What does the firewall do about packets that it suspects (but cannot prove) are attack packets?
A. It will challenge the sender of the packet
B. It will pass the packet
C. It will drop the packet
D. It will quarantine the packet
B. It will pass the packet
You might also like to view...
____ is a monitoring and reporting tool.
A. Application and defect security B. Defect and system security C. Application and process security D. Application and system security
In a recursive solution to a problem, we solve a problem P(n) by solving another problem P(k) where
a. P(k) is the hardest part of P(n) b. P(k) is a larger problem than P(n) c. P(k) is smaller than P(n) d. P(k) is the same problem as P(n) apart from size.
Engineers can use ________ programs for 3-D modeling in the creation of automated designs, technical drawings, and model visualizations
A) drawing B) computer-aided design (CAD) C) virtual reality (VR) D) Image editing
A program that blocks unwanted or unsafe data is called a ________
A) proxy B) username C) LOPSA D) firewall