15.11. Written Lab

In this section, write the answers to the following security questions:

  1. Which type of security device employs a redirection device known as a honeypot?

  2. Which type of firewall keeps track of existing connections passing through it?

  3. If you wanted to ensure that your firewall could block inflammatory email, which type of service would you look for?

  4. A firewall's list of rules that it uses to block traffic is called ___________________.

  5. If you wanted to allow remote access to 500 users, which type of device is recommended?

  6. If data from one of your subnets should be restricted from entering another subnet, the subnets should be configured as different ___________________.

  7. Which unsecure protocol uses port 80 by default?

  8. Which unsecure ...

Get CompTIA Network+® Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.