COMPUTER THREATS SECURITY
TYPES OF COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Address, Protocols and Packet attributes
|
|
Address, Protocols and security policies
|
|
Address, policies and Packet attributes
|
|
Network topology, Protocols and data packets
|
Detailed explanation-1: -Explanation: Network administrators can create their own ACL rules based on Address, Protocols and Packet attributes. This is generally done where the specific customised type of data packets need to pass through firewall screening.
Detailed explanation-2: -An access control list (ACL) is a list of rules that specifies which users or systems are granted or denied access to a particular object or system resource. Access control lists are also installed in routers or switches, where they act as filters, managing which traffic can access the network.
Detailed explanation-3: -A packet filtering firewall makes decisions about which network traffic to allow by examining information in the IP packet header such as source and destination addresses, ports, and service protocols. A packet filtering firewall: *Uses ACLs or filter rules to control traffic. *Operates at OSI Layer 3 (Network layer).
Detailed explanation-4: -An ACL works as a stateless firewall. While a stateful firewall examines the contents of network packets, a stateless firewall only checks if the packets follow the defined security rules. ACLs are tables containing access rules found on network interfaces such as routers and switches.