What are the general steps a firewall uses to authenticate users?
What will be an ideal response?
1. The client makes a request to access a resource.
2. The firewall intercepts the request and prompts the user for name and password.
3. The user submits the requested information to the firewall.
4. The user is authenticated.
5. The request is checked against the firewall's rule base.
6. If the request matches an existing allow rule, the user is granted access.
7. The user accesses the desired resources.
Computer Science & Information Technology
You might also like to view...
A(n) ________ database stores data in more than two dimensions, as opposed to relational databases, which store data in two-dimensional tables
Fill in the blank(s) with correct word
Computer Science & Information Technology
Scanners use ____ per inch as a measurement of the image resolution.
a. pixels b. dots c. indices d. picas
Computer Science & Information Technology