Question

If both Host and Network Firewalls are deployed in a LAN environment true false - Many...

If both Host and Network Firewalls are deployed in a LAN environment

true false - Many Host firewalls and 1 Network firewall is common
true false - To block for know Windows viruses would be done on a Host Firewall
true false - Host firewalls can be places on a Bridge
true false - IP Addresses would usually be blocked by the Network Firewall

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1) Many Host firewalls and 1 Network firewall is common - TRUE

2) To block for know Windows viruses would be done on a Host Firewall - FALSE

3) Host firewalls can be places on a Bridge - FALSE

4) IP Addresses would usually be blocked by the Network Firewall - TRUE

Add a comment
Know the answer?
Add Answer to:
If both Host and Network Firewalls are deployed in a LAN environment true false - Many...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 2) IP and MAC addressing. True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer to the following network consisting of three 10Mbps Ether...

    2) IP and MAC addressing. True or False. One point for each correct answer, zero points for each incorrect answer. Many of the questions refer to the following network consisting of three 10Mbps Ethernet segments, one switch, and one router. Assume all ARP tables are up-to-date unless otherwise stated. a) Consider a network consisting of Ethernets, hubs, switches, and routers. Suppose one of the hubs is replaced with a switch. Then the network administrator must redefine some IP addresses. True...

  • Subnet mask 255.255.255.0 can never be used for class B network. Question 1 options: True False...

    Subnet mask 255.255.255.0 can never be used for class B network. Question 1 options: True False Question 2 (1 point) In CIDR notation, /22 indicates there are 22 ones in the subnet mask. Question 2 options: True False Question 3 (1 point) When deploy a network inside a commercial building, there must be only one LAN. Question 3 options: True False Question 4 (1 point) When a packet is going to be routed to a computer in a LAN, other...

  • 1. Let’s consider the network shown in Figure 1 where Snort is deployed. 1.1: In Figure...

    1. Let’s consider the network shown in Figure 1 where Snort is deployed. 1.1: In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? (9 points) 1.2: In Figure 1, say True or False to the following statement: “Snort can see both incoming packets from the left firewall and outgoing packets from the right firewall”. (5 points) 1.3: In Figure 1, assume a packet P matches the following Snort rule when the packet is analyzed...

  • 1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80...

    1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT iptables -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT Allow web server traffic Block web server traffic Force port 80 traffic to port 443 Allow traffic from both 80 and 443 using UDP protocols 2. Timestamps are important because can not be changed or deleted by attackers when configured properly, allows you to correlate events across the network can always...

  • 1. True or False: HIV is an RNA virus that belongs to a class of viruses...

    1. True or False: HIV is an RNA virus that belongs to a class of viruses called retroviruses. 2. Name the three large groups of metazoal parasites: 2. 3. Fil in the blank: Malaria is caused by several species of which has the protozoan parasite a complicated life cycle. 4. True or False: Animal parasites are organisms that have become adapted to living within or on the body of another animal, called the 5. True or False: Type 2 herpes...

  • RSA is a common form of symmetric key encryption. Select one: True False What is the...

    RSA is a common form of symmetric key encryption. Select one: True False What is the purpose of a nonce in an end-point authentication protocol? Select one: a. It protects against replay attacks. b. It serves as a private key. c. It serves as a public key. d. It serves as a signature. e. It serves as a shared symmetric key. What is (19 * 16) mod 7? Answer: A TCP connection setup requires 3 messages to be passed. How...

  • Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic...

    Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...

  • Section Two (True/False) Regarding SPC and control charts: 3. Control limits and specification limits are both...

    Section Two (True/False) Regarding SPC and control charts: 3. Control limits and specification limits are both provided by the customer. cause variation SPC uses graphed statics to determine if a process has special Control limits for most control charts are set at 2 standard deviations. If a control chart signals special cause variation, the cause will also be known. One should work on reducing common cause variation while eliminating special cause variation. Critical process outputs that are measured on a...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • True or False: A nasopharyngeal airway (NPA) can be used on a semi-conscious or conscious individual,...

    True or False: A nasopharyngeal airway (NPA) can be used on a semi-conscious or conscious individual, while an oropharyngeal airway (OPA) should only be used on an unconscious individual. True False True or False: An individual in PEA has an organized cardiac rhythm on ECG. True False True or False: Symptomatic bradycardia and poor perfusion may degrade into cardiac arrest. True False True or False: The definition of stable tachycardia is a fast but constant heart rate between 80 and...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT