What does the firewall do about packets that it suspects (but cannot prove) are attack packets?

A. It will challenge the sender of the packet
B. It will pass the packet
C. It will drop the packet
D. It will quarantine the packet

B. It will pass the packet

Computer Science & Information Technology

You might also like to view...

To connect two or more tables that have common fields, a user will need to establish and define the table ________

A) bookmarks B) relationships C) connections D) links

Computer Science & Information Technology

When a procedure produces incorrect results, a ____ error has occurred.

A. logic B. syntax C. run-time D. design

Computer Science & Information Technology