Chapter 6


Exercise questions


Questions 1.

Using the Web, search for “software firewalls.” Examine the various alternatives available and compare their functionality, cost, features, and type of protection. Create a weighted ranking according to your own evaluation of the features and specifications of each software package.

            I decided to compare 5 different software firewalls, and I organized them in the following table in order from the one I think is the best deal to the one I think is the less good one.

Software Firewall




Type of Protection


Anti ransomware








(depending on which plan you take)


Advanced Firewall

Online backup

Real-time antivirus

Spyware removal

Emerging threat detection

PC tune up

Zero day attack prevention

Parental control

They have Extreme security 2017 and Pro antivirus+ 2017

Comodo Firewall Pro

No complex configuration


DDP based security

Free for simple firewall


$39.99/year for full protection

Fast and hassle-free online experience

Manages traffic on your PC

Blocks all internet attacks

Secures all connections when you are online

Monitors in/out connections




Norton Antivirus

Anti Virus








Online threats

Security suite











Server security

Web security

Endpoint protection

Network security

Data encryption

Database security

For home

For business

Outpost Firewall Pro



Detects and blocks all intrusions

Blocks data theft attempts

Make computer invisible to intruders

Analyzes inbox and quarantines internet worms and viruses

Personal protection



Question 2.

Using Figure 6-18, create one or more rules necessary for both the internal and external firewalls to allow a remote user to access an internal machine from the Internet using the Timbuktu software. Your answer requires researching the ports used by this software packet.

Firewalls operate by examining a data packet and performing a comparison with some predetermined logical rules. The logic is based on a set of guidelines programmed in by a firewall administrator, or created dynamically and based on outgoing requests for information. This logical set is most commonly referred to as firewall rules, rule base, or firewall logic. Most firewalls use packet header information to determine whether a specific packet should be allowed to pass through or should be dropped. In order to better understand more complex rules, it is important to be able to create simple rules and understand how they interact

Question 3.

Suppose management wants to create a “server farm” for the configuration in Figure 6-18 that allows a proxy firewall in the DMZ to access an internal Web server (rather than a Web server in the DMZ). Do you foresee any technical difficulties in deploying this architecture? What are the advantages and disadvantages to this implementation?

As such, there will not be any difficulties in implementing the server. The only thing will be that this setup will require more effort on our part because this architecture requires more maintenance than another.

Question 4.

Using the Internet, determine what applications are commercially available to enable secure remote access to a PC.

Some of the applications I found to enable secure remote access to a PC are GoToMyPc, LogMeIn, TeamViewer, PCnow, Radmin, Anyplace Control, and Remote Computer Access. They are ranked in this order, to be the best and most secure software to allow remote access to a PC. It is pretty interesting to compare them, even though they offer the same service, there are a lot of different software out there and if someone is not careful they could easily get hacked. I personally use TeamViewer and I think it is a great application to have sometimes.

Question 5.

Using a Microsoft Windows system, open Internet Explorer. Click Internet Options on the Tools menu. Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: (a) content filtering and (b) protection from unwanted items like cookies?

Content filtering: There is a pop up blocker, and we can disable toolbar and extensions.

Protection from unwanted items like cookies: There is a setting that disable cookies, another setting disable location.

It is not hard to access those options, but if we do not know they exist, we can get some problems simply because we do not know how to change the internet settings so this is something good to be aware of.