You might also like to view...

Which criterion cannot be used in an ACL rule to match a packet?

a. Source address b. Source port c. Destination address d. Destination port f. Protocol e. Direction

Computer Science & Information Technology

A(n) ____________________ is a type of software that can be used to add functionality to the operating system, customize your screen-based work environment, set up communication between the computer and peripheral devices, and enhance your computer's security.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology