Which of the following firewalls allows you to see a map of where the attack is coming from?

a. Windows 7 firewall
b. Norton firewall
c. McAfee personal firewall
d. Iptables firewall


ANS: C

Computer Science & Information Technology

You might also like to view...

An alpha version of software is a pre-release version that is supplied to selected users and developers to preview and test before the final version is released

Indicate whether the statement is true or false

Computer Science & Information Technology

An added benefit of a navigation form is that it can be easily converted to a(n) ________ form if the Access database is deployed on a company intranet or on the Internet

Fill in the blank(s) with correct word

Computer Science & Information Technology

Use the ____ statement to refer to the properties of an object without listing the object itself.

A. with B. do C. use D. object

Computer Science & Information Technology

. During the ____________________ design or approach to the case, you outline the general steps you need to follow to investigate the case.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology