Correct Answer: Confidentiality, Integrity and Availability
Explanation:
Note: This Question is unanswered, help us to find answer for this one
Firewall Concepts Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Firewall Concepts MCQ Questions
Suppose Mark is the Network Security Engineer for ABC Company. He is asked by his manager to create a security policy in the Firewalls so that their internal network ABC_INTERNAL(172.16.0.0/24)may be able to access the DNS service from the server DNS_SERVER(192.168.1.5). NAT rule already exists for the Network. How will Mark create the security policy in the Firewalls?
Which of the following is a Firewall technology?
Which zone is the trusted zone in Firewalls architecture?
Which of the following things should be kept in mind before implementing/configuring the Firewalls?
Which of the following is a type of DoS attack?
Which of the following 8-bit values identifies the maximum time the packet can remain in the system before it is dropped?
Which of the following is TRUE?
What device logically filters traffic at the edge of a computer network and the Internet?
Which of the following firewalls works at the application level?
You want to filter all traffic going to an internal web server from the Internet side of the firewall, what port will you filter on the firewall?