Chapter 6

Submitted by: Submitted by

Views: 70

Words: 397

Pages: 2

Category: Other Topics

Date Submitted: 03/25/2014 05:43 AM

Report This Essay

Chapter 6 Questions

1. Dynamic is common for every network, static is used for special networks. Dynamic filters are created through the policy of the network, they open and close ports according to the need of the network, and Static filters are created by a wizard. Dynamic filters are always opening and closing ports. Static filters remain open or closed until setting is changed manually. I feel the Dynamic Filtering would offer improved security.

2. The 5 generations of firewall technology…

First generation- Packet filtering firewalls

Second generation- Application firewall

Third generation-State inspection firewall

Fourth generation- Dynamic packet filtering firewall

Fifth generation- Kernal proxy firewall

At present (when textbook was published) all 5 generations are still recognized and in use.

3. A sacrificial host is a server placed outside of an organizations firewall, to lure attacks instead of attacks going straight to the organizations network. A bastion host is another name for a sacrificial host.

4. DMZ- Demilitarized zone- an intermediate area between a trusted network and an untrusted network. I feel this is an appropriate name because if I think about the word demilitarized I think unsecure.

5. VPN- Virtual Private Network- a private and secure network connection between systems that uses the data communication capability of an unsecured and public network. 2 advantages for using a VPN are cost savings, and network scalability.

6. Kj

7. Lk

8. GoToMyPC- This is one of the popular remote access applications. It automatically configures itself to your computer and you can access your computer from anywhere in the world with a computer running on Windows, Linux or even Macintosh, you can also control your computer with a Windows enabled mobile device giving you the freedom of access and control. Data transfer between the computers is encrypted with AES using 128-bit keys and password protection giving you maximum...