When the default policy for the netfilter INPUT chain is set to DROP, why should a rule allowing traffic to localhost exist?

When the default policy for the netfilter INPUT chain is set to DROP, why should a rule allowing traffic to localhost exist?
A . All traffic to localhost must always be allowed
B . It doesn’t matter; netfilter never affects packets addressed to localhost
C . Some applications use the localhost interface to communicate with other applications
D . syslogd receives messages on localhost
E . The iptables command communicates with the netfilter management daemon netfilterd on localhost to create and change packet filter rules

Answer: C

Latest 202-450 Dumps Valid Version with 119 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments