A software ______ is a program designed to block unauthorized data packers while permitting authorized data packets on a network
a. Router
b. Filter
c. Policy
d. Firewall
D. Firewalls consist of two different types: software-based or hardware-based. Both types of firewalls examine data packets to determine whether to forward them to their destination or to block them.
You might also like to view...
When drawing a table, lines can be removed by:
A) using the Delete Line button. B) pressing the [Delete] key. C) editing the Table properties. D) Using the Eraser button.
Use a(n) ____ to maintain constant power to a file server in the event of a power problem.
A. UPS B. surge protector C. power strip D. encryption program
Lin is designing the locks for a sensitive data center facility. She would like to choose the strongest possible lock that is appropriate for use in a commercial facility. What type of lock should she choose?
What will be an ideal response?
Rectangular arrays are often used to represent tables of values consisting of information arranged in:
a) rows b) columns c) both a and b d) None of the above