COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Network administrators can create their own ACL rules based on ____ ____ and ____
A
Address, Protocols and Packet attributes
B
Address, Protocols and security policies
C
Address, policies and Packet attributes
D
Network topology, Protocols and data packets
Explanation: 

Detailed explanation-1: -Explanation: Network administrators can create their own ACL rules based on Address, Protocols and Packet attributes. This is generally done where the specific customised type of data packets need to pass through firewall screening.

Detailed explanation-2: -Networking ACLs are installed in routers or switches, where they act as traffic filters. Each networking ACL contains predefined rules that control which packets or routing updates are allowed or denied access to a network.

Detailed explanation-3: -A packet filtering firewall: *Uses ACLs or filter rules to control traffic. *Operates at OSI Layer 3 (Network layer).

Detailed explanation-4: -Firewalls are network security systems that prevent unauthorized access to a network. It can be a hardware or software unit that filters the incoming and outgoing traffic within a private network, according to a set of rules to spot and prevent cyberattacks. Firewalls are used in enterprise and personal settings.

Detailed explanation-5: -Action-Can be either deny or allow. Protocol-Name of transmission protocol, such as TCP. SRC/DST IP-IP address of sender or receiver. SRC/DST Port-Port of sender or receiver.

There is 1 question to complete.