Packet-filtering firewalls

a. can filter data based on destination address
b. can filter data based on source address
c. can filter data based on data type
d. all of the above

d. all of the above

Computer Science & Information Technology

You might also like to view...

Because security-in-depth has been adopted as a goal of your company, a security analyst was hired to complete a security audit. During the audit, the security analyst suggests that your company implements job rotation in several departments. Of which type of controls is this personnel policy?

A. Administrative control B. Technical control C. Physical control D. Corrective control E. Preventive control F. Recovery control G. Statements b and d only H. Statements a and f only I. Statements c and e only

Computer Science & Information Technology

Many programming languages use the term ____ to refer to the marker that is used to automatically recognize the end of data in a file.

A. data_end B. end_data C. eof D. eod

Computer Science & Information Technology