Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________

A) packet switching B) static addressing
C) packet filtering D) logical port blocking


D

Computer Science & Information Technology

You might also like to view...

A comment that appears at the bottom of the page and contains the corresponding superscript number is called a _____.

A. footer B. note C. reference D. footnote

Computer Science & Information Technology

Internet Information Services is a web service utilized by the _______________ operating system.

a. Unix b. Linux c. Windows d. IIS is platform-independent.

Computer Science & Information Technology

The Visual Basic Editor provides commenting functionality and more on the Developer toolbar

Indicate whether the statement is true or false

Computer Science & Information Technology

All of the following are true in regard to front-end databases EXCEPT:

A) The front-end database accesses back-end tables by linking to them. B) Front-end databases can be deployed locally to user's computers. C) Front-end databases allow for the creation of temporary objects, such as temporary tables. D) Users cannot modify the file to include objects for their individualized use.

Computer Science & Information Technology