What are the steps when planning and implementing firewalls and proxy servers on your networks?
What will be an ideal response?
Because most security policies operate somewhere between the two extremes of "anything goes" (totally optimistic) and "no connection" (totally pessimistic), you will find the following set of steps useful when planning and implementing firewalls and proxy servers on your networks:
1. Plan
2. Establish requirements
3. Install
4. Configure
5. Test
6. Attack
7. Tune
8. Implement
9. Monitor and maintain
You might also like to view...
What are the options for sharing the Public folder in Windows 10?
What will be an ideal response?
Google+ is an example of a(n) ________ network
Fill in the blank(s) with correct word
A series of rows that contain related data is known as a ________
A) block B) query C) list D) record
Which of the following wireless standards operate at a maximum bandwidth of less than 20 Mbps? (Choose two.)
A) 802.11 B) 802.11a C) 802.11b D) 802.11g