FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A FIREWALL IN NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
You have recently installed a new Windows Server 2016 system. To ensure the accuracy of the system time, you have loaded an application that synchronizes the hardware clock on the server with an external time source on the internet. Now, you must configure the firewall on your network to allow time synchronization traffic through.Which of the following ports are you most likely to open on the firewall?
A
80
B
119
C
110
D
123
Explanation: 

Detailed explanation-1: -Expert Answer. The ideal way to give access to confidential resources over the internet is by using a virtual private network because encrypting all data ensures a safe connection between the client and server.

Detailed explanation-2: -Packet filtering firewalls allow or deny network packets based on the following criteria: The source IP address is where the packet is being sent from. The packet’s address is the destination IP address.

Detailed explanation-3: -In which of the following situations would you MOST likely implement a screened subnet? You want users to see a single IP address when they access your company network.

Detailed explanation-4: -Which of the following devices can apply quality of service and traffic-shaping rules based on what created the network traffic? EXPLANATION An application-aware device can analyze and manage network traffic based on the Application layer protocol that created it.

There is 1 question to complete.