NETWORK SECURITY
FIREWALLS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Host-based firewall
|
|
Network-based firewall
|
|
VPN concentrator
|
|
Proxy server
|
Detailed explanation-1: -You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-bases attacks. What solution should you use? You want to install a firewall that can reject packets that are not part of an active session.
Detailed explanation-2: -A firewall is the best device to deploy to protect your private network from a public untrusted network. Firewalls are used to control traffic entering and leaving your trusted network environment.
Detailed explanation-3: -Expert Answer. The ideal way to give access to confidential resources over the internet is by using a virtual private network because encrypting all data ensures a safe connection between the client and server.
Detailed explanation-4: -Firewalls analyze packets based on pre-set rules to distinguish between benign and malicious traffic. These rulesets dictate how the firewall inspects the following: Source and destination IP addresses.
Detailed explanation-5: -Which of the following describes how access control lists can be used to improve network security? EXPLANATION An access control list filters traffic based on the IP header information, such as source or destination IP address, protocol, or socket number.