COMPUTER NETWORKING

NETWORK SECURITY

FIREWALLS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
When designing a firewall, what is the recommended approach for opening and closing ports?
A
Close all ports; open ports 20, 21, 53, 80, and 443.
B
Close all ports
C
Close all ports; open only ports required by applications inside the DMZ.
D
Open all ports; close ports that expose common network attacks.
E
Open all ports; close ports that show improper traffic or attacks in progress.
Explanation: 

Detailed explanation-1: -Note: Each OSI Layer can be used once, more than once, or not at all. When designing a firewall, what is the recommended approach for opening and closing ports?-close all ports; open 20, 21, 53, 80, and 443.

Detailed explanation-2: -In which of the following situations would you most likely implement a demilitarized zone (DMZ)? EXPLANATION Use a demilitarized zone (DMZ) to protect public hosts on the internet, such as a web server, from attack. The DMZ uses an outer firewall that prevents internet attacks.

Detailed explanation-3: -Which of the following devices would MOST likely have a DMZ interface? Explanation: The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN. Often a DMZ is deployed through the use of a multihomed firewall.

Detailed explanation-4: -Generally, most firewalls allow you to set rules that determine which traffic is allowed into or out of your network. Example: You could configure the firewall to allow only traffic from specific IP addresses, block certain ports, and restrict access to particular services.

There is 1 question to complete.