Multiple Choice
Network administrators can create their own ACL rules based on _______ ________ and _______
A) address, protocols and packet attributes
B) address, protocols and security policies
C) address, policies and packet attributes
D) network topology, protocols and data packets
Correct Answer:

Verified
Correct Answer:
Verified
Q13: If anyone publishes sexually explicit type digital
Q14: Any digital content which any individual creates
Q15: Accessing Wi-Fi dishonestly is a cyber-crime.
Q16: Packet filtering firewalls work effectively in _
Q17: Cracking digital identity of any individual or
Q19: Using spy cameras in malls and shops
Q20: IT Act 2008 make cyber-crime details more
Q21: Cyber-crime can be categorized into _ types.<br>A)4<br>B)3<br>C)2<br>D)6
Q22: Section 79 of the Indian IT Act
Q23: Packet filtering firewalls are vulnerable to _<br>A)hardware