COMPUTER THREATS SECURITY
WHAT IS A FIREWALL IN NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Downloading a file
|
|
Downloading email
|
|
Downloading a web page
|
|
Performing a name resolution request
|
Detailed explanation-1: -Expert Answer. The ideal way to give access to confidential resources over the internet is by using a virtual private network because encrypting all data ensures a safe connection between the client and server.
Detailed explanation-2: -Which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks? A bastion or sacrificial host is one that is unprotected by a firewall. The term bastion host is used to describe any device fortified against attack (such as a firewall).
Detailed explanation-3: -TFTP (explanation: The trivial file transfer protocol (TFTP) uses TCP/IP port 69. TFTP is a connectionless service for downloading files from a remote system.