COMPUTER NETWORKING

NETWORK SECURITY

FIREWALLS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
You are monitoring network traffic on your network, and you see traffic between two network hosts on port 2427. Which kind of network traffic uses this port?
A
A workstation is using the DHCP protocol to request an IP address from a DHCP server.
B
A ping of death attack on a network host is in progress.
C
Someone is remotely accessing another system using the SSH protocol.
D
The MGCP protocol is generating traffic, which VoIP uses to send voice data over a network.
Explanation: 

Detailed explanation-1: -You are monitoring network traffic on your network, and you see traffic between two network hosts on port 2427. Which kind of network traffic uses this port? The MGCP protocol is generating traffic, which VoIP uses to send voice data over a network.

Detailed explanation-2: -Firewalls analyze packets based on pre-set rules to distinguish between benign and malicious traffic. These rulesets dictate how the firewall inspects the following: Source and destination IP addresses.

Detailed explanation-3: -A firewall is a network security device that prevents unauthorized access to a network. It inspects incoming and outgoing traffic using a set of security rules to identify and block threats.

Detailed explanation-4: -Explanation: Hardware firewalls are those firewalls that need to be connected as additional hardware between the device through which the internet is coming to the system and the network used for connecting to the internet.

Detailed explanation-5: -For instance, if you run a mail server and provide your clients POP3 access, and you also run an FTP and Web server, you will want to allow external access to ports 25 (SMTP), 110 (POP3), 20 and 21 (FTP), and 80 (HTTP). If you also have SSL-enabled Web pages, you will want to open port 443 (HTTPS).

There is 1 question to complete.