Why is sub-netting useful in secure network design?
What is the purpose of a DMZ?
How can a DMZ be implemented?
What distinguishes port address translation from static NAT?
What sort of maintenance must be performed on signature-based monitoring software?
Other than attempting to block access to sites based on content, what other security options might be offered by Internet content filters?
What type of software would you use to protect a web server against application-level attacks?
Why would you deploy a reverse proxy?
What is the default rule on a firewall?