Question

Question 38 [6] Which of the following is not true about Packet-filtering firewall ? Answers: (A) Permits or denies traffic b
(C) Looks at all packet at a time (D) None
0 0
Add a comment Improve this question Transcribed image text
Answer #1

(C) Looks at all packet at a time

This statement is not true because Packet filtering firewall looks at every packet individually.

The first and second statements are true as Packet filtering firewall Checks the source and destination IP address to verify the packets based on their packet header.

Add a comment
Know the answer?
Add Answer to:
Question 38 [6] Which of the following is not true about Packet-filtering firewall ? Answers: (A)...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • A typical packet-filtering firewall has a difficult time protecting against: which? Viruses, worms, or Trojan horses...

    A typical packet-filtering firewall has a difficult time protecting against: which? Viruses, worms, or Trojan horses Traffic that is not sent through them Wireless threats that occur at Layer 2 All of the above

  • Question 1 1 The time to live field of IP header can prevent -------- in packet...

    Question 1 1 The time to live field of IP header can prevent -------- in packet forwarding Question 2 In TCP connections, RST packets are used to ---------   Question 3 (Multiple answers if applied) The protocol field of the IP header can be   A) IP B) TCP C) ICMP D) UDP E) ARP Question 4 Frame exists in ------, packet exists in ------ , data segment existis in------ of TCP/IP model. Question 5 A web browser is -------- --------------- Question...

  • Which of the following service set security requirements are addressed by IEEE 802.11i security protocols? none...

    Which of the following service set security requirements are addressed by IEEE 802.11i security protocols? none of the above Basic Service Set (BSS) Extended Service Set (ESS) Basic Service Set (BSS) & Extended Service Set (ESS) ОО What type of firewall only passes or rejects traffic based on factors such as IP address and port number? O Proxy-type firewall Packet-filtering firewall Stateful firewall none An attack that uses a detailed listing of common passwords and words in general to gain...

  • 1. To which of the following subnets does IP address 225.3.2.22 belong? 225.3.2.0/24 225.3.2.22/24 225.2.3.0/24 225.0.0.0/24...

    1. To which of the following subnets does IP address 225.3.2.22 belong? 225.3.2.0/24 225.3.2.22/24 225.2.3.0/24 225.0.0.0/24 none of the above Question 2 On which of the following devices does the transport layer NOT run? laptop router cellphone A, B and C none of the above Question 3 What is the source address contained in the discover message sent by a host that is wanting to obtain an IP address? 255.255.255.255 0.0.0.0 the IP address of the server the last IP...

  • - Network security QUESTION 17 We assume that a LAN network includes 7 hosts (A, B,...

    - Network security QUESTION 17 We assume that a LAN network includes 7 hosts (A, B, C, D, E. Fand G) which are connected by a switch. The contents of the switch's CAM table is as follows: (Port 1. Host A) - (Port 2. Host B) - (Port 3. Host - Port 4, Host D) - Port S. Hosta-Port 6, Host F) - (Port 7. HostG), Also, we assume that there is/are one or many host(s) that has/have sent fake...

  • 14) The process that screens individual IP packets based solely on the contents of the source...

    14) The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as A) access control list. B) deep packet inspection. C) intrusion filtering. D) packet filtering. 15) The process that allows a firewall to be more effective by examining the data in the body of an IP packet, instead of just the header, is known as A) deep packet inspection. B) stateful packet filtering. C) static...

  • please I need help with problem 8.12 through 8.15 fer that allows the Instructors sou can...

    please I need help with problem 8.12 through 8.15 fer that allows the Instructors sou can try. directly from 8.13 Deduce and explain the problem. 8.12 What is the limiting factor in the time required to transfer a hile using TFTP Note: The next three problems make use of Wireshark, a free packer sniffer the VON to capture traffic on a LAN A Wireshark projects package is part of the Instre Resource for this book. These exercises are additional mini-projects...

  • 1. Let’s consider the network shown in Figure 1 where Snort is deployed. 1.1: In Figure...

    1. Let’s consider the network shown in Figure 1 where Snort is deployed. 1.1: In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? (9 points) 1.2: In Figure 1, say True or False to the following statement: “Snort can see both incoming packets from the left firewall and outgoing packets from the right firewall”. (5 points) 1.3: In Figure 1, assume a packet P matches the following Snort rule when the packet is analyzed...

  • QUESTION 1 Which generation of wireless network technology uses the packet-switched IP network? a. 3G b....

    QUESTION 1 Which generation of wireless network technology uses the packet-switched IP network? a. 3G b. 4G c. 5G d. All of the above 2.5 points    QUESTION 2 Which layer of the TCP/IP hierarchy is responsible for obtaining the correct address for a message’s destination? a. Application b. Link c. Network d. Transport 2.5 points    QUESTION 3 The UPDATE statement is used to update table names. True False 2.5 points    QUESTION 4 Which of the following is...

  • which of the following statements is not true for local DNS servers? Option: A local DNS...

    which of the following statements is not true for local DNS servers? Option: A local DNS server acts like a proxy. IPS often provide default name servers. A local DNS server provides authorization hostname to IP address mappings. A local DNS servers has a local cache to speed up. Which of the following is unlikely to be one of the transport layers services? Option: Segmenting Reliable data transfer congestion control host-to-host communication What is the data unit exchanged in the...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT