What does the firewall do about packets that it suspects (but cannot prove) are attack packets?

A. It will challenge the sender of the packet
B. It will pass the packet
C. It will drop the packet
D. It will quarantine the packet


B. It will pass the packet

Computer Science & Information Technology

You might also like to view...

____ is a monitoring and reporting tool.

A. Application and defect security B. Defect and system security C. Application and process security D. Application and system security

Computer Science & Information Technology

In a recursive solution to a problem, we solve a problem P(n) by solving another problem P(k) where

a. P(k) is the hardest part of P(n) b. P(k) is a larger problem than P(n) c. P(k) is smaller than P(n) d. P(k) is the same problem as P(n) apart from size.

Computer Science & Information Technology

Engineers can use ________ programs for 3-D modeling in the creation of automated designs, technical drawings, and model visualizations

A) drawing B) computer-aided design (CAD) C) virtual reality (VR) D) Image editing

Computer Science & Information Technology

A program that blocks unwanted or unsafe data is called a ________

A) proxy B) username C) LOPSA D) firewall

Computer Science & Information Technology