NETWORK SECURITY
FIREWALLS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
port
|
|
router
|
|
server
|
|
network topology
|
Detailed explanation-1: -Protocol. An agreed-upon method for communication. Port. A way for a computer to identify specific programs and manage their activity. In an IP addresses, it appears after a colon at the end of the address such as :21, :80, and :443.
Detailed explanation-2: -A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.
Detailed explanation-3: -A log file is a computer-generated data file that contains information about usage patterns, activities, and operations within an operating system, application, server or another device.
Detailed explanation-4: -Trojan. A Trojan disguises itself as desirable code or software. Once downloaded by unsuspecting users, the Trojan can take control of victims’ systems for malicious purposes. Trojans may hide in games, apps, or even software patches, or they may be embedded in attachments included in phishing emails.