COMPUTER NETWORKING

NETWORK SECURITY

FIREWALLS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open TCP/IP ports 80, 25, 110, and 143. Assuming that no other ports on the firewall need to be configured to provide access, which applications are most likely to be hosted on the server?
A
Web server, DNS server, and DHCP server
B
Web server, DNS server, and email server
C
Web server and email server
D
Email server, Newsgroup server, and DNS server
Explanation: 

Detailed explanation-1: -The more secure approach to creating a DMZ network is a dual-firewall configuration, in which two firewalls are deployed with the DMZ network positioned between them. The first firewall–also called the perimeter firewall–is configured to allow only external traffic destined for the DMZ.

Detailed explanation-2: -Expert Answer. The ideal way to give access to confidential resources over the internet is by using a virtual private network because encrypting all data ensures a safe connection between the client and server.

Detailed explanation-3: -Therefore, the only port(s) that need to be opened in the firewall are the http port (default 18080), and/or the https port (default 8443).

Detailed explanation-4: -What needs to be configured on a firewall to allow traffic directed to the public resource in the DMZ? EXPLANATION Packet filters on the firewall allow traffic directed to the public resources inside the DMZ. Packet filters also prevent unauthorized traffic from reaching the private network.

There is 1 question to complete.