Which of the following describes the most secure firewall configuration?

  • Deny all protocols, allow TCP/IP
  • Deny all, with exceptions for required applications and ports
  • Allow all, deny malicious applications and ports
  • Deny all UPD, allow all TCP

Your Score:
Network Security
Compliance and Operational Security
Threats and Vulnerabilities
Application, Data and Host Security
Access Control and Identity Management
Cryptography
CompTIA Security+ SY0-401
  • Network Security
    • This question is filed here
  • Compliance and Operational Security
  • Threats and Vulnerabilities
  • Application, Data and Host Security
  • Access Control and Identity Management
  • Cryptography