Which of the following is an important step in the initial stages of deploying a host-based firewall?
A.
Selecting identification versus authentication
B.
Determining the list of exceptions
C.
Choosing an encryption algorithm
D.
Setting time of day restrictions
Explanation:
A host-based firewall is installed on a client system and is used to protect the client system from the activities of the user as well as from communication from the
network or Internet. These firewalls manage network traffic using filters to block certain ports and protocols while allowing others to pass through the system.
Incorrect Answers:
A: A host-based firewall is used to filter network traffic; it does not perform identification or authentication.
C: A host-based firewall is used to filter network traffic; it does not provide encryption functions.
D: A host-based firewall is used to filter and restrict network traffic based on ports and protocols, not on time of day.Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp 246