Examine and explain four security strategies used for


1. Examine and explain four security strategies used for firewalls. Explain the two that you would highly recommend being implemented. Provide a rationale for your response.

2. There are many recommendations, guidelines, and best practices for firewall management. List and explain five of these guidelines or practices. Select two of best practices that you feel are more important than the others. Provide rationale for your response.

3. Some argue that operating systems host firewall software may offer sufficient security for some. Therefore, it's suggested before discounting the operating systems host firewall software that it should be evaluated. Examine and evaluate Window's 7 host software firewall and one other operating system host firewall (other than Linux). Select the one that you feel is superior. Provide rationale for your response.

3. There are both commercial and open source types of Virtual Private Networks (VPNs) available. Examine and explain each one of these. Select the best type you recommend for a small business. Provide a rationale for your response.

4. Review and explain each of the following: DMZ-Based, Bypass Deployment, and Internally Connected Deployment implementation. Explain the architecture that you consider the preferred technique for a VPN. Provide a rationale for your response.

Solution Preview :

Prepared by a verified Expert
Operating System: Examine and explain four security strategies used for
Reference No:- TGS02187434

Now Priced at $45 (50% Discount)

Recommended (92%)

Rated (4.4/5)