Chapter Review Questions
The following questions assist in reinforcing the concepts covered in this chapter.
1. What are the six security design concepts you should consider when looking at the security technologies for securing your network?
2. What rule is always implicitly present at the end of every packet filter?
3. When a device performs stateful packet inspection, what characteristics in a packet’s header are inspected, and why are they important?
4. What are some limitations of stateful packet inspection?
5. Define the differences between public and private IP addresses.
6. Compare and contrast the three different versions of NAT, and identify which of them is the most commonly used.
7. What are the two types of proxy firewalls?
8. Why ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access