What does the firewall do about packets that it suspects (but cannot prove) are attack packets?
A. It will challenge the sender of the packet
B. It will pass the packet
C. It will drop the packet
D. It will quarantine the packet
B. It will pass the packet
Computer Science & Information Technology
You might also like to view...
To connect two or more tables that have common fields, a user will need to establish and define the table ________
A) bookmarks B) relationships C) connections D) links
Computer Science & Information Technology
When a procedure produces incorrect results, a ____ error has occurred.
A. logic B. syntax C. run-time D. design
Computer Science & Information Technology