Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________
A) packet switching B) static addressing
C) packet filtering D) logical port blocking
D
You might also like to view...
A comment that appears at the bottom of the page and contains the corresponding superscript number is called a _____.
A. footer B. note C. reference D. footnote
Internet Information Services is a web service utilized by the _______________ operating system.
a. Unix b. Linux c. Windows d. IIS is platform-independent.
The Visual Basic Editor provides commenting functionality and more on the Developer toolbar
Indicate whether the statement is true or false
All of the following are true in regard to front-end databases EXCEPT:
A) The front-end database accesses back-end tables by linking to them. B) Front-end databases can be deployed locally to user's computers. C) Front-end databases allow for the creation of temporary objects, such as temporary tables. D) Users cannot modify the file to include objects for their individualized use.