Describe how packet-filtering routers can be configured to lower an organization's risk from external attack.
What will be an ideal response?
Most organizations with an Internet connection have some form of router at the perimeter, between the organization's internal networks and the external service provider. Many of these routers can be configured to reject packets that the organization does not allow into the network. This is a simple but effective way to lower the organization's risk from external attack.
You might also like to view...
In object oriented programming, ____________ is used to create an "is a" relationship among classes.
a. inheritance b. progression c. logic d. elimination
____ DTDs are most commonly associated with XHTML 1.0.
A. Three B. Two C. Four D. Six
Sara, the chief finance officer of a consulting firm, wants data to be automatically encrypted when stored on her hard drive. To accomplish this, she must use _____.
A. ?uninterruptible encryption B. ?full disk encryption C. ?default encryption D. ?redundant array encryption
The ‘Merges selected cells using spans' option in the Property inspector joins all selected cells into one ____________________.
Fill in the blank(s) with the appropriate word(s).