Which of the following security devices can be replicated on a Linux based computer using IP
tables to inspect and properly handle network based traffic?

A.
Sniffer
B.
Router
C.
Firewall
D.
Switch
Explanation:
Ip tables are a user-space application program that allows a system administrator to configure the
tables provided by the Linux kernel firewall and the chains and rules it stores.
firewall
0
0