a. In Figure 4-18, explain why Rule 1 brings more security than Rule 2. 26a.) In SPI
Question:
a. In Figure 4-18, explain why Rule 1 brings more security than Rule 2.
26a.) In SPI firewalls, ACLs are used for packets in the _______ state.
a. Connection-opening
b. Ongoing communication
c. Both A and B
d. Neither A nor B
b. Explain why the last rule in an ACL should deny anything not previously approved by earlier rules.
26b.) In an SPI firewalls, all rules except the last will permit the connection. The last will _______.
a. Also permit the connection
b. Deny the connection
c. Either A or B
d. None of the above
c. Why do you think authentication is sometimes required before accepting a connection?
d. When a packet addressed to 60.1.232.89 arrives, what rule will the SPI firewall look at first?
e. Why must Rule 2 come after Rule 1?
f. Add a rule to permit access by hosts in accounting to server 60.3.4.67. Require authentication. What rule number would you give it?
Step by Step Answer:
Business Data Networks and Security
ISBN: 978-0134817125
11th Edition
Authors: Raymond R. Panko, Julia L. Panko