What technique is used to guard against hackers looking for ways to send unauthorized TCP or UDP packets into your network?
A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering
Answer: A
Computer Science & Information Technology
You might also like to view...
In pseudocode, a(n) ____ statement is used to clearly show where the selection structure ends.
A. end B. endif C. endifelse D. stop
Computer Science & Information Technology
Which of the following is an example of a well-formed empty element?
A.
Computer Science & Information Technology
A stack is also known as a FIFO data structure.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
All devices running the Android operating system use a touch screen for a user interface.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology