FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A FIREWALL IN NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What do the following rules do?a) iptables-A INPUT-s 221.194.47.0/24-j REJECTb) iptables-D INPUT-s 221.194.47.0/24-j REJECT
A
a )adds the rule in the input chain; b) deletes the rule from the chain
B
a ) adds the rule in the input chain; b) added the rule in the destination chain
C
a ) adds the rule in the input chain; b) added the rule in the destination chain
D
None of the above
Explanation: 

Detailed explanation-1: -iptables is a user-space utility program that allows a system administrator to configure the IP packet filter rules of the Linux kernel firewall, implemented as different Netfilter modules. The filters are organized in different tables, which contain chains of rules for how to treat network traffic packets.

Detailed explanation-2: -IPTables Rules Rules are placed within a specific chain of a specific table. As each chain is called, the packet in question will be checked against each rule within the chain in order. Each rule has a matching component and an action component.

Detailed explanation-3: -Basic concepts. iptables is used to inspect, modify, forward, redirect, and/or drop IP packets. The code for filtering IP packets is already built into the kernel and is organized into a collection of tables, each with a specific purpose.

There is 1 question to complete.