COMPUTER NETWORKING

NETWORK SECURITY

FIREWALLS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A small startup company has hired you to harden their new network.Because funds are limited, you have decided to implement a unified threat management (UTM) device that provides multiple security features in a single network appliance:* Firewall* VPN* Anti-spam* AntivirusYou join the UTM device to the company’s Active Directory domain. The company’s traveling sales force will use the VPN functionality provided by the UTM device to connect to the internal company network from hotel and airport public Wi-Fi networks.Which weaknesses exist in this implementation?
A
The UTM device should not be joined to the Active Directory domain.
B
The UTM represents a single point of failure.
C
Remote users should not establish VPN connections to the internal network using public Wi-Fi networks.
D
Anti-spam and antivirus functions must be placed on separate servers.
Explanation: 

Detailed explanation-1: -In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.

Detailed explanation-2: -A firewall is a security device-computer hardware or software-that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer.

Detailed explanation-3: -Firewall. One widely used strategy to improve system security is to use a firewall. A firewall consists of software and hardware set up between an internal computer network and the Internet.

Detailed explanation-4: -A proxy firewall (aka application-level gateway) inspects packets at the application layer of the Open Systems Interconnection (OSI) reference model.

There is 1 question to complete.