What filtering mechanisms do almost all main border firewalls use?

A. Stateful packet inspection
B. Application proxy filtering
C. Static packet filtering
D. NAT filtering


A. Stateful packet inspection

Computer Science & Information Technology

You might also like to view...

Microsoft Office 365 uses the _________________________ to deliver a subscription-based service offering the newest Office suite and much more.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Secure sign-in increases security on your computer by forcing you to press Ctrl+Alt+Delete before signing in.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To ________ a document is to insert, replace, or delete text in a document

A) format B) frame C) drag D) edit

Computer Science & Information Technology

Which statement describes a weakness in WEP that allows it to be easily cracked?

A. The size of the encryption key B. The use of 802.1X C. The use of AES D. The use of a 256-bit block cipher

Computer Science & Information Technology