Why is a firewall a good place to implement a VPN? Why not implement it at the actual server(s) being accessed?

What will be an ideal response?


Typically,
the
firewall
is
positioned
at
the
perimeter
of
the
protected
zone
of
an
organization,
such
as
a
company's
office
or
a
particular
network
segment.
Therefore,
the
firewall
is
an
entry
gate
into
a
domain
that
is
protected
(usually
both
physically
and
logically).
Encryption
protection
is
not
as
necessary
within
the
domain.
The
firewall
represents
a
single
entry
point,
and
so
it
is
efficient
to
install
a
cryptographic
process
(or
processor)
at
that
one
point
instead
of
having
to
install
one
at
each
internal
server.

Computer Science & Information Technology

You might also like to view...

The ____ lets you preview items without opening them.

A. Navigation Pane B. People Pane C. To-Do Bar D. Reading Pane

Computer Science & Information Technology

A ____is a small metal or plastic device that looks like a ballpoint pen, but uses pressure instead of ink to write, draw, or make selections.

A. keyboard B. pointer C. mouse D. stylus

Computer Science & Information Technology

A "solitaire" operator is one that operates on a single operand.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following statements is not correct?

A. the voucher system is used to improve control over cash disbursements B. the sum of the paid vouchers represents the voucher payable liability of the firm C. the voucher system permits the firm to consolidate payments of several invoices on one voucher D. many firms replace accounts payable with a voucher payable system

Computer Science & Information Technology