This firewall technique utilizes a table of established connections to determine the validity of incoming messages. A. deep packet inspection B. header packet filtering C. static packet filtering D. message packet filtering E. none of the other listed answers are correct
This firewall technique utilizes a table of established connections to determine the validity of incoming
messages.
A. deep packet inspection
B. header packet filtering
C. static packet filtering
D. message packet filtering
E. none of the other listed answers are correct