Which of the following is an important step in the initial stages of deploying a host-based firewall?
A.
Selecting identification versus authentication
B.
Determining the list of exceptions
C.
Choosing an encryption algorithm
D.
Setting time of day restrictions
Explanation:
A host-based firewall is installed on a client system and is used to protect the client system from the
activities of the user as well as from communication from the network or Internet. These firewalls
manage network traffic using filters to block certain ports and protocols while allowing others to pass
through the system.
Incorrect Answers:
A: A host-based firewall is used to filter network traffic; it does not perform identification or
authentication.
C: A host-based firewall is used to filter network traffic; it does not provide encryption functions.
D: A host-based firewall is used to filter and restrict network traffic based on ports and protocols, not on
time of day.
Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp. 246