1. What is the typical relationship among the untrusted network, the firewall, and the trusted network?
Describe how the various types of firewalls interact with network traffic at various levels of the OSI model.
What is a DMZ? Is this really an appropriate name for the technology, considering the function this type of subnet performs?