The security administrator receives a service ticket saying a host based firewall is interfering with the operation of a new application that is being tested in delevopment. The administrator asks for clarification on which ports need to be open. The software vendor replies that it could use up to 20 ports and many customers have disabled the host based firewall. After examining the system the administrator sees several ports that are open for database and application servers that only used locally. The vendor continues to recommend disabling the host based firewall. Which of the following is the best course of action for the administrator to take?

A. Allow ports used by the application through the network firewall
B. Allow ports used externally through the host firewall
C. Follow the vendor recommendations and disable the host firewall
D. Allow ports used locally through the host firewall


Answer: D. Allow ports used locally through the host firewall

Computer Science & Information Technology

You might also like to view...

List and describe the types of hardware devices and software programs that perform packet filtering.

What will be an ideal response?

Computer Science & Information Technology

Which function would you use to test for a relationship between students' attendance and their test scores?

A) VARPA B) CORREL C) RELATE.S D) RELATE.P

Computer Science & Information Technology

_____ memory or storage cards are found in mobile devices and laptops and also in desktop computers

Fill in the blank(s) with correct word

Computer Science & Information Technology

Probably the most commonly used control for both input and output is the button because it adds additional functionality to an application.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology