COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following devices is MOST likely being used when processing the following? 1 PERMIT IP ANY ANY EQ 80 2 DENY IP ANY ANY
A
Firewall
B
NIPS
C
Load Balancer
D
URL Filter
Explanation: 

Detailed explanation-1: -Firewalls use a rule-based access control model with rules expressed in an access control list. A mandatory access control model uses labels. A discretionary access control model allows users to assign permissions.

Detailed explanation-2: -Explanation: Firewalls are of three kinds – one is the hardware firewalls, another is software firewalls and the other is a combination of both hardware and software.

Detailed explanation-3: -Therefore, the only port(s) that need to be opened in the firewall are the http port (default 18080), and/or the https port (default 8443).

Detailed explanation-4: -Network layer Firewall can filter on Source And Destination IP address, Source and Destination Port no for both TCP and UDP packet.

There is 1 question to complete.