Selection should be based on examination and comparison of
- security techniques
- access-control devices
- firewall types
- legal requirements for data protection to which the customer is subject.
Process/Skill Questions:
- How could adopting the wrong approach to security adversely affect the customer’s network/integrity?
- What are some limitations of firewalls?