I found this in the Package Rules menu:

1 Answer

Answer :

answer:

Related questions

Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Description : Is it possible to block all traffic on a certain port except to two IP addresses?

Last Answer : It depends upon how flexible your router is. Use the router firmware to set this up. If your firmware isn’t sophisticated enough, try to find something like DWT or another good third-party router firmware program to update the one you have.

Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : c. i, ii, iii, iv 

Description : A firewall is a network security system ______based that controls incoming and outgoing network traffic based on a set of rules: a) Hardware b) Software c) Both hardware or software d) None of These

Last Answer : c) Both hardware or software

Description : Is there a way to block all IP addresses from a certain state from visiting a website?

Last Answer : Um, why? If you don’t mind my asking…

Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii 

Description : The first type of firewall was the packet filter which looks at: a) network addresses b) Ports of the packet and determines if that packet should be allowed or blocked c) Both of above d) None of These

Last Answer : c) Both of above

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : Which of the following factors have an impact on the google pagerank?  A. The Total Number Of Inbound Links To A Page Of A Web Site  B.The Text Used To Describe The Inbound Link To A Page Of ... D.The Number Of Outbound Links On The Page That Contains The Inbound Link To A Page Of A Web Site

Last Answer : A. The Total Number Of Inbound Links To A Page Of A Web Site

Description : Which of the following factors are responsible for leaving an impact on the Google PageRank? a. The text depicting inbound links to a page of a website. b. A total number of inbound links to a ... The number of outbound links on the page that contains the inbound link to a page of a website.

Last Answer : b. A total number of inbound links to a website's page

Description : Which of the following factors have an impact on the Google PageRank? A. The text used to describe the inbound link to a page of a web site B. The total number of inbound links to a page of a ... D. The number of outbound links on the page that contains the inbound link to a page of a web site

Last Answer : B. The total number of inbound links to a page of a web site

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1) Application layer Firewall 2) Packet Filtering Firewall 3) Router enhanced firewall 4) IP enabled firewall

Last Answer : 2) Packet Filtering Firewall

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 Application layer Firewall 2 Packet Filtering Firewall 3 Router enhanced firewall 4 IP enabled firewall

Last Answer : 2 Packet Filtering Firewall

Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Firewall as part of a router program a. filters only packets coming from internet b. filters only packets going to internet c. filters packets travelling from and to the intranet from the internet d. ensures rapid traffic of packets for speedy e-Commerce

Last Answer : c. filters packets travelling from and to the intranet from the internet 

Description : What antiviral software should I replace Kaspersky with?

Last Answer : Sorry to add this important information as an answer. The less than holy sites I visit are all accessed on my Android tablet. I never use my PC for that. I'm researching total security suites. But really, I ... for my PC is all I need. Maybe I need a security suite so I can add my tablet. Thoughts?

Description : Will I lose one account of Kaspersky if I reset my PC?

Last Answer : answer:It should still be the same comp, regardless of its operating system. I think its IP identity stays the same (unless it's dynamic), and that's usually what identifies a comp. Try running ipconfig ... . If you have a backup copy of Kaspersky, reload it from that copy's device after the update.

Description : Symantec Endpoint Protection, NOD32 or Kaspersky?

Last Answer : This is gonna sound weird, but do you torrents or limewire at all? Because, NOD32 is great for that and general virus protection, im my personal opinion. (SEP), i haven't tried yet, so i cant tell ... it, on the other hand, kaspersky is also nice, its more user friendly, but not as powerful as NOD32

Description : is avg better than kaspersky

Last Answer : Need Answer

Description : Can e-mail addresses & other personal informations be traced through your IP address?

Last Answer : In most cases, no. You are likely to be using a dynamic IP address that is changing. You could be traced to the owner of the IP block from which it was allocated (almost certainly your ISP ... d have to be doing something seriously bad before anyone would allocate the time and resources to find you.

Description : Is there a way to identify proxy IP addresses?

Last Answer : Any server can be set up as a proxy server with the right tweaking and tools, and there are a bunch of free ones out there. Just search google for free proxy server . They'll let you browse the web ... the FBI (probably) does it all the time, so it's definitely possible. Sorry I'm not much help!

Description : Is there a way to identify proxy IP addresses?

Last Answer : Any server can be set up as a proxy server with the right tweaking and tools, and there are a bunch of free ones out there. Just search google for free proxy server . They'll let you browse the web ... the FBI (probably) does it all the time, so it's definitely possible. Sorry I'm not much help!

Description : How do I determine which, if any, static IP addresses are being used on my home WiFi network?

Last Answer : Check the status page of your Router setup.

Description : Strange/multiple IP addresses from my iphone. Normal or hacked?

Last Answer : Google has servers all over the place. I don’t think you ever know where communications with them are going to seem like they are coming from.

Description : What happens to ip addresses if there are over 4,23 billion internet users.

Last Answer : answer:IPv6 This is planned for. I wouldn’t worry about it.

Description : IP addresses are converted into (a) a binary string (b) alphanumeric string -Technology

Last Answer : (c) DNS translates domain names into their IP addresses and vice-versa.

Description : SHOULD OLD/DORMANT EMAIL ADDRESSES BE DELETED FROMCURRENT IP?

Last Answer : Need Answer

Description : Membership in a VLAN can be based on _________. A) port numbers B) MAC addresses C) IP addresses D) all of theabove

Last Answer : all of theabove

Description : The logicaladdresses in theInternetarecalled _______ addresses. A) port B) IP C) Email D) noneof the above

Last Answer : IP

Description : Which form of byte assigning strategy is adopted in class B type of network corresponding to IP addresses? a. Network.Node.Node.Node b. Network.Network.Node.Node c. Network.Network.Network.Node d. Network.Node.Node.Node

Last Answer : b. Network.Network.Node.Node

Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? a. ARQ (Automatic Repeat Request) b. ARP (Address Resolution Protocol) c. SLIP (Serial Line Internet Protocol) d. PLIP (Parallel Line Internet Protocol)

Last Answer : b. ARP (Address Resolution Protocol)

Description : To avoid ambiguity, the names assigned to machines must be carefully selected from a ______ with complete control over the binding between the names and IP addresses A. Table B. look up table C. name space D. name table

Last Answer : C. name space

Description : The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ A. UDP addresses B. transport addresses C. port addresses D. none of the above

Last Answer : C. port addresses

Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? A. ARQ Automatic Repeat Request B. ARP Address Resolution Protocol C. SLIP Serial Line Internet Protocol D. PLIP Parallel Line Internet Protocol

Last Answer : B. ARP Address Resolution Protocol

Description : Due to the growth of the internet and the predicted depletion of available addresses, a new version of IP version 6 using _____for the address was developed in 1995: a) 128 Bits b) 129 Bits c) 130 Bits d) None of These

Last Answer : a) 128 Bits

Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Due to the growth of the internet and the predicted depletion of available addresses, a new version of IP version 6 using _____for the address was developed in 1995: a) 128 Bits b) 129 Bits c) 130 Bits d) None of These

Last Answer : a) 128 Bits

Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these

Last Answer : a) Cybergaming crime

Description : VLANs and IP addresses resources are made available to end user via? A. Server virtualization. B. Client virtualization. C. End-user virtualization. D. IaaS

Last Answer : Server virtualization

Description : Mention what are the networking options used in OpenStack a. Flat Network Manager: IP addresses for VM instances are fetched from the subnet, and then injected into the image on launch b. Flat DHCP Network ... is started for each VLAN to pass out IP addresses to VM instances. d. All of the above

Last Answer : All of the above

Description : Mention what are the networking options used in OpenStack a. Flat Network Manager: IP addresses for VM instances are fetched from the subnet, and then injected into the image on launch b. Flat DHCP Network ... is started for each VLAN to pass out IP addresses to VM instances. d. All of the above

Last Answer : All of the above

Description : There are two processes to pair MAC address with IP addresses. Which process finds an IP address from a MAC address? * RARP * ARP * RIP * IGRP

Last Answer : Correct answer: A ARP (Address Resolution Protocol) maps an IP address to the MAC address, RARP (Reverse Address Resolution Protocol) maps the MAC address to the IP address. ARP and RARP work at the internet layer of the Internet Model or the network layer of the OSI model.

Description : Which IP Address Class is INCORRECTLY paired with its range of network numbers? * Class A addresses include 192.0.0.0 through 223.255.255.0 * Class A addresses include 1.0.0.0 through 126.0.0.0 * Class B ... 192.0.0.0 through 223.255.255.0 * Class D addresses include 224.0.0.0 through 239.255.255.0

Last Answer : 1

Description : ………………….. is responsible for converting the higher level protocol addresses (IP addresses) to physical network addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)

Description : 8. Nslookup can be used to gather information regarding which of the following? A. Host names and IP addresses B. Whois information C. DNS server locations D. Name server types and operating systems

Last Answer : A. Host names and IP addresses

Description : To whom is the IP addresses were traced ? a. Internet Service Provider b. Cyber Crime Office c. Only (a) d. None of the above

Last Answer : a. Internet Service Provider

Description : Which of the following addresses is used to deliver a message to the correct application program running on a host? (A) Port (B) IP (C) Logical (D) Physical

Last Answer : (A) Port 

Description : In a classful addressing, the IP addresses with 0 (zero) as network number: (A) refers to the current network (B) refers to broadcast on the local network (C) refers to broadcast on a distant network (D) refers to loopback testing

Last Answer : (A) refers to the current network