CompTIA Network+ N10-007 Exam: Opening Ports 20 and 21 on Firewall | Precautions and Steps

Before making changes: Document Request and Follow Approval Process

Prev Question Next Question

Question

A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company's firewall to allow customers to retrieve a large file.

Which of the following should the administrator perform BEFORE making the needed changes? (Choose two.)

A.

Document the reason for the request B.

Scan the file for malware to protect the sales department's computers C.

Follow the company's approval process for the implementation D.

Install a TFTP server for the customers to use for the transfer E.

Create a honeypot to store the file on for the customers to use F.

Write the SLA for the sales department authorizing the change.

AC.

Explanations

A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company's firewall to allow customers to retrieve a large file.

Which of the following should the administrator perform BEFORE making the needed changes? (Choose two.)

A.

Document the reason for the request

B.

Scan the file for malware to protect the sales department's computers

C.

Follow the company's approval process for the implementation

D.

Install a TFTP server for the customers to use for the transfer

E.

Create a honeypot to store the file on for the customers to use

F.

Write the SLA for the sales department authorizing the change.

AC.

The correct answers for this question are A and C.

A. Document the reason for the request: Before making any changes to the firewall, it is important to understand the reason for the request. This will help the network administrator make an informed decision and ensure that the change aligns with the company's policies and goals. Documenting the reason for the request will also help in future troubleshooting or audits.

C. Follow the company's approval process for the implementation: Making changes to a company's firewall requires proper approval and authorization. Following the company's approval process ensures that the change is reviewed and authorized by the appropriate personnel. This also helps to maintain a secure and stable network environment.

B. Scan the file for malware to protect the sales department's computers: While it is important to protect the sales department's computers from malware, scanning the file is not necessary before opening ports 20 and 21. These ports are commonly used for FTP, which is a legitimate file transfer protocol.

D. Install a TFTP server for the customers to use for the transfer: Installing a TFTP server is not necessary for this request as the customers will likely be using FTP to retrieve the file. TFTP is a different protocol and requires a different server.

E. Create a honeypot to store the file on for the customers to use: A honeypot is a decoy system designed to lure attackers away from the real system. It is not relevant for this request as the customers are not attacking the system.

F. Write the SLA for the sales department authorizing the change: While it is important to have a Service Level Agreement (SLA) in place, it is not necessary for this request. An SLA is a contract between the service provider and the customer, and is typically used to define the level of service and support provided. It is not relevant for this request as it is a one-time change to the firewall.