What questions should you ask when evaluating the effectiveness of a bastion host configuration?

What will be an ideal response?


How well does the bastion host protect itself from attack? You can use one of the hacker tools mentioned earlier (Nmap or SuperScan) to research this after the machine is online.

How well does the bastion host protect the internal LAN behind it from attack? This is something you judge by reviewing the log files for unsuccessful access attempts as well as for other possible intrusions.

Computer Science & Information Technology

You might also like to view...

Explain what the 10 roles in the EBK represent.

What will be an ideal response?

Computer Science & Information Technology

Which of the following is defined as the maximum departure of  a wave from the undisturbed state?

A. amplitude B. spectrum C. frequency D. wavelength

Computer Science & Information Technology

The disk can hold many _____________, each of which contains either data or program instructions.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Dynamically created objects have symbolic names.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology