PrepAway - Latest Free Exam Questions & Answers

Which of the following is the initial step in creating a firewall policy?

Which of the following is the initial step in creating a firewall policy?

PrepAway - Latest Free Exam Questions & Answers

A.
A cost-benefit analysis of methods for securing the applications

B.
Identification of network applications to be externally accessed

C.
Identification of vulnerabilities associated with network applications to be externally accessed

D.
Creation of an applications traffic matrix showing protection methods

Explanation:

Identification of the applications required across the network should be identified first. After
identification, depending on the physical location of these applications in the network and the
network model, the person in charge will be able to understand the need for, and possible
methods of, controlling access to these applications. Identifying methods to protect against
identified vulnerabilities and their comparative cost-benefit analysis is the third step. Having
identified the applications, the next step is to identify vulnerabilities (weaknesses) associated with
the network applications. The next step is to analyze the application traffic and create a matrix
showing how each type of traffic will be protected.


Leave a Reply