preview

Nt1310 Unit 7

Better Essays

Principals of Information Security 4th Edition Questions
Chapter 6 Questions 1. What is the typical relationship among the untrusted network, the firewall, and the trusted network?
The relationship is that data is only limited to what firewalls allow via specific places called “ports”. There is the untrusted network on the outside, then the firewall which prevents unwanted or suspicious connections, and the trusted network is what lies within the bounds of the firewall.
2. What is the relationship between a TCP and UDP packet? Will any specific transaction usually involve both types of packets?
A TCP Packet sends information, and reports back to the sender on progress to assure that information has been sent and received. UDP on …show more content…

8. Describe how the various types of firewalls interact with the network traffic at various levels of the OSI model.
Packet filtering firewalls include Static Filtering, dynamic filtering, and stateful inspection filtering these all work at the transport layer of the network. Packet filtering interacts with network traffic to confirm or deny it based on a rule set for a packet going up against a set of rules that is determined. Static filtering is up against a rule set for each packet, dynamic filtering filters packets depending on network traffic and usage limits, and stateful inspection examines packets and verifies where they are coming and going to determine via logs.
9. What is a hybrid firewall?
A Hybrid firewall “combine the elements of other types of firewalls that is, the elements of packet filtering and proxy services, or of packet filtering and circuit gateways.” (POIS P.256) It’s pretty nice because it takes all the network security protocols and kind of combines them in one package so a network can be improved without replacing several different firewall technologies.
10. List the five generations of firewall technology. Which generations are still in common use?
1st Generation: Static packet filtering (going up against a pre-defined set of rules)
2nd Generation: Application level firewalls, which are able to be configured via

Get Access