“Securing Windows 8 Using Windows Firewall” Please respond to the following:
- From the e-Activity, identify at least two (2) advantages that host-based firewalls have over network (i.e., perimeter-based) firewalls. Use one (1) example that demonstrates the superiority of host-based firewalls in order to justify your response.
- Analyze the two (2) methods available for allowing an application’s traffic to pass through a Windows (Host-based) Firewall (e.g., adding an app to the list of other allowed apps, opening a port, etc.). Recommend the method that you believe would do the most to decrease the overall security risk. Provide a rationale for your response.
e-Activity
- Visit the Science Opposing Views Website and read the article titled, “Host-Based Vs. Network-Based Firewalls”, located at http://science.opposingviews.com/hostbased-vs-networkbased-firewalls-2000.html. Next, visit the Inform IT Website and read the article titled, “Why Use a Host-Based Firewall?”, dated January 30, 2004, located athttp://www.informit.com/articles/article.aspx?p=169573&seqNum=2. Be prepared to discuss.
Are you looking for a similar paper or any other quality academic essay? Then look no further. Our research paper writing service is what you require. Our team of experienced writers is on standby to deliver to you an original paper as per your specified instructions with zero plagiarism guaranteed. This is the perfect way you can prepare your own unique academic paper and score the grades you deserve.
Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.
[order_calculator]