Which of the following security devices can be replicated on a Linux based computer using IP
tables to inspect and properly handle network based traffic?
A.
Sniffer
B.
Router
C.
Firewall
D.
Switch
Explanation:
Which of the following security devices can be replicated on a Linux based computer using IP
tables to inspect and properly handle network based traffic?
Which of the following security devices can be replicated on a Linux based computer using IP
tables to inspect and properly handle network based traffic?
A.
Sniffer
B.
Router
C.
Firewall
D.
Switch
Explanation: