Carlos CSS10 Q1 LM5
Carlos CSS10 Q1 LM5
Department of Education
Region V
Schools Division of Sorsogon
BULAN NATIONAL HIGH SCHOOL
Bulan, Sorsogon
mjgsierra
III. PRETEST: (Please answer the pre-test before you read the information sheet.)
Choose the correct answer. Write only the letter on the blank provided in learner answer sheet that
can be found in the last
page of this learning material.
1. What is a network security system that monitors and controls the incoming and outgoing network
traffic based on predetermined security rules?
a. Firewall b. Antivirus c. Encryption d. Passkey
2. It is consists of the policies and practices adopted to prevent and monitor unauthorized access,
misuse, modification, or denial of a computer network and network-accessible resources.
a. Firewall b. Inbound rules c. Outbound rules d. Network
Security
3. A firewall that filter traffic between two or more networks; they are either software
appliances running on general purpose hardware, or hardware-based firewall computer appliances.
a. network firewall b. host-based firewall c. firewall with advanced security d. windows
firewall
4. Which rules are applied to the traffic that is coming from the network and the Internet to your
computer or device?
a. Inbound rules b. Outbound rules c. Connection security rules d.
Monitor rules
5. These used to secure traffic between two computers while it crosses the network.
a. Inbound rules b. Outbound rules c. Connection security rules d.
Monitor rules
B. INFORMATION SHEET:
FIREWALL
A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based
on predetermined security rules. A firewall typically establishes a barrier between a trusted, secure internal network
and another outside network, such as the Internet, that is assumed not to be secure or trusted. Firewalls are often
categorized as either network firewalls or host-based firewalls. Network firewalls filter traffic between two or more
networks; they are either software appliances running on general purpose hardware, or hardware-based firewall
computer appliances. Host-based firewalls provide a layer of software on one host that controls network traffic in
and out of that single machine. Firewall appliances may also offer other functionality to the internal network they
protect, such as acting as a DHCP or VPN server for that network.
NETWORK SECURITY
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access,
misuse, modification, or denial of a computer network and network-accessible resources. Network security involves
the authorization of access to data in a network, which is controlled by the network administrator. Users choose or
are assigned an ID and password or other authenticating information that allows them access to information and
programs within their authority. Network security covers a variety of computer networks, both public and private,
that are used in everyday jobs, conducting transactions and communications among businesses, government agencies
and individuals. Networks can be private, such as within a company, and others which might be open to public
access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title
explains: It secures the network, as well as protecting and overseeing operations being done. The most common and
simple way of protecting a network resource is by assigning it a unique name and a corresponding password.
The Windows Firewall with Advanced Security is a tool which gives you detailed control over the rules that
are applied by the Windows Firewall. You can view all the rules that are used by the Windows Firewall, change their
properties, create new rules or disable existing ones. In this tutorial we will share how to open the Windows Firewall
with Advanced Security, how to find your way around it and talk about the types of rules that are available and what
kind of traffic they filter.
HOW TO ACCESS THE WINDOWS FIREWALL WITH ADVANCED SECURITY?
You have several alternatives to opening the Windows Firewall with Advanced Security:
The Windows Firewall with Advanced Security looks and works the same both in Windows 7 and Windows
8.1.
These rules can be configured so that they are specific to computers, users, programs, services, ports or
protocols. You can also specify to which type of network adapter (e.g. wireless, cable, virtual private
network) or user profile it is applied to.
In the Windows Firewall with Advanced Security, you can access all rules and edit their properties. All you
have to do is click or tap the appropriate section in the left-side panel.
Connection security rules are used to secure traffic between two computers while it crosses the network.
One example would be a rule which defines that connections between two specific computers must be
encrypted.
Unlike the inbound or outbound rules, which are applied only to one computer, connection security rules
require that both computers have the same rules defined and enabled.
The Windows Firewall with Advanced Security includes some monitoring features as well. In
the Monitoring section you can find
the following information: the
firewall rules that are active (both
inbound and outbound), the connection security rules that are active and whether there are any active
security associations.
V. PRACTICE TASK 1. WORDSEARCH. Search the following word either vertically, horizontally, or
diagonally. Use the answer sheet located at the last page of this learning material.
1. FIREWALL
2. INBOUND
3. OUTBOUND
4. SECURITY
5. HOSTBASED
PRACTICE TASK 2. Please write your answer on the blank provided in the Learners Answer Sheet
which is located at the last page of
this learning material.
Enumerate the different methods of accessing windows firewall with advanced security.
Write the steps in configuring/ blocking a program from accessing the internet under
outbound rules. (you can search or browse from the internet or youtube)
PRACTICE TASK 3. Please write your answer on the blank provided in the Learners Answer Sheet
which is located at the last page of
this learning material.
In your own understanding, what is the difference between inbound rules and outbound
rules.?
VI. POST TEST: Choose the correct answer. Write your answer on the answer sheet provided in the last
page of this learning material.
1. Which rules are applied to the traffic that is coming from the network and the Internet to your
computer or device?
a. Inbound rules b. Outbound rules c. Connection security rules d.
Monitor rules
2. These used to secure traffic between two computers while it crosses the network.
a. Inbound rules b. Outbound rules c. Connection security rules d.
Monitor rules
3. It is consists of the policies and practices adopted to prevent and monitor unauthorized access,
misuse, modification, or denial of a computer network and network-accessible resources.
a. Firewall b. Inbound rules c. Outbound rules d. Network
Security
4. A firewall that filter traffic between two or more networks; they are either software
appliances running on general purpose hardware, or hardware-based firewall computer appliances.
a. network firewall b. host-based firewall c. firewall with advanced security d. windows
firewall
5. What is a network security system that monitors and controls the incoming and outgoing network
traffic based on predetermined security rules?
a. Firewall b. Antivirus c. Encryption d. Passkey
Using any of your available resources (books, modules, Windows 10 computer, etc.) or
youtube video.
1. Enumerate the steps/procedure of accessing firewall of computer with Windows 10 operating
system
VIII. RUBRIC/S
A. PRACTICE TASK 1
Found all five words 5
Found only 4 words 4
Found only 3 words 3
Found only 2 words 2
Found only 1 word 1
No answer/ Found no word/s 0
B. PRACTICE TASK 2
Answers at least 3 methods correctly, 10
Wrote the steps in blocking program using outbound rules correctly.
Answers 3 methods but only two are correct, 8
Wrote the steps in blocking program using outbound rules with
minimal errors
Answers only two correct method 6
Wrote the steps in blocking program using outbound rules
Answers 2 or 3 but only 1 method is correct 4
Without answer in steps in blocking program using outbound rules
Answers only 1 method correctly 2
Without answer in steps in blocking program using outbound rules
No answer 0
C. PRACTICE TASK 3
Correctly differentiated with comprehensive 10
explanation.
Correctly differentiated with minimal explanation 8
Correctly differentiated with minor errors 6
Correctly differentiated but wordings are copied from 4
this module
With answer but incorrectly differentiated 2
No answer 0
E. PRETEST
1. ________
2. ________
3. ________
4. ________
5. ________
PRACTICE TASK 1. WORDSEARCH. Search the following word either vertically, horizontally, or diagonally.
Use the answer sheet located at the last page of this learning material.
1. FIREWALL
2. INBOUND
3. OUTBOUND
4. SECURITY
5. HOSTBASED
F. PRACTICE TASK 2
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_________________________________________________________________________________.
G. PRACTICE TASK 3
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
___________________________________________________________________________
H. POST TEST:
1. _____
2. _____
3. _____
4. _____
5. _____
ENRICHMENT/ADDITIONAL ACTIVITIES:
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
__________________________________
________________________________________________
(Parent’s Signature Over Printed Name)