Page 175 - DCAP516_COMPUTER_SECURITY
P. 175

Unit 13: Firewalls




          13.7 Review Questions                                                                 Notes

          1.   How can firewall be implemented?
          2.   How firewall controls the traffic flowing in and out of the network?

          3.   Describe different types of firewall.
          4.   What is VPN?
          5.   What is the goal of VPN?
          6.   Describe firewall configuration in detail.
          7.   Discuss the uses of firewall in network security.

          8.   What do you mean by e-mail bombing?
          9.   Differentiate between Rule base vs. Policy based firewalls.
          10.  Discuss the role of network address translation.

          Answers: Self Assessment

          1.   False                            2.   True

          3.   True                              4.  True
          5.   VPNs                              6.  Network layer
          7.   Stateful inspection              8.   Policy-based
          9.   Stateful

          13.8 Further Readings





           Books      Managing Enterprise Information Integrity: Security, Control and Audit Issues, IT
                      Governance Institute.
                      Risks of Customer Relationship Management: A Security, Control, and Audit Approach,
                      PricewaterhouseCoopers Llp.
                      Security, Audit & Control Features PeopleSoft: A Technical and Risk Management
                      Reference Guide, 2nd Edition, Deloitte Touche Tohmatsu Research Team, ISACA.

                      William Stallings, Computer Security: Principles and Practice, Prentice Hall, 2008.





















                                           LOVELY PROFESSIONAL UNIVERSITY                                   169
   170   171   172   173   174   175   176   177   178   179   180