Task 1- Matching Type
Directions. Match the descriptions in column A with the terms in column B. Write the
letter of the correct answer in your answer sheet/ yellow paper.
COLUMN A
COLUMN B
_________1. a system designed to prevent unauthorized access to
or from a private network.
_________2. also called proxy server
_________3. determines the types of internet services that can be
accessed
_________4. typically used to protect a single computer or device
_________5. verify the transmission control protocol handshake
_________6. typically used to protect an entire network or one
specific network segment
_________7. examines the information within each packet header
_________8. include deep-packet inspection, TCP handshake
checks, and surface-level packet inspection.
_________9. combine both packet inspection technology and TCP
handshake verification
_________10. example of packet information
a. packet-filtering
b. circuit-level gateway
c. firewall
d. next-generation firewall
e. source of IP
f. service control
g. software firewall
h. hardware firewall
i. application-level gateway
j. stateful inspection
Answers & Comments
Answer:
1. The correct answer is Firewall. It is a system designed to prevent unauthorized access to or from a private network.
2. A proxy server, also known as a "proxy" or "application-level gateway", is a computer that acts as a gateway between a local network (for example, all the computers at one company or in one building) and a larger-scale network such as the internet. Proxy servers provide increased performance and security
3.
4.
5.
6. A hardware firewall is typically used to protect an entire network or one specific network segment. Firewalls are dedicated hardware appliances that contain all the hardware and software necessary to protect the network.
7.
8.
9. Stateful Inspection Firewalls
These firewalls combine both packet inspection technology and TCP handshake verification to create a level of protection greater than either of the previous two architectures could provide alone. However, these firewalls do put more of a strain on computing resources as well.
10. a. packet-filtering
Explanation:
sorry kung yan lng