FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A FIREWALL IN NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
When designing a firewall, what is the recommended approach for opening and closing ports?
A
Close all ports; open ports 20, 21, 53, 80, and 443.
B
Close all ports
C
Close all ports; open only ports required by applications inside the DMZ.
D
Open all ports; close ports that expose common network attacks.
E
Open all ports; close ports that show improper traffic or attacks in progress.
Explanation: 

Detailed explanation-1: -Note: Each OSI Layer can be used once, more than once, or not at all. When designing a firewall, what is the recommended approach for opening and closing ports?-close all ports; open 20, 21, 53, 80, and 443.-open all ports; close ports that show improper traffic or attacks in progress.

Detailed explanation-2: -The goal of a DMZ is to add an extra layer of security to an organization’s local area network. A protected and monitored network node that faces outside the internal network can access what is exposed in the DMZ, while the rest of the organization’s network is safe behind a firewall.

Detailed explanation-3: -In computer networks, a DMZ, or demilitarized zone, is a physical or logical subnet that separates a local area network (LAN) from other untrusted networks–usually, the public internet. DMZs are also known as perimeter networks or screened subnetworks.

Detailed explanation-4: -What is the difference between DMZ and firewall? A demilitarised zone, or DMZ network, is a perimeter network that restricts access to the local area network. It is a buffer area between the public Internet and the LAN. Meanwhile, a firewall is a security infrastructure that regulates traffic between networks.

Detailed explanation-5: -DMZ opens up all the ports for one IP address on the LAN. DMZ can be used as an alternative for port forwarding all ports. Enabling DMZ server eases the traffic for gaming devices (XBOX, PlayStation, Wii), DVR (TiVo, Moxi) & devices connecting to the Virtual private network.

There is 1 question to complete.