Grade 10-12 - Week 5
Grade 10-12 - Week 5
Grade 10-12 - Week 5
Quarter 2 – Week 5
Name of Learner: _____________________ Grade and Section: ________________
Date: ________________
Hardware and software firewalls protect data and equipment on a network from
unauthorized access. A firewall should be used in addition to security software.
Hardware and software firewalls have several modes for filtering network data traffic:
Packet filter – This is a set of rules that allows or denies traffic based on criteria
such as IP addresses, protocols, or ports used.
Proxy firewall – This is a firewall installed on a proxy server that inspects all traffic
and allows or denies packets based on configured rules. A proxy server is a server
that is a relay between a client and a destination server on the Internet.
Stateful packet inspection – This is a firewall that keeps track of the state of
network connections traveling through the firewall. Packets that are not part of a
known connection are dropped.
Hardware Firewall
A hardware firewall is a physical filtering component that inspects data packets from the
network before they reach computers and other devices on a network. A hardware firewall is
a free-standing unit that does not use the resources of the computers it is protecting, so
there is no impact on processing performance.
Software Firewall
A software firewall is an application on a computer that
inspects and filters data packets. Windows Firewall is
an example of a software firewall that is included in the
Windows operating system. A software firewall uses
the resources of the computer, resulting in reduced
performance for the user
Software firewalls can be either an independent
application or part of the operating system. There are
several third-party software firewalls. There is also a
software firewall built into Windows 10.
2. Exercises / Activities
2.1 Multiple Choice. Encircle the correct answer from the given choices below.
1. These are the common threats when linking your computer to a network or the internet,
except.
a. Hacking c. identity theft
b. cloud storage d. online fraud
2. The most basic form of protection and is meant for smaller networks.
a. Stateful multi-layer inspection (SMLI) firewalls
b. Packet-filtering firewalls
c. Next-generation firewalls (NGFW)
d. Network address translation (NAT) firewalls
4. This involves using data from prior connections and packets from the same connection.
a. Stateful multi-layer inspection (SMLI) firewalls
b. Packet-filtering firewalls
c. Next-generation firewalls (NGFW)
d. Network address translation (NAT) firewalls
5. The risk that attackers could shut down your network if without a firewall.
a. Open access c. Network crashes
b. Lost or compromised data d. None
6. The risk that you’re accepting every connection into your network from anyone if without
a firewall.
a. Open access c. Network crashes
b. Lost or compromised data d. None
7. This is a firewall that keeps track of the state of network connections traveling through
the firewall.
a. Stateful packet inspection c. Packet Filter
b. Proxy Firewall d. None
8. This is a set of rules that allows or denies traffic based on criteria such as IP addresses,
protocols, or ports used.
a. Stateful packet inspection c. Packet Filter
b. Proxy Firewall d. None