Which of the following is an important step in the initial stages of deploying a host-based firewall?
Selecting identification versus authentication
Determining the list of exceptions
Choosing an encryption algorithm
Setting time of day restrictions
A host-based firewall is installed on a client system and is used to protect the client system from the activities of
the user as well as from communication from the network or Internet. These firewalls manage network traffic
using filters to block certain ports and protocols while allowing others to pass through the system.