Which of the following security devices can be replicated on a Linux based computer using IP
tables to inspect and properly handle network based traffic?
A.
Sniffer
B.
Router
C.
Firewall
D.
Switch
Which of the following security devices can be replicated on a Linux based computer using IP
tables to inspect and properly handle network based traffic?
Which of the following security devices can be replicated on a Linux based computer using IP
tables to inspect and properly handle network based traffic?
A.
Sniffer
B.
Router
C.
Firewall
D.
Switch