A software ______ is a program designed to block unauthorized data packers while permitting authorized data packets on a network

a. Router
b. Filter
c. Policy
d. Firewall

D. Firewalls consist of two different types: software-based or hardware-based. Both types of firewalls examine data packets to determine whether to forward them to their destination or to block them.

Computer Science & Information Technology

You might also like to view...

A(n) ________ consists of the typeface and the type style

Fill in the blank(s) with correct word

Computer Science & Information Technology

The letters GRC represent an approach to information security strategic guidance from a board of directors or senior management perspective. The letters stand for __________, __________, and __________.

A. government, regulation, classification B. generalization, risk assessment, cryptography C. governance, risk management, compliance D. governance, risk control, confidentiality

Computer Science & Information Technology