You work as a Network Administrator for NetTech Inc. The company’s network is connected to the
Internet. For security, you want to restrict unauthorized access to the network with minimum
administrative effort. You want to implement a hardware-based solution. What will you do
to accomplish this?
A.
Connect a brouter to the network.
B.
Implement a proxy server on the network.
C.
Connect a router to the network.
D.
Implement firewall on the network.
Explanation:
Firewall is available both as software and hardware. You can implement hardwarebased firewall for security with minimum administrative
effort.
Firewall is used to protect an internal network or intranet against unauthorized access from the
Internet or other networks. It restricts
inbound and outbound access and can analyze all traffic between an internal network and the
Internet. Users can configure a firewall to pass
or block packets from specific IP addresses and ports.
Answer option B is incorrect. A firewall is also in-built within a proxy server. Although implementing
a proxy server on the network will
implement the firewall automatically, it will be a software-based solution.
Answer option A is incorrect. A brouter is a combination of a bridge and a router. It is used to
connect dissimilar network segments, and it
routes only a specific transport protocol such as TCP/IP. A brouter also works as a bridge for all types
of packets, passing them on as long as
they are not local to the LAN segment from which they have originated.
Answer option C is incorrect. Router is a device that routes data packets between computers in
different networks. It is used to connect
multiple networks, and it determines the path to be taken by each data packet to its destination
computer. Router maintains a routing table of
the available routes and their conditions. By using this information, along with distance and cost
algorithms, the router determines the best
path to be taken by the data packets to the destination computer. A router can connect dissimilar
networks, such as Ethernet, FDDI, and
Token Ring, and route data packets among them. Routers operate at the network layer (layer 3) of
the Open Systems Interconnection (OSI)
model.