Which of the following security devices can be replicated on a Linux based computer using IP
tables to inspect and properly handle network based traffic?
 
A.
 Sniffer
B.
 Router
C.
 Firewall
D.
 Switch  
Explanation:
Ip tables are a user-space application program that allows a system administrator to configure the
tables provided by the Linux kernel firewall and the chains and rules it stores.
 
                