Packet filter firewalls operate at which of the following layers of the OSI model?

a. Application
b. Network
c. Session
d. Transport


ANS: B

Computer Science & Information Technology

You might also like to view...

Thumbnails are an alternative to ________ in the Navigation Pane

A) AutoText B) subdocuments C) headings D) pages

Computer Science & Information Technology

A replacement application has had its business case approved. In preparation for a requirements workshop, an architect is working with you to ensure that appropriate security requirements have been captured. Which of the following documents BEST captures the security requirements?

A. Solution overview document B. Use case document C. Security requirements traceability matrix D. Business requirements document

Computer Science & Information Technology

Rounds a number to a specified number of digits.

What will be an ideal response?

Computer Science & Information Technology

Which of the following is not part of the structure of a C program?

A. Preprocessor directives B. Global declarations section C. Local directives D. Functions

Computer Science & Information Technology