Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

A. packet filtering
B. packet switching
C. static addressing
D. logical port blocking


Answer: D

Computer Science & Information Technology

You might also like to view...

What is an individual component of a struct called?

What will be an ideal response?

Computer Science & Information Technology

Memory chips that temporarily store data are called ____.

A. storage devices B. megabytes C. gigabytes D. RAM

Computer Science & Information Technology

Which one of the following is an example of a botnet?

a. Trinoo b. Firesheep c. Zeus d. Omnipeek

Computer Science & Information Technology

To create a cover page using the Cover Page command, click the _________ tab.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology