0% found this document useful (0 votes)
25 views3 pages

Firewall Answers

1. A firewall monitors incoming and outgoing network traffic and allows or blocks it based on preset rules. 2. Firewalls can be hardware-based or software-based and are used to block certain ports to enhance security by restricting access. 3. The network administrator uses a firewall to block websites classified as gaming sites and common sites like YouTube according to different policies for teachers and others.

Uploaded by

Natalie Norris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views3 pages

Firewall Answers

1. A firewall monitors incoming and outgoing network traffic and allows or blocks it based on preset rules. 2. Firewalls can be hardware-based or software-based and are used to block certain ports to enhance security by restricting access. 3. The network administrator uses a firewall to block websites classified as gaming sites and common sites like YouTube according to different policies for teachers and others.

Uploaded by

Natalie Norris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Firewall

Gaming 80 teachers monitors


software 25 Postman people
blocks dry network policy
port ports 20
www.youtube.com
A firewall is a tool that 1. monitors traffic going into and out of
a computer or 2 network and either allows the traffic to pass
through or 3. blocks it. Firewalls are generally categorized as
network-based or host-based. Network-based firewalls are
positioned on the gateway computers of LANs, WANs and intranets.

The decision to allow or block is based


on rules, known as the firewall 4.
policy . For example, some
programs, such as email clients and
web browsers have legitimate cause to
send a transmission. These programs
are known and the firewall policy
allows their communications. However, any transmissions that are
not sent from or to known - and allowed - sources are blocked.

Firewalls can be hardware-based or 5. software -based.


Hardware firewalls tend to be more expensive, but are more
effective. There are areas called 6. ports on a computer where
data from certain sources are collected / sent – some common one
are. Think if it as having a different door in your house for different
7. people, relatives uses the back door, Tradesmen can enter
through the garage door. Owners enter through the main front
door. The 8. Postman can get into the porch to keep parcels 9
dry Firewalls can block these “doors” to make the computer
more secure e.g. if postman stole your Wellies from the porch you
can lock the door. If you don’t want students downloading virus
(you can block port 10. 20 ), whereas if you wanted to stop
them using the internet you could block port 11. 80 . To stop E-
mails being accessed you could block 12. Port number 13. 25

Service Port
Number
World Wide Web access
(using the Hyper-Text 80
Transfer Protocol, or HTTP)
E-mail (using the Simple Mail 25
Transfer Protocol, or SMTP)
File transfer (using the File 20
Transfer Protocol, or FTP)
Secure Encrypted web pages 443
HTTPS

The Network Administrator uses a software firewall called


Barracuda which he uses to block – websites that are classified
as 14. Gaming sites and also known common websites too
e.g. 15. www.youtube.com but the policy is different for
16.teachers

Firewalls are absolutely critical for today’s computer systems.


There was a time when we just didn’t think about firewalls but
today’s networks come with threats. It’s, therefore, critical to
have a firewall installed on your system.

It is the network administrator’s job to implement firewalls to


protect the network.
Spyhunter 5

https://www.youtube.com/watch?v=CuqoW5sZJko

You might also like