The security administrator receives a service ticket saying a host based firewall is interfering with the operation of a new application that is being tested in delevopment. The administrator asks for clarification on which ports need to be open. The software vendor replies that it could use up to 20 ports and many customers have disabled the host based firewall. After examining the system the administrator sees several ports that are open for database and application servers that only used locally. The vendor continues to recommend disabling the host based firewall. Which of the following is the best course of action for the administrator to take?

A. Allow ports used by the application through the network firewall
B. Allow ports used externally through the host firewall
C. Follow the vendor recommendations and disable the host firewall
D. Allow ports used locally through the host firewall

Answer: D. Allow ports used locally through the host firewall

Computer Science & Information Technology

You might also like to view...

A set of graphic text styles that can be used to make text look like a graphic is called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ________ line in Outline view indicates that the text is hidden

Fill in the blank(s) with correct word

Computer Science & Information Technology