Which of the following is a disadvantage of Check Point Firewall – 1?

a. It cannot work with multiple operating systems.
b. The firewall is dependent on the security of the underlying operating system.
c. It cannot protect against common DoS attacks.
d. It cannot perform a stateful packet inspection.


ANS: B

Computer Science & Information Technology

You might also like to view...

You can use the Stream Reader class's ____________ method to read a line of text from a file.

a. Read Line b. Read Text c. Get Next d. Read

Computer Science & Information Technology

Match the following action buttons to the behavior:

I. Beginning II. End III. Home IV. Return V. Forward or Next A. moves to the last slide in a slide show B. moves to the first slide in a slide show C. goes to the last slide viewed D. can be set to go to any slide E. moves to the following slide

Computer Science & Information Technology

This methodology allows the users and developers to proceed to build the requirement only if the level of risk is acceptable.

A. Spiral B. Iterative C. Agile D. TSP

Computer Science & Information Technology

Explain the importance of using charts to convey data accurately. Include an example of how charts can be used to mislead people.

What will be an ideal response?

Computer Science & Information Technology