What technique is used to guard against hackers looking for ways to send unauthorized TCP or UDP packets into your network?

A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering


Answer: A

Computer Science & Information Technology

You might also like to view...

In pseudocode, a(n) ____ statement is used to clearly show where the selection structure ends.

A. end B. endif C. endifelse D. stop

Computer Science & Information Technology

Which of the following is an example of a well-formed empty element?

A. B. D.

Computer Science & Information Technology

A stack is also known as a FIFO data structure.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

All devices running the Android operating system use a touch screen for a user interface.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology