Chapter 8 Assessment
1. When crafting firewall rules, determining what to allow versus what to block is
primarily dependent on what factor?
The first step in determining what to allow and what to block in a firewall's rule
What is the purpose of including rules that block ports, such as 31337?
What security strategy is based on the concept of locking the environment down so
can perform their assigned tasks but little else?
What security strategy reverts to a secure position in the event of a compromise?