Which of the following security devices can be replicated on a Linux based computer using IP tables to inspect and properly handle network based traffic?

Which of the following security devices can be replicated on a Linux based computer using IP
tables to inspect and properly handle network based traffic?

Which of the following security devices can be replicated on a Linux based computer using IP
tables to inspect and properly handle network based traffic?

A.
Sniffer

B.
Router

C.
Firewall

D.
Switch

Explanation:
Ip tables are a user-space application program that allows a system administrator to configure the
tables provided by the Linux kernel firewall and the chains and rules it stores.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

5 × two =