What does the firewall do about packets that it suspects (but cannot prove) are attack packets?
A. It will challenge the sender of the packet
B. It will pass the packet
C. It will drop the packet
D. It will quarantine the packet
B. It will pass the packet
You might also like to view...
Most spreadsheet software includes features that create ________ -- sometimes called charts.
A. formulas B. functions C. graphs D. columns
The advantage of the application logic layer is that a three-tier design enhances overall performance by reducing the data server's workload.?
Answer the following statement true (T) or false (F)
Bob was asked to make a copy of all the evidence from the compromised system. Melanie did a DOS copy of all the files on the system. What would be the primary reason for you to recommend for or against using a disk-imaging tool?
A. The evidence file format will contain case data entered by the examiner and encrypted at the beginning of the evidence file. B. A simple DOS copy will not include deleted files, file slack, and other information. C. There is no case for an imaging tool because it will use a closed, proprietary format that if compared with the original will not match up sector for sector. D. A disk-imaging tool would check for internal self-checking and validation and have an MD5 checksum.
In Excel, if comments are hiding text you want to see, you can move the comments box
Indicate whether the statement is true or false