Why is a firewall a good place to implement a VPN? Why not implement it at the actual server(s) being accessed?
What will be an ideal response?
Typically, the firewall is positioned at the perimeter of the protected zone of an organization, such as a company’s office or a particularnetwork segment. Therefore, the firewall is an entry gate into a domain that is protected (usually both physically and logically). Encryption protection is not as necessary within the domain. The firewall represents a single entry point, and so it is efficient to install a cryptographic process (or processor) at that one point instead of having to install one at each internal server.
You might also like to view...
When you import a Photoshop ____ file into Flash, you can choose which layers to include and whether the layers will be editable in Flash.
A. TIFF B. PSD C. JPG D. PNG
Space between lines in a report is inversely related to the height of the Detail section
Indicate whether the statement is true or false
A form that is based on a table that contains a(n) ________ macro inherits the logic of the table.
Fill in the blank(s) with the appropriate word(s).
The ____ is also known as the escape character.
A. pound character (#) B. ampersand character (&) C. backslash character (\) D. bang character (!)