Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Guide to Firewalls and VPNs third edition. 2611 Chapter 6 review 1. Describe how

ID: 3676299 • Letter: G

Question

Guide to Firewalls and VPNs third edition.

2611 Chapter 6 review

1. Describe how a firewall could be configured to implement a strict approach to security.

2. What is the advantage of adding a second router between a firewall and the LAN it protects, in addition to a router outside the firewall?

3. Proxy servers, routers, and operating systems are all designed to perform IP forwarding. If your security configuration includes a proxy server, why should IP forwarding be disabled on routers and other devices that lie between the networks?

4. A Deny all approach would work best in which circumstances?

5. If a firewall is primarily permissive, how does this affect the work fact of the network administrator?

6. What is the primary difference between a screened host and a dual homed gateway?

7. Describe how placing two routers with IDS at the perimeter of the network rather than one can improve the security of the network.

8. A network administrator should be concerned when a firewall’s CPU consumption climbs above what percentage of total CPU usage?

9. When should a company hire an outside firm to handle the ongoing administration of a firewall?

10. What is the primary advantage of using a hot standby setup to achieve load balancing?

Explanation / Answer

1)
Passwords are important no matter what level of security is being implemented; application proxy gateways/proxy servers correspond to a “strict” approach to security specifically

3)
Having routers or other devices that lie between the external and internal networks do IP forwarding defeats the purpose of having a proxy server do IP forwarding. Having the proxy server perform this function is more secure

6)
The screened host is dedicated to performing only security functions.