Which of the following is the initial step in creating a
firewall policy?

A. A cost-benefits analysis of methods for securing the
applications

B. Identification of network applications to be externally
accessed

C. Identification of vulnerabilities associated with network
applications to be externally accessed

D. Creation of an applications traffic matrix showing
protection methods

Answer Posted / guest

Answer: B

Identification of the applications required across the
network should be identified first. After identification,
depending on the physical location of these applications in
the network and the network model, the person in-charge will
be able to understand the need and possible ways of
controlling access to these applications. Identifying
methods to protect against identified vulnerabilities and
their comparative cost-benefit analysis is the third step.
Having identified the applications, the next step is to
identify vulnerabilities (weaknesses) associated with the
network applications. The next step is to analyze the
application traffic and create a matrix showing how each
type of traffic will be protected.

Is This Answer Correct ?    10 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

WHICH OF THE FOLLOWING IS OFTEN AN ADVANTAGE OF USING PROTOTYPING GOR DYDTEM DVELOPMENT

2844


purchase orders issued to vendors have been authorized as per the authorization matrix

1094