Correct Answer: From the top of the rule base to the bottom of the rule base
Explanation:
Note: This Question is unanswered, help us to find answer for this one
Firewall Concepts Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Firewall Concepts MCQ Questions
Suppose Adrian is the Network Security Engineer for ABC Company. He is asked by his manager to create a security policy in the Firewalls to open the HTTP service for a host_A(192.168.1.2) so that host_A may be able to access the Web Server(172.16.0.2). NAT rule already exists for the host. How will Adrian create the security policy in the Firewalls?
Which command is used to determine the route taken by a Packet?
Syslog protocol is used for __________.
State whether True or False.
When a rule is matched for a particular incoming/outgoing Packet and is executed, the Firewalls look for another rule in the rule base for the same Packet.
Which Packet is sent by the source to initiate the connection in TCP 3-way handshake?
What happens when a packet arrives on an interface and a route exists in the local routing table and the firewall routes the packet back out the same interface the packet arrived on?
Which of the following server creates a secure tunnel connection?
What is the primary purpose of a firewall?
Your customer asks you to allow ALL hosts from the Internet to company's secure webserver (Secure HTTP), what port do you open on the firewall?
Your client asks you to create a rule for FTP access, what port(s) will you add on the firewall?