Briefly describe the best practice rules for firewall use.
What will be an ideal response?
1. All traffic from the trusted network is allowed out.2. The firewall device is never directly accessible from the public network for configuration or management purposes.3. Simple Mail Transport Protocol (SMTP) data is allowed to pass through the firewall, but it should all be routed to a well-configured SMTP gateway to filter and route messaging traffic securely.4. All Internet Control Message Protocol (ICMP) data should be denied.5. Telnet (terminal emulation) access to all internal servers from the public networks should be blocked.6. When Web services are offered outside the firewall, HTTP traffic should be denied from reaching your internal networks through the use of some form of proxy access or DMZ architecture.7. All data that is not verifiably authentic should be denied.
You might also like to view...
Match the keystrokes with their description
I. Up arrow II. Home III. End IV. Tab + Enter V. Ctrl + Home A. Moves to the first field in the record B. Moves to the last field in the record C. Moves to the first field of the first record D. Move from record to record E. Move one field at a time
Connections to other documents or web pages that contain related information are called ________ links.
A. web portal B. multimedia C. URL D. hypertext