A software ______ is a program designed to block unauthorized data packers while permitting authorized data packets on a network
a. Router
b. Filter
c. Policy
d. Firewall
D. Firewalls consist of two different types: software-based or hardware-based. Both types of firewalls examine data packets to determine whether to forward them to their destination or to block them.
Computer Science & Information Technology
You might also like to view...
A(n) ________ consists of the typeface and the type style
Fill in the blank(s) with correct word
Computer Science & Information Technology
The letters GRC represent an approach to information security strategic guidance from a board of directors or senior management perspective. The letters stand for __________, __________, and __________.
A. government, regulation, classification B. generalization, risk assessment, cryptography C. governance, risk management, compliance D. governance, risk control, confidentiality
Computer Science & Information Technology