Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
A. packet filtering
B. packet switching
C. static addressing
D. logical port blocking
Answer: D
Computer Science & Information Technology
You might also like to view...
What is an individual component of a struct called?
What will be an ideal response?
Computer Science & Information Technology
Memory chips that temporarily store data are called ____.
A. storage devices B. megabytes C. gigabytes D. RAM
Computer Science & Information Technology
Which one of the following is an example of a botnet?
a. Trinoo b. Firesheep c. Zeus d. Omnipeek
Computer Science & Information Technology
To create a cover page using the Cover Page command, click the _________ tab.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology