Guide to Firewalls and VPNs third edition. 2611 Chapter 6 review 1. Describe how
ID: 3676299 • Letter: G
Question
Guide to Firewalls and VPNs third edition.
2611 Chapter 6 review
1. Describe how a firewall could be configured to implement a strict approach to security.
2. What is the advantage of adding a second router between a firewall and the LAN it protects, in addition to a router outside the firewall?
3. Proxy servers, routers, and operating systems are all designed to perform IP forwarding. If your security configuration includes a proxy server, why should IP forwarding be disabled on routers and other devices that lie between the networks?
4. A Deny all approach would work best in which circumstances?
5. If a firewall is primarily permissive, how does this affect the work fact of the network administrator?
6. What is the primary difference between a screened host and a dual homed gateway?
7. Describe how placing two routers with IDS at the perimeter of the network rather than one can improve the security of the network.
8. A network administrator should be concerned when a firewall’s CPU consumption climbs above what percentage of total CPU usage?
9. When should a company hire an outside firm to handle the ongoing administration of a firewall?
10. What is the primary advantage of using a hot standby setup to achieve load balancing?
Explanation / Answer
1)
Passwords are important no matter what level of security is being implemented; application proxy gateways/proxy servers correspond to a “strict” approach to security specifically
3)
Having routers or other devices that lie between the external and internal networks do IP forwarding defeats the purpose of having a proxy server do IP forwarding. Having the proxy server perform this function is more secure
6)
The screened host is dedicated to performing only security functions.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.