To provide more protection, the ruleset from the preceding problem is modified as follows: a. Describe the
Question:
To provide more protection, the ruleset from the preceding problem is modified as follows:
a. Describe the change.
b. Apply this new ruleset to the same six packets of the preceding problem. Indicate which packets are permitted or denied and which rule is used in each case.
Transcribed Image Text:
Rule Direction A In B Out Out D In E Either [1] Sre Addr Dest Addr Protocol Sre Port Dest Port External TCP Internal TCP Internal TCP External TCP Any Any Internal External External Internal Any >1023 25 >1023 25 Any 25 >1023 25 >1023 Any Action Permit Permit Permit Permit Deny
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 100% (1 review)
a A source port is added to t...View the full answer
Answered By
Aysha Ali
my name is ayesha ali. i have done my matriculation in science topics with a+ . then i got admission in the field of computer science and technology in punjab college, lahore. i have passed my final examination of college with a+ also. after that, i got admission in the biggest university of pakistan which is university of the punjab. i am studying business and information technology in my university. i always stand first in my class. i am very brilliant client. my experts always appreciate my work. my projects are very popular in my university because i always complete my work with extreme devotion. i have a great knowledge about all major science topics. science topics always remain my favorite topics. i am also a home expert. i teach many clients at my home ranging from pre-school level to university level. my clients always show excellent result. i am expert in writing essays, reports, speeches, researches and all type of projects. i also have a vast knowledge about business, marketing, cost accounting and finance. i am also expert in making presentations on powerpoint and microsoft word. if you need any sort of help in any topic, please dont hesitate to consult with me. i will provide you the best work at a very reasonable price. i am quality oriented and i have 5 year experience in the following field.
matriculation in science topics; inter in computer science; bachelors in business and information technology
_embed src=http://www.clocklink.com/clocks/0018-orange.swf?timezone=usa_albany& width=200 height=200 wmode=transparent type=application/x-shockwave-flash_
4.40+
11+ Reviews
14+ Question Solved
Related Book For
Question Posted:
Students also viewed these Computer science questions
-
Based on Westlaw's data on the case Christoff v. Nestl USA, INC., I did the brief case. My question is, is there any need to add and adjust the content and form of the case brief, especially the...
-
Managing Scope Changes Case Study Scope changes on a project can occur regardless of how well the project is planned or executed. Scope changes can be the result of something that was omitted during...
-
SMTP (Simple Mail Transfer Protocol) is the standard protocol for transferring mail between hosts over TCP. A TCP connection is set up between a user agent and a server program.The server listens on...
-
1. What options does Personal Trainer have for developing a new system? What are some specific issues and options that Susan should consider in making a decision? 2. Susan has been asked to prepare a...
-
A geothermal power plant on the Raft river uses isobutane as the working fluid. The fluid enters the reversible adiabatic turbine at 320 F, 805 lbf/in 2 and the condenser exit condition is saturated...
-
Garner Strategy Institute (GSI) presents executive-level training seminars nationally. Eastern University (EU) has approached GSI to present 40 one-week seminars during 2019. This activity level...
-
1. Identify 3 students to play the roles of the employees. Ask these 3 individuals to read their roles below. 2. Identify 1 student to play the role of the president of the social enterprise (Taylor...
-
Hiland Inc. manufactures snowsuits. Hiland is considering purchasing a new sewing machine at a cost of $2.45 million. Its existing machine was purchased five years ago at a price of $1.8 million; six...
-
A. Let the number be presented by the variable "x". Translate the following mathematical phrases/sentences to mathematical symbol. Statement 1. The product of a number and seven is equal to two more...
-
A hacker uses port 25 as the client port on his or her end to attempt to open a connection to your Web proxy server. a. The following packets might be generated: Explain why this attack will succeed,...
-
Table 22.3 shows a sample of a packet filter firewall ruleset for an imaginary network of IP address that range from 192.168.1.0 to 192.168.1.254. Describe the effect of each rule. Table 22.3 Sample...
-
When Holloman applied for a job at Circuit City, she signed a "Dispute Resolution Agreement" (DRA) that stated: "This agreement requires you and Circuit City to arbitrate certain legal disputes...
-
1. Why is it important professionalize the practice of psychology in the Philippines through regulation? 2. What impact does it have on the future of philippine psychology? 3. What importance does...
-
What is Cognitive Psychology and explain the benefits of it?? Also, who is one of the most influential people in cognitive psychology?
-
To improve the effectiveness of its teaching staff, the administration of a high school offered the opportunity for all teachers to participate in a workshop. They were not required to attend;...
-
A bank is currently undercapitalized in terms of its Tier 1 capital (i.e., not meeting the minimum capital requirement) according to the Basel III capital requirement, what can the bank do to meet...
-
You are an auditor for Woodson and Sons, a manufacturing company that is concerned about fraud activities in its procurement and inventory management processes. The company has been experiencing...
-
Timmons Company had a beginning inventory on January 1 of 100 units of Product SXL at a cost of $20 per unit. During the year, purchases were: Mar. 15 300 units at $23 July 20 250 units at $25 Sept....
-
I frequently use NY Times and CNN and am aware of Fox News but I never use it. I visit these sites, NY Times and CNN, a few times a week whenever I have to research something or see something on...
-
The program execution of Figure 3.5 is described in the text using six steps. Expand this description to show the use of the MAR and MBR. Memory CPU registers Memory CPU registers 3 0 0PC300 1 9 4 0...
-
Consider a hypothetical 32-bit microprocessor having 32-bit instructions composed of two fields: the first byte contains the opcode and the remainder the immediate operand or an operand address. a....
-
Consider a hypothetical microprocessor generating a 16-bit address (for example, assume that the program counter and the address registers are 16 bits wide) and having a 16-bit data bus. a. What is...
-
Company Bongo has $1,000,000 in extra cash beyond what it needs for continuing operations. Bongo decides to pay the excess cash out to stockholders as a dividend. Company Tango has $1,000,000 in...
-
A car is parked uphill on a sloped street. How would you draw the force diagram to illustrate all of the forces acting on this car to keep it parked on the slope? (Hint: Don't forget to think about...
-
What a response to a peer that states A company's capital structure can be determined by opportunity cost analysis. An organization must compensate its shareholders or lenders when it issues equity...
Study smarter with the SolutionInn App