FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A FIREWALL IN NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
You are investigating the use of website and URL content filtering to prevent users from visiting certain websites. Which benefits are the result of implementing this technology in your organization? (Choose two.)
A
Enforcing the organization’s internet usage policy
B
An increase in bandwidth availability
C
Preventing emails containing threats
D
Identifying and disposing of infected content
E
Preventing phishing attempts
Explanation: 

Detailed explanation-1: -Expert Answer. The ideal way to give access to confidential resources over the internet is by using a virtual private network because encrypting all data ensures a safe connection between the client and server.

Detailed explanation-2: -Which of the following types of proxies would you use to remain anonymous when surfing the internet? Forward proxies can be used to filter web content but can also be used to mask a user’s identity for anonymity.

Detailed explanation-3: -Which of the following types of proxies can be used for web filtering? EXPLANATION Transparent proxies are located between a user and the internet, and they can redirect requests without changing them. These can also be used for web filtering. Reverse proxies can be used for caching and authentication.

Detailed explanation-4: -A site-to-site VPN is a VPN implementation that uses routers on the edge of each site. A host-to-host VPN implementation allows an individual host connected to the internet to establish a VPN connection to another host on the internet.

There is 1 question to complete.