Deck 7: Designing a Secure Wireless Network

ملء الشاشة (f)
exit full mode
سؤال
____ IP addresses are designed to be used only on a private internal network and cannot be used on the Internet.

A) Public
B) Routable
C) Routing
D) Private
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
____ are usually created by grouping together computers by Internet protocol (IP) addresses.

A) Segment domains
B) Collision domains
C) Subnets
D) Network segments
سؤال
____ is used to create smaller segments for security purposes.

A) CSMA/CA
B) CSMA/CD
C) Ethernet
D) Segmentation
سؤال
In a standard wired Ethernet network, all devices share the same media and a device can send a packet at any time rather than in a fixed or predictable fashion (known as ____ networking).

A) deterministic
B) sequential
C) polling
D) non-deterministic
سؤال
One standard for marking VLAN packets is the IEEE ____ standard.

A) 802.1q
B) 802.1r
C) 802.1v
D) 802.1z
سؤال
Security by obscurity is sometimes criticized as being too weak.
سؤال
IEEE 802.11 WLANs have more collisions than wired Ethernet networks.
سؤال
When a sending device on a LAN sends a packet that is intended for a single receiving device it is known as a ____ transmission.

A) multicast
B) unicast
C) broadcast
D) linecast
سؤال
____ is the practice of dividing the network into smaller units.

A) Switching
B) Segmentation
C) VLANs
D) Filtering
سؤال
Sending a packet to all network devices is called a ____ transmission.

A) unicast
B) multicast
C) broadcast
D) singlecast
سؤال
When using a single wireless gateway for SOHO or home use that has an internal firewall, it is always possible to set up the AP outside the protection of the firewall.
سؤال
A ____ is designed to prevent malicious packets from entering the network or computer.

A) firewall
B) switch
C) hub
D) repeater
سؤال
Limiting consists of placing a password on a system to keep unauthorized persons out.
سؤال
VLANs do not require that all of the devices be physically located together.
سؤال
A firewall is sometimes called a ____.

A) bridge
B) hub
C) packet filter
D) repeater
سؤال
____ keeps a record of the state of a connection between an internal computer and an external server and then makes decisions based on the connection as well as the rule base.

A) Stateful packet filtering
B) Stateless packet filtering
C) Hubs
D) Stateful hubs
سؤال
____ looks at the incoming packet and permits or denies it based strictly on the rule base.

A) Stateful packet filtering
B) Stateless packet filtering
C) Hubs
D) Stateful hubs
سؤال
The area that encompasses all of the network devices that can cause collisions is known as the ____.

A) collision domain
B) broadcast domain
C) unicast domain
D) multicast domain
سؤال
With ____, instead of giving each outgoing packet a different IP address, each packet is given the same IP address but a different port number.

A) CSMA/CA
B) NAT
C) PAT
D) CSMA/CD
سؤال
____ replaces the sender's actual IP address with another IP address.

A) CSMA/CA
B) NAT
C) CSMA/CD
D) HTTP
سؤال
Why is diversity necessary to provide better security?
سؤال
Why should information security system be as simple as possible?
سؤال
What are some of the advantages of using NAT?
سؤال
Briefly describe how to create wireless VLANs using switches.
سؤال
A network ____________________ is a subset of a larger network.
سؤال
____________________ are the air-handling spaces above drop ceilings used to circulate and otherwise handle air in a building.
سؤال
____ are designed to protect a device's network ports, or endpoints of communication.

A) Firewalls
B) Switches
C) Hubs
D) Repeaters
سؤال
How can you create network segments in a wired network?
سؤال
A(n) ____________________ is a logical grouping of network devices within a larger network.
سؤال
____ means that a single cable is used to support multiple virtual LANs.

A) Filtering
B) Broadcasting
C) Unicasting
D) Trunking
سؤال
What are the benefits of limiting access to information?
سؤال
In addition to a hardware firewall that protects the network, each wireless device should have its own software firewall installed, sometimes known as a(n) ____.

A) antivirus firewall
B) antispyware software
C) patch software
D) personal firewall
سؤال
Antivirus software definition files are also known as ____ files.

A) signature
B) infection
C) document
D) defense
سؤال
The Cisco Systems' ____ protocol is an alternative to IEEE 802.1q.

A) TPID
B) CRC
C) ISL
D) TCI
سؤال
The drawback of antivirus software is that its ____ must be continuously updated to recognize new viruses.

A) CRC files
B) definition files
C) TPID files
D) infection files
سؤال
What are the benefits of layering security?
سؤال
A(n) ____________________ is a separate network that sits outside the secure network perimeter and is protected by a firewall.
سؤال
What is security by obscurity?
سؤال
The foundation of a firewall is a(n) ____________________.
سؤال
What are some of the features and tools provided by antispyware products?
سؤال
How does Microsoft classify patches?
سؤال
Match between columns
the best defense against viruses.
Segmentation
the best defense against viruses.
Patch software
the best defense against viruses.
Broadcast domain
the best defense against viruses.
Rule base
the best defense against viruses.
Rootkit
the best defense against viruses.
Browser Restore
the best defense against viruses.
Hardware firewalls
the best defense against viruses.
Antivirus software
the best defense against viruses.
Antispyware
area in which a broadcast occurs.
Segmentation
area in which a broadcast occurs.
Patch software
area in which a broadcast occurs.
Broadcast domain
area in which a broadcast occurs.
Rule base
area in which a broadcast occurs.
Rootkit
area in which a broadcast occurs.
Browser Restore
area in which a broadcast occurs.
Hardware firewalls
area in which a broadcast occurs.
Antivirus software
area in which a broadcast occurs.
Antispyware
usually located outside the network security perimeter as the first line of defense.
Segmentation
usually located outside the network security perimeter as the first line of defense.
Patch software
usually located outside the network security perimeter as the first line of defense.
Broadcast domain
usually located outside the network security perimeter as the first line of defense.
Rule base
usually located outside the network security perimeter as the first line of defense.
Rootkit
usually located outside the network security perimeter as the first line of defense.
Browser Restore
usually located outside the network security perimeter as the first line of defense.
Hardware firewalls
usually located outside the network security perimeter as the first line of defense.
Antivirus software
usually located outside the network security perimeter as the first line of defense.
Antispyware
software security updates that vendors provide for their application programs and operating systems.
Segmentation
software security updates that vendors provide for their application programs and operating systems.
Patch software
software security updates that vendors provide for their application programs and operating systems.
Broadcast domain
software security updates that vendors provide for their application programs and operating systems.
Rule base
software security updates that vendors provide for their application programs and operating systems.
Rootkit
software security updates that vendors provide for their application programs and operating systems.
Browser Restore
software security updates that vendors provide for their application programs and operating systems.
Hardware firewalls
software security updates that vendors provide for their application programs and operating systems.
Antivirus software
software security updates that vendors provide for their application programs and operating systems.
Antispyware
originally used to reduce the amount of traffic on a network.
Segmentation
originally used to reduce the amount of traffic on a network.
Patch software
originally used to reduce the amount of traffic on a network.
Broadcast domain
originally used to reduce the amount of traffic on a network.
Rule base
originally used to reduce the amount of traffic on a network.
Rootkit
originally used to reduce the amount of traffic on a network.
Browser Restore
originally used to reduce the amount of traffic on a network.
Hardware firewalls
originally used to reduce the amount of traffic on a network.
Antivirus software
originally used to reduce the amount of traffic on a network.
Antispyware
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Segmentation
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Patch software
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Broadcast domain
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Rule base
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Rootkit
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Browser Restore
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Hardware firewalls
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Antivirus software
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Antispyware
helps prevent computers from becoming infected by different types of spyware.
Segmentation
helps prevent computers from becoming infected by different types of spyware.
Patch software
helps prevent computers from becoming infected by different types of spyware.
Broadcast domain
helps prevent computers from becoming infected by different types of spyware.
Rule base
helps prevent computers from becoming infected by different types of spyware.
Rootkit
helps prevent computers from becoming infected by different types of spyware.
Browser Restore
helps prevent computers from becoming infected by different types of spyware.
Hardware firewalls
helps prevent computers from becoming infected by different types of spyware.
Antivirus software
helps prevent computers from becoming infected by different types of spyware.
Antispyware
allows the user to restore specific browser settings if spyware infects the Web browser.
Segmentation
allows the user to restore specific browser settings if spyware infects the Web browser.
Patch software
allows the user to restore specific browser settings if spyware infects the Web browser.
Broadcast domain
allows the user to restore specific browser settings if spyware infects the Web browser.
Rule base
allows the user to restore specific browser settings if spyware infects the Web browser.
Rootkit
allows the user to restore specific browser settings if spyware infects the Web browser.
Browser Restore
allows the user to restore specific browser settings if spyware infects the Web browser.
Hardware firewalls
allows the user to restore specific browser settings if spyware infects the Web browser.
Antivirus software
allows the user to restore specific browser settings if spyware infects the Web browser.
Antispyware
establishes what action the firewall should take when it receives a packet.
Segmentation
establishes what action the firewall should take when it receives a packet.
Patch software
establishes what action the firewall should take when it receives a packet.
Broadcast domain
establishes what action the firewall should take when it receives a packet.
Rule base
establishes what action the firewall should take when it receives a packet.
Rootkit
establishes what action the firewall should take when it receives a packet.
Browser Restore
establishes what action the firewall should take when it receives a packet.
Hardware firewalls
establishes what action the firewall should take when it receives a packet.
Antivirus software
establishes what action the firewall should take when it receives a packet.
Antispyware
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Designing a Secure Wireless Network
1
____ IP addresses are designed to be used only on a private internal network and cannot be used on the Internet.

A) Public
B) Routable
C) Routing
D) Private
D
2
____ are usually created by grouping together computers by Internet protocol (IP) addresses.

A) Segment domains
B) Collision domains
C) Subnets
D) Network segments
C
3
____ is used to create smaller segments for security purposes.

A) CSMA/CA
B) CSMA/CD
C) Ethernet
D) Segmentation
D
4
In a standard wired Ethernet network, all devices share the same media and a device can send a packet at any time rather than in a fixed or predictable fashion (known as ____ networking).

A) deterministic
B) sequential
C) polling
D) non-deterministic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
One standard for marking VLAN packets is the IEEE ____ standard.

A) 802.1q
B) 802.1r
C) 802.1v
D) 802.1z
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
Security by obscurity is sometimes criticized as being too weak.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
IEEE 802.11 WLANs have more collisions than wired Ethernet networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
When a sending device on a LAN sends a packet that is intended for a single receiving device it is known as a ____ transmission.

A) multicast
B) unicast
C) broadcast
D) linecast
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
____ is the practice of dividing the network into smaller units.

A) Switching
B) Segmentation
C) VLANs
D) Filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
Sending a packet to all network devices is called a ____ transmission.

A) unicast
B) multicast
C) broadcast
D) singlecast
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
When using a single wireless gateway for SOHO or home use that has an internal firewall, it is always possible to set up the AP outside the protection of the firewall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
A ____ is designed to prevent malicious packets from entering the network or computer.

A) firewall
B) switch
C) hub
D) repeater
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
Limiting consists of placing a password on a system to keep unauthorized persons out.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
VLANs do not require that all of the devices be physically located together.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
A firewall is sometimes called a ____.

A) bridge
B) hub
C) packet filter
D) repeater
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
____ keeps a record of the state of a connection between an internal computer and an external server and then makes decisions based on the connection as well as the rule base.

A) Stateful packet filtering
B) Stateless packet filtering
C) Hubs
D) Stateful hubs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
____ looks at the incoming packet and permits or denies it based strictly on the rule base.

A) Stateful packet filtering
B) Stateless packet filtering
C) Hubs
D) Stateful hubs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
The area that encompasses all of the network devices that can cause collisions is known as the ____.

A) collision domain
B) broadcast domain
C) unicast domain
D) multicast domain
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
With ____, instead of giving each outgoing packet a different IP address, each packet is given the same IP address but a different port number.

A) CSMA/CA
B) NAT
C) PAT
D) CSMA/CD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
____ replaces the sender's actual IP address with another IP address.

A) CSMA/CA
B) NAT
C) CSMA/CD
D) HTTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
Why is diversity necessary to provide better security?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
Why should information security system be as simple as possible?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
What are some of the advantages of using NAT?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
Briefly describe how to create wireless VLANs using switches.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
A network ____________________ is a subset of a larger network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
____________________ are the air-handling spaces above drop ceilings used to circulate and otherwise handle air in a building.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
____ are designed to protect a device's network ports, or endpoints of communication.

A) Firewalls
B) Switches
C) Hubs
D) Repeaters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
How can you create network segments in a wired network?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
A(n) ____________________ is a logical grouping of network devices within a larger network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
____ means that a single cable is used to support multiple virtual LANs.

A) Filtering
B) Broadcasting
C) Unicasting
D) Trunking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
What are the benefits of limiting access to information?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
In addition to a hardware firewall that protects the network, each wireless device should have its own software firewall installed, sometimes known as a(n) ____.

A) antivirus firewall
B) antispyware software
C) patch software
D) personal firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
Antivirus software definition files are also known as ____ files.

A) signature
B) infection
C) document
D) defense
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
The Cisco Systems' ____ protocol is an alternative to IEEE 802.1q.

A) TPID
B) CRC
C) ISL
D) TCI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
The drawback of antivirus software is that its ____ must be continuously updated to recognize new viruses.

A) CRC files
B) definition files
C) TPID files
D) infection files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
What are the benefits of layering security?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
A(n) ____________________ is a separate network that sits outside the secure network perimeter and is protected by a firewall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
What is security by obscurity?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
The foundation of a firewall is a(n) ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
What are some of the features and tools provided by antispyware products?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
How does Microsoft classify patches?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
the best defense against viruses.
Segmentation
the best defense against viruses.
Patch software
the best defense against viruses.
Broadcast domain
the best defense against viruses.
Rule base
the best defense against viruses.
Rootkit
the best defense against viruses.
Browser Restore
the best defense against viruses.
Hardware firewalls
the best defense against viruses.
Antivirus software
the best defense against viruses.
Antispyware
area in which a broadcast occurs.
Segmentation
area in which a broadcast occurs.
Patch software
area in which a broadcast occurs.
Broadcast domain
area in which a broadcast occurs.
Rule base
area in which a broadcast occurs.
Rootkit
area in which a broadcast occurs.
Browser Restore
area in which a broadcast occurs.
Hardware firewalls
area in which a broadcast occurs.
Antivirus software
area in which a broadcast occurs.
Antispyware
usually located outside the network security perimeter as the first line of defense.
Segmentation
usually located outside the network security perimeter as the first line of defense.
Patch software
usually located outside the network security perimeter as the first line of defense.
Broadcast domain
usually located outside the network security perimeter as the first line of defense.
Rule base
usually located outside the network security perimeter as the first line of defense.
Rootkit
usually located outside the network security perimeter as the first line of defense.
Browser Restore
usually located outside the network security perimeter as the first line of defense.
Hardware firewalls
usually located outside the network security perimeter as the first line of defense.
Antivirus software
usually located outside the network security perimeter as the first line of defense.
Antispyware
software security updates that vendors provide for their application programs and operating systems.
Segmentation
software security updates that vendors provide for their application programs and operating systems.
Patch software
software security updates that vendors provide for their application programs and operating systems.
Broadcast domain
software security updates that vendors provide for their application programs and operating systems.
Rule base
software security updates that vendors provide for their application programs and operating systems.
Rootkit
software security updates that vendors provide for their application programs and operating systems.
Browser Restore
software security updates that vendors provide for their application programs and operating systems.
Hardware firewalls
software security updates that vendors provide for their application programs and operating systems.
Antivirus software
software security updates that vendors provide for their application programs and operating systems.
Antispyware
originally used to reduce the amount of traffic on a network.
Segmentation
originally used to reduce the amount of traffic on a network.
Patch software
originally used to reduce the amount of traffic on a network.
Broadcast domain
originally used to reduce the amount of traffic on a network.
Rule base
originally used to reduce the amount of traffic on a network.
Rootkit
originally used to reduce the amount of traffic on a network.
Browser Restore
originally used to reduce the amount of traffic on a network.
Hardware firewalls
originally used to reduce the amount of traffic on a network.
Antivirus software
originally used to reduce the amount of traffic on a network.
Antispyware
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Segmentation
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Patch software
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Broadcast domain
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Rule base
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Rootkit
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Browser Restore
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Hardware firewalls
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Antivirus software
set of software tools used by an attacker to break into a computer and obtain special operating system privileges.
Antispyware
helps prevent computers from becoming infected by different types of spyware.
Segmentation
helps prevent computers from becoming infected by different types of spyware.
Patch software
helps prevent computers from becoming infected by different types of spyware.
Broadcast domain
helps prevent computers from becoming infected by different types of spyware.
Rule base
helps prevent computers from becoming infected by different types of spyware.
Rootkit
helps prevent computers from becoming infected by different types of spyware.
Browser Restore
helps prevent computers from becoming infected by different types of spyware.
Hardware firewalls
helps prevent computers from becoming infected by different types of spyware.
Antivirus software
helps prevent computers from becoming infected by different types of spyware.
Antispyware
allows the user to restore specific browser settings if spyware infects the Web browser.
Segmentation
allows the user to restore specific browser settings if spyware infects the Web browser.
Patch software
allows the user to restore specific browser settings if spyware infects the Web browser.
Broadcast domain
allows the user to restore specific browser settings if spyware infects the Web browser.
Rule base
allows the user to restore specific browser settings if spyware infects the Web browser.
Rootkit
allows the user to restore specific browser settings if spyware infects the Web browser.
Browser Restore
allows the user to restore specific browser settings if spyware infects the Web browser.
Hardware firewalls
allows the user to restore specific browser settings if spyware infects the Web browser.
Antivirus software
allows the user to restore specific browser settings if spyware infects the Web browser.
Antispyware
establishes what action the firewall should take when it receives a packet.
Segmentation
establishes what action the firewall should take when it receives a packet.
Patch software
establishes what action the firewall should take when it receives a packet.
Broadcast domain
establishes what action the firewall should take when it receives a packet.
Rule base
establishes what action the firewall should take when it receives a packet.
Rootkit
establishes what action the firewall should take when it receives a packet.
Browser Restore
establishes what action the firewall should take when it receives a packet.
Hardware firewalls
establishes what action the firewall should take when it receives a packet.
Antivirus software
establishes what action the firewall should take when it receives a packet.
Antispyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.