FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A FIREWALL IN NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following describes how access lists can be used to improve network security?
A
An access list looks for patterns of traffic between multiple packets and takes action to stop detected attacks.
B
An access list filters traffic based on the frame header such as source or destination MAC address.
C
An access list filters traffic based on the IP header information such as source or destination IP address, protocol, or socket numbers.
D
An access list identifies traffic that must use authentication or encryption.
Explanation: 

Detailed explanation-1: -Which of the following describes how access control lists can be used to improve network security? An access control list filters traffic based on the IP header information, such as source or destination IP address, protocol, or socket number.

Detailed explanation-2: -A screening router is the router that is most external to your network and closest to the internet. It uses access control lists (ACLs) to filter packets as a form of security.

Detailed explanation-3: -The first firewalls were packet-filtering firewalls that work at the Network layer of the OSI networking model. They examine the packet headers that contain IP addresses and packet options and block or allow traffic through the firewall based on that information.

Detailed explanation-4: -In a single home network, a firewall can filter traffic and alert the user to intrusions. They are especially useful for always-on connections, like Digital Subscriber Line (DSL) or cable modem, because those connection types use static IP addresses.

Detailed explanation-5: -The information that the packet filter uses to make its decision includes the IP address of the source and/or destination computer(s) and the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port number.

There is 1 question to complete.