Secure Access to Remote Server | Firewall Configuration | CompTIA Server+ Exam SK0-004

Configuring Firewall for Secure Remote Server Access

Prev Question Next Question

Question

A server has recently been configured as a network firewall.

After the firewall was configured, users could no longer access a remote server.

Which of the following, if properly configured on the firewall, will allow users to have secure access to the remote server? (Select TWO).

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E. F.

BF.

First of all, it is important to note that a firewall is a security system that is designed to prevent unauthorized access to or from a private network. Firewalls can be configured to allow or block traffic based on a set of predefined rules.

In this scenario, the users are unable to access a remote server after the firewall was configured. This indicates that the firewall is blocking the traffic required to access the remote server.

To enable secure access to the remote server, two TCP ports need to be allowed on the firewall. The ports that need to be allowed are:

B. Allow TCP port 22 - This is the standard port used for secure shell (SSH) traffic. SSH is a secure protocol used for remote access to servers. Allowing this port on the firewall will enable users to securely access the remote server.

F. Allow TCP port 3389 - This is the standard port used for remote desktop protocol (RDP) traffic. RDP is a protocol used for remote access to graphical desktops. Allowing this port on the firewall will enable users to remotely access the graphical desktop of the remote server.

The other ports listed in the answer choices are not relevant to the scenario described in the question. TCP port 21 is used for FTP traffic, TCP port 23 is used for Telnet traffic, TCP port 25 is used for SMTP traffic, and TCP port 161 is used for SNMP traffic. These ports do not provide secure access to the remote server and are not required in this scenario.