Which of the following are features of an application-level gateway? (Select two.One of the major challenges that companies face when trying to secure their sensitive data is finding the right tools for the job. When designing a firewall, what is the recommended approach for opening and closing ports? Open all ports close ports that expose common network attacks.Ĭlose all ports open only ports required by applications inside the DMZ. Which of the following describes how access lists can be used to improve network security? An access list identifies traffic that must use authentication or encryption.Īn access list filters traffic based on the IP header information such as source or destination IP address, protocol, or socket numbers.Īn access list filters traffic based on the frame header such as source or destination MAC address. ACL statements include an action to either allow or deny the traffic specified by the ACL statement. When you configure a router as a firewall, you configure the access control list (ACL) with statements that identify traffic characteristics, such as the direction of traffic (inbound or outbound), the source or destination IP address, and the port number. Which of the following does a router acting as a firewall use to control which packets are forwarded or dropped? ACL
You configure these rules on the proxy server, and all Internet access requests are routed through the proxy server. Use a proxy server to control Internet access based on users, time of day, and websites visited. Allow Internet access only through the proxy server. Add or remove exceptions to control access.Ĭonfigure the Local Security Policy of each system to add Internet restrictions.
How can you do this? Configure Internet zones using the Internet Options.Įnable Windows Firewall on each system. You would like to control Internet access based on users, time of day, and websites visited.