Using ____, a firewall reviews the header information for incoming and outgoing Internet packets to verify that the source address, destination address, and protocol are all correct.
A. snooping
B. packet filtering
C. a proxy server
D. anti-virus software
Answer: B
You might also like to view...
A ________________ diagram helps us visualize the contents of and relationships among the classes of a program.
a) class and object b) UML c) object-oriented d) public e) private
Quotations are much more important than other types of data you find on Web pages.
Answer the following statement true (T) or false (F)
Match each item with a statement below:
A. integrates business processes, policies, and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources B. a set of identifiers associated with an entity C. contains all the data sources from an organization where identity-related information is stored D. has become the de facto standard of both stand-alone directory and virtual directory technologies E. an international standard organization (ISO) standard for worldwide communications that defines a networking framework for implementing protocols in seven layers F. a Java API that provides naming and directory functionality to Java applications G. a combination of states and transitions that make up a process H. a technique of identity management modeling in which identities are granted resources, authorization, and assignment to one or more predefined roles I. designed to handle any complexity involved in password management under the IDIM model
Microsoft created the font translation technology PostScript.
Answer the following statement true (T) or false (F)