A software ______ is a program designed to block unauthorized data packers while permitting authorized data packets on a network

a. Router
b. Filter
c. Policy
d. Firewall


D. Firewalls consist of two different types: software-based or hardware-based. Both types of firewalls examine data packets to determine whether to forward them to their destination or to block them.

Computer Science & Information Technology

You might also like to view...

When drawing a table, lines can be removed by:

A) using the Delete Line button. B) pressing the [Delete] key. C) editing the Table properties. D) Using the Eraser button.

Computer Science & Information Technology

Use a(n) ____ to maintain constant power to a file server in the event of a power problem.

A. UPS B. surge protector C. power strip D. encryption program

Computer Science & Information Technology

Lin is designing the locks for a sensitive data center facility. She would like to choose the strongest possible lock that is appropriate for use in a commercial facility. What type of lock should she choose?

What will be an ideal response?

Computer Science & Information Technology

Rectangular arrays are often used to represent tables of values consisting of information arranged in:

a) rows b) columns c) both a and b d) None of the above

Computer Science & Information Technology