Page 175 - DCAP516_COMPUTER_SECURITY
P. 175
Unit 13: Firewalls
13.7 Review Questions Notes
1. How can firewall be implemented?
2. How firewall controls the traffic flowing in and out of the network?
3. Describe different types of firewall.
4. What is VPN?
5. What is the goal of VPN?
6. Describe firewall configuration in detail.
7. Discuss the uses of firewall in network security.
8. What do you mean by e-mail bombing?
9. Differentiate between Rule base vs. Policy based firewalls.
10. Discuss the role of network address translation.
Answers: Self Assessment
1. False 2. True
3. True 4. True
5. VPNs 6. Network layer
7. Stateful inspection 8. Policy-based
9. Stateful
13.8 Further Readings
Books Managing Enterprise Information Integrity: Security, Control and Audit Issues, IT
Governance Institute.
Risks of Customer Relationship Management: A Security, Control, and Audit Approach,
PricewaterhouseCoopers Llp.
Security, Audit & Control Features PeopleSoft: A Technical and Risk Management
Reference Guide, 2nd Edition, Deloitte Touche Tohmatsu Research Team, ISACA.
William Stallings, Computer Security: Principles and Practice, Prentice Hall, 2008.
LOVELY PROFESSIONAL UNIVERSITY 169