__________ firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.

A. Packet-filtering
B. Application gateway
C. Circuit gateway
D. MAC layer


Answer: A

Computer Science & Information Technology

You might also like to view...

Groove Music is used to record, organize, and play your music collection.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Andrew and Aaron were tired of waiting for their expense book software to be developed by the IS department, so they received guidance from the IS department and created their own. This is an example of ____.

a. rapid application development b. end-user systems development c. traditional systems development life cycle d. prototyping

Computer Science & Information Technology

As shown in the accompanying figure, Word shades a shaded area from the left margin to the right margin of the current paragraph.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

There are two general approaches for mapping an association to a set of collections. In Section 10.6.2, we map the N-ary association Statistics to two classes, a simple Statistics class to store the attributes of the association, and a StatisticsVault class to store the state of the links among the association links. In Section 10.4.2, we described an alternative approach where the association links are stored in one or both classes at the ends of the association. In the event associations were stored in both classes, we added mutually recursive methods to ensure that both data structures remained consistent. Use this second approach to map the N-ary Statistics association to Collections. Discuss the trade-offs you encounter and the relative advantages of each approach.

What will be an ideal response?

Computer Science & Information Technology