The first netfilter hook packets encounter is ________.

a) NF_IP_LOCAL_IN
b) NF_IP_LOCAL_OUT
c) NF_IP_PRE_ROUTING
d) NF_IP_FORWARD


c) NF_IP_PRE_ROUTING

Computer Science & Information Technology

You might also like to view...

All of the following steps must be taken when a file is used by an application except ______.

a. the file must be opened. If the file does not exist, the file will be created. b. the file must have a fully qualified path when opening the file. c. data is either written to the file or read from the file. d. when the application is finished using the file, the file is closed.

Computer Science & Information Technology

Why are the layers of the OSI model important to a network administrator?

What will be an ideal response?

Computer Science & Information Technology

____ a slide can help you see slide elements more clearly so that you can position them precisely where desired.

A. Coloring B. Styling C. Formatting D. Zooming

Computer Science & Information Technology

Draw a sequence diagram for the ReportIncident use case of Figure 2-14. Draw only the first five message sends. Make sure it is consistent with the sequence diagram of Exercise 2–13.

What will be an ideal response?

Computer Science & Information Technology