Often technical personnel who are not familiar with security techniques think that restricting access to ports on a router or firewall can protect a network from attack. Why is this solution ?

What will be an ideal response?


When a firewall prevents any traffic from entering or exiting a network on any well-known port, such as port 80, you have indeed closed a vulnerable port to access from hackers. However, you have also closed the door to Internet access for your users, which probably isn't acceptable to your company. The tricky (and almost impossible) part for security personnel is attempting to keep out the bad guys while allowing the good guys to work and use the Internet.

Computer Science & Information Technology

You might also like to view...

To select a ____ in the table in the accompanying figure, point to its left edge and click when the mouse pointer changes to a small solid upward angled pointing arrow.

A. cell B. row C. column D. none of the above

Computer Science & Information Technology

A ________ is used to break down many-to-many relationships into two one-to-many relationships

A) divider table B) junction table C) relationship table D) connection table

Computer Science & Information Technology

Sending data to a called function is called ____________________ arguments.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The function ____ returns the natural logarithm of its argument.

A. double exp(double) B. double log(double) C. double log10(double) D. double fmod(double)

Computer Science & Information Technology