You would like to find a solution so that static web content can be offloaded to a different server, while the web server continues to process dynamic content.
Which solution should you implement?
Which port needs to be enabled to allow secure transactions?
What is the source of this network traffic?
What is the source on this network traffic?
You want to protect the laptop from Internet-based attacks.
Which solution should you use?
Source address of a packet.
Which type of firewall should you install?
Because funds are limited, you have decided to implement a unified treat management (UTM) device that provides multiple security features in a single network appliance:
You join the UTM device to the company’s Active Directory domain. The company’s traveling sales force will use the VPN functionality provided by the UTM device to connect to the internal company network from hotel and airport public WiFi networks.
What weaknesses exist in this implementation?
Circuit-level proxy – OSI Layer 5
Application-level gateway – OSI Layer 7
Routed Firewall – OSI layer 3
Transparent Firewall – OSI layer 2