Examine and explain four security strategies used for firewalls.
6 2) Examine and explain four security strategies used for firewalls. Explain the two that you would highly recommend being implemented. Provide a rationale for your response.
7 1) There are many recommendations, guidelines, and best practices for firewall management. List and explain five of these guidelines or practices. Select two of best practices that you feel are more important than the others. Provide rationale for your response.
Save your time - order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines
Order Paper Now
7 2) Some argue that operating systems host firewall software may offer sufficient security for some. Therefore, it’s suggested before discounting the operating systems host firewall software that it should be evaluated. Examine and evaluate Window’s 7 host software firewall and one other operating system host firewall (other than Linux). Select the one that you feel is superior. Provide rationale for your response.
8 1) There are both commercial and open source types of Virtual Private Networks (VPNs) available. Examine and explain each one of these. Select the best type you recommend for a small business. Provide a rationale for your response.
8 2) Review and explain each of the following: DMZ-Based, Bypass Deployment, and Internally Connected Deployment implementation. Explain the architecture that you consider the preferred technique for a VPN. Provide a rationale for your response.