1. List three design goals for a firewall.
2. List and briefly describe the characteristics that a firewall access policy can use to filter traffic.
3. What information is used by a typical packet filtering firewall?
4. What are some weaknesses of a packet filtering firewall?
5. Explain three attacks that can be made on packet filtering firewalls. What measures can be taken to counter these attacks?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here