FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A FIREWALL IN NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open TCP/IP ports 80, 25, 110, and 143. Assuming that no other ports on the firewall need to be configured to provide access, which applications are most likely to be hosted on the server?
A
Web server, DNS server, and DHCP server
B
Web server, DNS server, and email server
C
Web server and email server
D
Email server, Newsgroup server, and DNS server
Explanation: 

Detailed explanation-1: -Expert Answer. The ideal way to give access to confidential resources over the internet is by using a virtual private network because encrypting all data ensures a safe connection between the client and server.

Detailed explanation-2: -Our recommendation is that all servers meant for general web use should offer both HTTP on port 80 and HTTPS on port 443.

Detailed explanation-3: -Which of the following devices would MOST likely have a DMZ interface? Explanation: The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN. Often a DMZ is deployed through the use of a multihomed firewall.

Detailed explanation-4: -What needs to be configured on a firewall to allow traffic directed to the public resource in the DMZ? EXPLANATION Packet filters on the firewall allow traffic directed to the public resources inside the DMZ. Packet filters also prevent unauthorized traffic from reaching the private network.

There is 1 question to complete.