in Education by
Network administrators can create their own ACL rules based on _______ ________ and _______ (a) Address, Protocols and Packet attributes (b) Address, Protocols and security policies (c) Address, policies and Packet attributes (d) Network topology, Protocols and data packets I had been asked this question in a national level competition. The origin of the question is Firewalls topic in chapter Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Correct option is (a) Address, Protocols and Packet attributes The explanation: Network administrators can create their own ACL rules based on Address, Protocols and Packet attributes. This is generally done where the specific customised type of data packets need to pass through firewall screening.

Related questions

0 votes
    There are __________ types of exploits based on their working. (a) two (b) three (c) four (d) five This ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    How many types of exploits are there based on their nature from hacking's perspective? (a) 4 (b) 3 (c) 2 ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    ACL stands for _____________ (a) Access Condition List (b) Anti-Control List (c) Access Control Logs (d) Access ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    When a packet does not fulfil the ACL criteria, the packet is _________ (a) resend (b) dropped (c) destroyed ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    In _______ phase, the hackers try to hide their footprints. (a) Scanning (b) Tracks clearing (c) Reconnaissance ( ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    _______ technology is used for analyzing and monitoring traffic in network and information flow. (a) Cloud access security ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Existence of weakness in a system or network is called _______ (a) Threat (b) Vulnerability (c) Exploit (d) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
0 votes
    Old operating systems like _______ and NT-based systems have buffer-overflow attack a common vulnerability. (a) Windows 7 ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    The __________ defines the packet filtering firewall rules. (a) Access Control List (b) Protocols (c) Policies (d ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    ______________ are difficult to identify as they keep on changing their type and signature. (a) Non-resident ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Illicit hackers may enter your personal area or room or cabin to steal your laptop, pen drive, documents or other ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
...