, Internal, External, TCP, 25, Permit
4, In, External, Internal, TCP, >1023, Permit
5, Either, Any, Any, Any, Any, Deny

Computers and Technology
1 answer:
lukranit [14]3 years ago
3 0

Answer:

Check the explanation

Explanation:

A packet filter firewall is used as a check point between internal corporate network to the outside internet. It blocks all the inbound traffic from the outside hosts trying to initiate a direct TCP connection to the internal corporate webserver. The network design with firewall is shown in the attached image below:

The figures in the attached image below shows an internal corporate network is protected with a packet filter firewall to minimize the inbound traffic from the external network or an internet. Therefore, the packet filter is used as a check point between the network.

The packet filter blocks all attempts by the outside hosts in order to initiate a direct TCP connection to the internal webserver of the internal corporate network.

Going by the second part of the attached image below can can therefore conclude that:

• Rule 1 specifies that, deny any packet with the destination address 5.6.7.8 if the STN flag of TCP header is set.

• Rule 2 specifies that, allow the inbound email traffic from the external source.

• Rule 3 specifies, allows the Outbound TCP traffic from the internal corporate network.

• Rule 4 specifies, allows outbound Email traffic from the internal corporate network to the external network.

• Rule 5 specifies, block any traffic from any source to the any destination.

You might be interested in
Write a Bare Bones program that takes as input a value for X and places 4 times the value of X into the value of Z. The value of
Vlada [557]

Answer:

See the code snippet in the explanation section

Explanation:

import java.util.Scanner;

public class BareBonesProgram{

public static void main (String[] args){

 Scanner scan = new Scanner(System.in);

 System.out.println("Please enter the value of x: ");

 int x = scan.nextInt();

 int z = 4 * x;

 System.out.println("The value of z is: " + z);

 System.out.println("The value of x is: " + x);

}

}

6 0
3 years ago
Compare a Wi-Fi hotspot with a cybercafé.
erik [133]

Answer:

A WiFi Hotspot is a wireless internet connection that allows a computer, smartphone, or any other internet-enabled devices to connect to internet access points.

A cybercafe refers to any business place that allows people to access the internet usually within its premises after paying for connection access to connect to it.

Explanation:

3 0
3 years ago
6. According to camp policy, staff members need to be at least 23 years old to transport students. Dean now wants to determine h
Kamila [148]

Answer:

This seems to be related to MS Excel, here we will discuss the related formula:

<u>=IF(VLOOKUP("Adam Moriarty",$B$3:$C$5,2)>23,"Yes","No")</u>

the name can also be written in adjacent to J2 cell i.e. I2 and its reference to be used in vlookup primary key as follows:

<u>=IF(VLOOKUP(I2,$B$3:$C$5,2)>23,"Yes","No")</u>

Explanation:

We have used simple IF function combined with VLOOKUP function to reference this formula to the table of names and ages of the members (here the table is $B$3:$C$5 and ages are mentioned in 2nd column of the table)

please find attached screenshot for clarification

6 0
3 years ago
Drivers must always yield to emergency vehicles traveling
alina1380 [7]

True. Drivers must always yield to emergency vehicles traveling. Emergency vehicles always have the right of way, and other cars on the road need move out of their way when they see them driving with their hazards on. If there are no emergency lights or sirens, then it is okay to treat these vehicles like another vehicle on the road.

4 0
4 years ago
Shift Registers. What is a Bit Shift Register? What are the different types of Bit Shift Registers and what might be their appli
lesya [120]

Answer:

Digital logic circuits made of cascaded flip flops.

The different types of Bit Shift Registers are; Serial-In Serial-Out, Parallel-In Parallel-Out, Serial-In Parallel-Out, Parallel-In Serial-Out.

Shift registers can be used as converters to translate data, as delay circuits or counters.

Explanation:

Shift Registers are digital logic circuits made of cascaded flip flops. Their main function is to shift their contents (bits) to the right or to the left one bit at a time. Bit Shift Registers can process data either parallelly or serially. So the different types of Bit Shift Registers are;

  • Serial-In Serial-Out
  • Parallel-In Parallel-Out
  • Serial-In Parallel-Out
  • Parallel-In Serial-Out

Because of their ability to convert data from parallel to serial, shift registers can be used as converters to translate data. Some of their other applications are also delay circuits or counters, storing and manipulating data etc.

I hope this answer helps.

8 0
3 years ago
Other questions:
  • Imagine that you are an independent filmmaker making a feature-length narrative film in the United States, with a variety of bot
    11·2 answers
  • In a doubly linked list, every nodecontains the address of the next node and the previousnode except for the ____ node.
    8·1 answer
  • What is the Code of Conduct/Ethics for the company/of Department of Defense?
    7·1 answer
  • What is the output of the following snippet if the user enters a value of 11 for the variable x and 4 for the variable y? x=int(
    5·1 answer
  • What is an rgv in coding
    10·2 answers
  • Why should you avoid the use of sarcasm, clichés, and idioms in business letters?
    11·2 answers
  • When you evaluate the use of digital media, how has it affected the newspaper business? The rise of digital media has caused new
    15·1 answer
  • What is suitable equipment to meet customer needs from
    10·1 answer
  • If Tracy is facing right, which of the following commands can be used to turn her to face up?
    9·1 answer
  • How do I mark someone brainiest
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!