What are some of the advanced security functions provided by modern firewalls?

What will be an ideal response?


Logging unauthorized (as well as authorized) accesses into and out of a network
Providing a virtual private network (VPN) link, which can make two separated networks appear to be connected to one another
Authenticating users who provide usernames and passwords so they can be identified and given access to the services they need
Shielding hosts inside the network so that attackers cannot identify them and use them as staging areas for sustained attacks
Caching data so that files that are repeatedly requested can be called from cache to reduce server load and improve Web-site performance
Filtering content that is considered inappropriate (such as video streams) or dangerous (such as executable e-mail attachments)

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. cout is an object of the istream class. 2. << is the stream insertion operator 3. When data is read using >> any leading white space is skipped. 4. Using this code: 5. What value will the function eof return if there are more characters to be read in the input stream?

Computer Science & Information Technology

Internet communications are defined by a set of protocols called TCP/IP. What do TCP and IP stand for, and what is the role of each protocol in transmitting and receiving information?

What will be an ideal response?

Computer Science & Information Technology

You can edit data in form layout view

Indicate whether the statement is true or false

Computer Science & Information Technology

You can use colors, patterns, and borders to enhance the overall appearance of a worksheet and to make it easier to read. One of the ways of adding these enhancements is to use the Borders, Font Colors, and Fill Color buttons in the Font group on the ____ tab of the Ribbon.

A. Home B. Data C. Page Layout D. Review

Computer Science & Information Technology