Understanding the types of threats that are in existence will allow you to assess them and find a suitable solution to mitigate those risks. Good mitigation techniques include layered defenses, or defense-in-depth.
Explain layered defenses and describe the processes involved to ensure that layered defenses provide the appropriate level of network security. As part of the layered defense, be certain to discuss five (5) firewall types (ie. Application firewall) and suggest the most appropriate firewall to use when considering layered defenses. Defend your answer and position with additional research.