CompTIA Security Plus Mock Test Q794

Which of the following is an important step in the initial stages of deploying a host-based firewall?

A. Selecting identification versus authentication
B. Determining the list of exceptions
C. Choosing an encryption algorithm
D. Setting time of day restrictions

Correct Answer: B
Section: Application, Data and Host Security

Explanation:
A host-based firewall is installed on a client system and is used to protect the client system from the activities of the user as well as from communication from the network or Internet.
These firewalls manage network traffic using filters to block certain ports and protocols while allowing others to pass through the system.

Incorrect Answers:
A: A host-based firewall is used to filter network traffic; it does not perform identification or authentication.
C: A host-based firewall is used to filter network traffic; it does not provide encryption functions.
D: A host-based firewall is used to filter and restrict network traffic based on ports and protocols, not on time of day.

References:
Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp. 246