

Firewall Technologiesįirewalls are devices or programs that control network traffic flow between networks or hosts in different security zones using various technologies such as packet filtering, stateful inspection, proxy, stateful protocol analysis, etc. It is a tutorial for information security and a supplement to the official study guides for the CISSP and CISM exams and an informative reference for security professionals. Wentz’s book, The Effective CISSP: Security and Risk Management, helps CISSP and CISM aspirants build a solid conceptual security model. What really matters is your reasoning process and justifications.

It doesn’t matter whether you have the right or wrong answer.

Kindly be reminded that the suggested answer is for your reference only. Which of the following devices establishes two distinct connections between internal clients and external hosts and filters contents passed in between? (Wentz QOTD)
