1 List three design goals for a firewall.
2 List four techniques used by firewalls to control access and enforce a security policy.
3 What information is used by a typical packet filtering firewall?
4 What are some weaknesses of a packet filtering firewall?
5 What is the difference between a packet filtering firewall and a stateful inspection firewall?
6 What is an application-level gateway?
7 What is a circuit-level gateway?
9 What are the common characteristics of a bastion host?
10 Why is it useful to have host-based firewalls?
11 What is a DMZ network and what types of systems would you expect to find on such networks?
12 What is the difference between an internal and an external firewall?”

4 comments on “Firewalls access to control and how they enforce security policy

  1. Pingback: 다시보기
  2. Pingback: Read Full Report

Leave a Reply

Your email address will not be published. Required fields are marked *