• It is frequently used to protect a computer network from unauthorised access.

  • It is a combination of both, software and hardware devices.

  • It is unable to permit legitimate communication to pass.

  • It permits network transmission based on a set of rules.


It is unable to permit legitimate communication to pass.

New Questions