At what layer in the TCP/IP protocol hierarchy could a firewall be placed to filter incoming traffic by means of:

a) message content
b) source address
c) type of application​​

Answers

Answer 1

The answer is c) type of application

Answer 2

The most significant protocol at layer 3, often known as the network layer, is the Internet Protocol, or IP.The IP protocol, the industry standard for packet routing among interconnected networks, is the source of the Internet's name.  Thus, option C is correct.

What are the TCP/IP protocol hierarchy could a firewall?

Application-layer firewalls operate at the TCP/IP stack's application level (all browser traffic, or all telnet or ftp traffic, for example), and thus have the ability to intercept any packets going to or from an application. They stop different packets (usually dropping them without acknowledgment to the sender).

Firewalls are frequently positioned at a network's edge. An external interface is the one that is located outside the network, while an internal interface is the one that is located inside the firewall.

Therefore, The terms “unprotected” and “protected,” respectively, are sometimes used to describe these two interfaces.

Learn more about TCP/IP here:

https://brainly.com/question/27742993

#SPJ2


Related Questions

A hybrid data mart ________ data from a data warehouse as well as other data collection systems. It incorporates a top-down approach, end-user inputs, and enterprise-level integration. g

Answers

Answer:

Hybrid Data Marts

A hybrid data mart allows you to combine input from sources other than a data warehouse. This could be useful for many situations, especially when you need ad hoc integration, such as after a new group or product is added to the organization.

We can use a hybrid data mart to mix data from sources other than a data warehouse, and the further discussion can be defined as follows:

Hybrid Data Marts:

It could be useful in a variety of scenarios, particularly when informal integration is required, like when a new group or product is added to the organization.

We can use a hybrid data mart to combine data from various sources other than a data warehouse. It's a structure or access pattern that retrieves client-specific data in data warehouse environments. This data mart is a subset of a data warehouse that is typically focused on a particular business line or functional area.

Therefore, the final answer is "separates".

Find out more about the Hybrid Data Marts here:

brainly.com/question/13989635

Internet privacy refers to the level of information sharing on the web collected through web cookies, caches, and browsing history true or false

Answers

The level of information sharing on the web that are mainly collected through web cookies, caches, and browsing history of a web browser is referred to as Internet privacy: True.

A web browser can be defined as a software program that is typically designed and developed for viewing a HTML document or browsing the Internet.

An Internet privacy refers to the level of privacy protection an end user has while browsing the Internet, especially with reference to the vast range of protocols, technologies, and frameworks (concepts) that are deployed.

This ultimately implies that, Internet privacy relates to the level of information sharing on the web that are mainly collected on a web browser through the following means:

Web cookiesCachesBrowsing history

Read more: https://brainly.com/question/3840341

When do you think is the right time to use Styles,

Answers

Answer:

1. Democratic Management Style

2. Coaching Management Style

3. Affiliative Management Style

4. Pacesetting Management Style

5. Authoritative Management Style

6. Coercive Management Style

7. Laissez-Faire Management Style

8. Persuasive Management Style

Buddys machine shop has a kiosk computer located in the lobby for customers to use. The kiosk computer has recently been updated to Windows 10 from Windows 7 and is not part of a domain. The local computer policy created for Windows 7 has been applied to Windows 10. This policy severely restricts the use of the computer, so that customers can only use the web browser.
Occasionally, an administrator needs to sign in to the kiosk computer to perform maintenance and update software. However, this is awkward because the administrator needs to disable settings in local policy be performing any task. Then, when the tasks are complete, the administrator needs to re-enable the settings in the local policy. Explain how this system can be improved upon.

Answers

If your PC's are in an Active Directory domain, you can leverage Active Directory Group Policies to deploy the appropriate settings. Be sure to include the below settings in your Group Policy for the user accounts and workstations that will be running as a Kiosk. After creating this Group Policy, you can test by running gpupdate /force and then restarting the PC.

User Configuration
Administrative Templates
Start Menu and Taskbar
Change Start Menu power button (enabled) - set to "Lock" (I know this sounds weird, but Windows 7 won't completely disable Logoff if the Start Menu power button is defaulting to the Logoff action).
Remove Logoff on the Start Menu (enabled)
Remove and prevent access to the Shut Down, Restart, Sleep and Hibernate commands (enabled)
System
Ctrl+Alt+Del Options
Remove Lock Computer (enabled)
Remove Logoff (enabled)
Computer Configuration
Administrative Templates
System
Logon
Hide entry points for Fast User Switching (enabled)
For Windows PCs not in a Domain Environment

If your PC's are not in an Active Directory domain, then you'll need to make the below changes manually at each Kiosk PC. Note that you may be able to automate the changes via the use of operating system imaging tools and local mandatory user profiles - leave a comment below if you have interest in those steps.

Login at each Kiosk PC using a user account that will ultimately be used to run the Kiosk desktop applications.
Launch the Windows Registry Editor (REGEDIT.EXE) and make the following changes to the registry (note that you may need to temporarily grant local Administrative access to your Kiosk user account to do this if it is already in a very locked down state)
HKEY_CURRENT_USER
SOFTWARE
Microsoft
Windows
CurrentVersion
Policies
Explorer

What does it mean "Be Proactive"?

Answers

Answer:controlling a situation by making things happen or by preparing for possible future problems

Explanation:

Make things happen instead of waiting for them

What type of databases is not limited by the data’s physical location?

Answers

A distributed database is not limited by the data's physical location.

You enter a hardware store where you have an account, pick up a pair of $5.00 pliers, and wave them at the manager as you leave the store. This would be an example of a(n):

Answers

Shoplifting! Did he pay for those?!?!

The given situation is an example of shoplifting.

What is hardware?

All the mechanical components made of simply plastic or metal used in houses or industries are termed as hardware.

You enter a hardware store where you have an account, pick up a pair of $5.00 pliers, and wave them at the manager as you leave the store.

This gives an idea of the shoplifting, as he hold the account with them. He doesn't need to pay every time he buys anything.

This, this would be an example of shoplifting.

Learn more about hardware.

https://brainly.com/question/15232088

#SPJ2

what is the full form of computer​

Answers

Answer:

Common Operating Machine Purposely Used for Technological and Educational Research

Explanation:

"A computer is a general-purpose electrical device that is used to do arithmetic and logical processes automatically," according to some.

A company Digicom Parts manufactures 2 types of unique products for laptop and desktop computers. It manufactures 10 types of laptop products and 42 types of desktop products. Each product manufactured by the company has a unique productID from a-z and A-Z. The laptop product have productID (a, i, e, o, u, ALE, O, U) while the rest of the productIDs are assigned to the desktop products. The company manager wishes to find the sales data for the desktop products. Given a list of productIDs of the sales of the last N products, write an algorithm to help the manager find the productIDs of the desktop products.

Answers

Algorithms are used as a prototype of an actual program, during project design.

The algorithm the manager can use to find the productID of the desktop products is as follows:

Start

i = 0

if i > N, then Exit:

  Input productID:

       If productID.upper() == 'A' or 'I' or 'E' or 'O' or 'U':

                 Process data as desktop products

  i++

Go to step 2

Stop

Note that algorithms do not conform to programming syntax.

Read more about algorithms at:

https://brainly.com/question/24793921

Game Changer Technologies has four software teams. Each of them is developing four different examples of its new game app. Which software development methodology is used by the Game Changer teams

Answers

The software development methodology used by the Game Changer teams is called; Prototyping

We are given that;

- Game changer technologies has four software teams

- Each of the teams develops 4 different examples of the new game app.

Now, since each of them is developing four four different examples of its new game app, the method being used is called prototyping. This is because prototyping is referred to as the early approximation of the final system of a product whereby such a product is built, tested and rebuilt if required until an acceptable prototype is achieved.

When the acceptable prototype is gotten, then it will be used to develop its final game app.

Read more about prototype at; https://brainly.com/question/25824140

RAM or RIM is correct?

Answers

RAM is the correct answer

The program allows the user to type in any linux command and then executes that command, such as "pwd" or "echo". The problem is that it should allow multiple commands to be typed in and executed at the same time, but it only allows one at a time currently. Please help fix it so it allows multiple commands to be typed and executed.
Code:
#include
#include
#include
#include
#include
#include
void parse(char *line, char **argv)
{
while (*line != '\0') { /* if not the end of line ....... */
while (*line == ' ' || *line == '\t' || *line == '\n')
*line++ = '\0'; /* replace white spaces with 0 */
*argv++ = line; /* save the argument position */
while (*line != '\0' && *line != ' ' &&
*line != '\t' && *line != '\n')
line++; /* skip the argument until ... */
}
*argv = '\0'; /* mark the end of argument list */
}
void execute(char **argv)
{
pid_t pid;
int status;
if ((pid = fork()) < 0) { /* fork a child process */
printf("*** ERROR: forking child process failed\n");
exit(1);
}
else if (pid == 0) { /* for the child process: */
if (execvp(*argv, argv) < 0) { /* execute the command */
printf("*** ERROR: exec failed\n");
exit(1);
}
}
else { /* for the parent: */
while (wait(&status) != pid) /* wait for completion */
;
}
}
void main(void)
{
char line[1024]; /* the input line */
char *argv[64]; /* the command line argument */
while (1) { /* repeat until done .... */
printf("Enter Shell Command -> "); /* display a prompt */
fgets(line, 1024, stdin); /* read in the command line */
printf("\n");
parse(line, argv); /* parse the line */
if (strcmp(argv[0], "exit") == 0) /* is it an "exit"? */
exit(0); /* exit if it is */
execute(argv); /* otherwise, execute the command */
}
}
This function receives a commend line argument list with the */ /* the first argument being cd and the next argument being the */ /* directory to change.

Answers

Where is the question

in which country was Abacus build
if ur smart don't searh​

Answers

Answer:

Abacus many be built first in China

Explanation:

I know Abacus ^o^

Answer:

Hewo There!!!!

__________________

China- i thinkkk maybe?

__________________

“Hold fast to dreams,

For if dreams die

Life is a broken-winged bird,

That cannot fly.”

― Langston Hughes

__________________

Think of life as a mytery because well it sort of is! You don't know what may happen may be good or bad but be a little curious and get ready for whatever comes your way!! ~Ashlynn

in excel If you have a lengthy text, adding a __________ can change the cell’s format to ________. *

Answers

Based on Microsoft Excel analysis, in excel If you have a lengthy text, adding a Wrap Text can change the cell’s format to high height.

What is Microsoft Excel?

Microsoft Excel is one of the software applications in Microsoft Office. It has cells of rows and columns in which users can easily put facts and figures to carry out tasks.

The function of Wrap Text

Wrap Text is applied in Microsoft Excel to show the cell contents on many lines instead of a single long line.

Hence, in this case, it is concluded that the correct answer is "Wrap Text and High Height."

Learn more about Microsoft Excel here: https://brainly.com/question/24749457

smart art is considered a​

Answers

Explanation:

visual representation of information and ideas, and a chart is a visual illustration of numeric values or data. Basically, SmartArt graphics are designed for text and charts are designed for numbers. Use the information below to decide when to use a SmartArt graphic and when to use a chart.

Read two numbers from user input. Then, print the sum of those numbers.
Hint -- Copy/paste the following code, then just type code where the question marks are to finish the code.
num1 = int(input())
num2 = ?
print(num1 + ?)

Answers

Answer:

First ? - int(input())

Second ? - num2

Explanation:

This works because we are just mimicing the first input in your first variable.

The second one is adding them together.

Don't remember to give me brainliest :)

What unit on a digital camera gives added illusions

Answers

Vfx used for visual effects in the creation on any screen.. imagery that does not physically exist in life. Vfx also allow makers of films to create environments, objects, creature,ect..

What is property in educational technology

Answers

1. It is based on scientific and technological advancements.
2. It is more a practical discipline and less a theoretical one.
3. It is a fast growing modern discipline.
4. It makes use of the research findings of psychology, sociology, engineering, sciences and social psychology etc., and applies the same to the field of education.
5. It brings pupils, teachers and technical means together in an effective way.
6. It is the science of techniques and methods. It locates the problems in the field of education, remedies them and ultimately aims at improving the education system.
7. It is bound to improve the teacher, the learner and the teaching learning process.

displaying advertisements specific or users internet based on their buy preference is called ._________.​

Answers

Targeted advertising       hope it helps

Add comma(s) where needed, if needed.


My birthday October 31 2005 is on Halloween.


My birthday October 31 2005 is on Halloween. (no change)


My birthday October 31, 2005, is on Halloween.


My birthday October 31, 2005 is on Halloween.


My birthday, October 31, 2005, is on Halloween.

Answers

Answer:

My birthday, October 31, 2005, is on Halloween.

Explanation:

The correct option with commas is "My birthday, October 31, 2005, is on Halloween."

Why is this correct?

The revised sentence "My birthday, October 31, 2005, is on Halloween." correctly uses commas to separate the date from the year and to set off the date as an appositive.

This improves clarity and follows proper punctuation rules.

Hence,. The correct option with commas is "My birthday, October 31, 2005, is on Halloween."

Read more about commas here:

https://brainly.com/question/2142088

#SPJ2

In Python which is the correct method to load a module math?

Answers

Answer: The math module is a standard module in Python and is always available. To use mathematical functions under this module, you have to import the module using import math .

Explanation:

BEBE
What options does the Table Tools Layout contextual tab contain? Select three options.
O modify text direction
change font
insert rows and columns
O add border and shading
O split table

Answers

Answer:

Modify text direction.change font, and insert row and coulumns

Explanation:

Answer:

What options does the Table Tools Layout contextual tab contain? Select three options.

modify text direction

insert rows and columns

split table

Explanation:

_____ are extremely _____ data structure’s, used all the time, and there are so many _____ that can handle them to do useful things.
A _____ can be thought of as an array of arrays
•versatile
•functions
•arrays
•matrix

Answers

Answer:

arrays are extremely versatile  data structure’s, used all the time, and there are so many functions that can handle them to do useful things.

A matrix can be thought of as an array of arrays

Answer:

Arrays are extremely versatile data structure's, used all the time, and there are so many functions that can handle them to do useful things.

A matrix can be thought of as an array of arrays.

Happy Holidays

Explanation:

Match the vocabulary to the appropriate definition.
•Organizes data to allow it to be easily retrieved
and read
•Extremely versatile data structures
•Pulling related code together in objects
•Helps programmers when they revisit code or
are new to the code
•Storing code in a centralized servers
*Arrays
*Data Structures
*Hierarchies
*Repository
*Documentation

Answers

Answer:

Pulling related code together in objects is Arrays

Helps programmers when they revisit code or are new to code-- Documentation

Explanation:

This is all I know

Good documentation Helps programmers when they revisit code or are new to the code.

What is good documentation?

Good Documentation is known to be the guidelines that helps one or allows one to follows the steps for  recording raw data entries in a legible, right and reproducible way.

Note that Good documentation Helps programmers when they revisit code or are new to the code.

Learn more about code from

https://brainly.com/question/4514135

#SPJ1

Which of the following Access objects provides a user-friendly data entry method?
Select one:
a. query
b. table
c. form
d. report

Answers

Answer:

Table

Explanation:

Microsoft Access uses an object called a _____ to enter and organize data.

The answer is table.

Brainliest if correct. 3. You are researching ways to boost employee morale for a proposal. How can you
avoid copyright issues when you find materials from outside sources? (1 point)

Answers

To avoid copyright you can give credit to the original author. For example if I copy information that said “all humans are meant to be extinct by 2073” from notarealwebsite.com I shout credit them for this.

Which of the following is an example of power redundancy?
UPS
Backup server
RAID
Fault tolerance

Answers

The correct answer is UPS

write down the application areas of an ICT?​

Answers

Answer:

These are internet, telephone, mobile phone, TV, radio and office automation systems such as word-processing, fax, audio conferencing, video conferencing, computer conferencing, multimedia, etc, through the use of networks of satellite and fiber optics..

Explanation:

hope its help

Filtering is a function of _____.

Answers

The answer is: switches.

Explanation:

Filtering is a function of switches.

I wake up the computer and remind it what to do ​

Answers

Answer:

what's the question or answer you want or is it a joke?

Explanation:

Other Questions
it took ken 2/8 hour to finish a puzzle ken told his mom how long it took with the fraction in simplest form how many hours did ken tell his mom After reading Chapter 19 and the Epilogue and completing the Chapter 19 and Epilogue Notes chart, answer one of the three discussion questions below. Take your time to compose your answer. You may use any notes you have from any part of the book. You can also use your notes on the Chapter 19 and Epilogue Notes chart.Remember the following when answering the question:Use CER and answer in a complete paragraph.Your paragraph should be 7 or more sentences.Check your writing carefully for errors in sentence structure and other grammatical errors before submitting.You will only choose one of the questions to answer. Read all three questions and choose the one that you are most interested in and feel most comfortable answering based on your knowledge of the book.Choose 1A. What qualities/skills (both mental and physical) are most important to survival, alone and without resources? How does Brian convey these qualities/skills?B. How has Brian evolved from Chapter 1 to Epilogue?C. Brian experienced both bad luck and good luck. Discuss how Brians experiences in the wilderness might change the way he deals with bad luck in the future. Verbalize about the function of ovulation "schools should use a wireless network instead of a wired network".discuss this statement.(6 marks) on what interval (s) are f(x) = x3 2x+x+6 decreasing? mystery of the talking fan non living thing sentence 25 added to the difference between Y and 7 Solve to find the value of x: 5(x + 2) = 4x + 5 Will give BRAINLIEST help me to answer this plss In this activity, youll research incidents in which employers disciplined employees for not using social media responsibly. Youll study why employers disciplined these employees and how company social media policies influenced the action taken against them. Youll also create a list of five social media usage rules that you think all workers must follow. Finally, youll write about how youll avoid risky behaviors when using social media. Part A Conduct an Internet search and research at least three instances in which employers disciplined (or fired) employees (who were not at work during the time of posting) for an inappropriate social media posting. Briefly discuss the three instances and explain why the employer fired or punished the employee and how the social media post was inappropriate. In 2013, a State Library received a three-year grant to add 69,678 books to theircollection. During a used book sale, the library sold 430 books. If the collectionnow is five times more than the original number of books, how many books didthe library hold before it received the grant? what type of nations are the greatest sources of greenhouse If you could ask the main character from the Hate U Give, one question, what would it be and why? Grace has schizophrenia. What is the likelihood that her identical twin Joy will also have schizophrenia 3. Shows like Sesame Street are part of the public health model of service delivery. O TrueO False4. Which model of service delivery would focus most on getting a disabled person back into the workforce by focusing on what skills they still have or can develop?O Medical modelO Public health modelO Social service modelO Human service model CAN SOMEONE HELP ME PLEASE ASAP!? Below the time line, list the layers from oldest to youngest please i need help on the question what are some monumental famous things in NYC?