Implementation should include the following steps:
- Educate the end user.
- Configure security settings.
- Configure firewall types.
- Protect against malicious software.
Process/Skill Questions:
- What is the best way to see whether a firewall is allowing or denying access as expected?
- What are some recently exposed malicious software?
- How should a technician educate the end user?