Description : Which of the following systems run an application layer firewall using proxy software? 1) Proxy NAT 2) Proxy client 3) Client 32 4) Proxy server
Last Answer : 4) Proxy server
Description : Which among the following is correct characteristics about proxy server: a) A proxy server may act as a firewall by responding to input packets in the manner of an application while blocking other packets. b) A ... as a proxy on behalf of the network user; d) All of the Above e) None of These
Last Answer : d) All of the Above
Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False
Last Answer : A) True, False
Description : Main function of proxy application gateway firewall is a. to allow corporate users to use efficiently all internet services b. to allow intranet users to securely use specified internet services ... to use all internet services d. to prevent corporate users from using internet services
Last Answer : b. to allow intranet users to securely use specified internet services
Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client
Last Answer : b. Intranet
Description : The purpose of a proxy server is to control exchange of data between the two networks at …………..instead of ……….. A. an application level , an IP level B. network layer, physical layer C. an application layer, physical layer D. Network layer , an application layer
Last Answer : A. an application level , an IP level
Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv
Last Answer : c. i, ii, iii, iv
Description : Which of the following will help you to improve your LAN security? 1) Change your passwords frequently 2) Install a firewall program 3) Use a proxy 4) All of the above
Last Answer : 3) Use a proxy
Description : Which of the following will help you to improve your LAN security? 1 Change your passwords frequently 2 Install a firewall program 3 Use a proxy 4 All of the above
Last Answer : 3 Use a proxy
Description : In which layer of OSI client send request to the server? a. Application layer b. Presentation layer c. Session layer d. Transport layer
Last Answer : c. Session layer
Description : A packet filtering firewall operates at which of the following OSI layer? 1) At the Application layer 2) At the Transport Layer 3) At the Network Layer 4) Both 2 and 3
Last Answer : 4) Both 2 and 3
Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1) Application layer Firewall 2) Packet Filtering Firewall 3) Router enhanced firewall 4) IP enabled firewall
Last Answer : 2) Packet Filtering Firewall
Description : A packet filtering firewall operates at which of the following OSI layer? 1 At the Application layer 2 At the Transport Layer 3 At the Network Layer 4 Both 2 and 3
Last Answer : 4 Both 2 and 3
Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 Application layer Firewall 2 Packet Filtering Firewall 3 Router enhanced firewall 4 IP enabled firewall
Last Answer : 2 Packet Filtering Firewall
Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these
Last Answer : a) Cybergaming crime
Description : State weather the following statement is true or false for Sendmail. 1).Sendmail is a command-line tool designed for most UNIX-like operating systems. 2).It define a method of transferring mail, and acts as a client/server ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : A. 1. True, 2. False, 3. true
Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : Which software model is best suitable for client server application? -Technology
Last Answer : Concurrent Process model is best suitable for client server application.
Description : Which statement best describes the relationship between application, server, and client in a multitenancy environment? A. Single instance of software running on a server and serves one client. B ... clients. D. Multiple instances of software running on multiple servers and serves one client.
Last Answer : Single instance of software running on a server and serves multiple clients.
Description : Which of the following Operating Systems do you choose to implement a client Server Network 1) MS DOS 2) Windows 7 3) Windows XP 4) Windows 2003
Last Answer : 4) Windows 2003
Description : Which of the following Operating Systems do you choose to implement a client Server Network 1 MS DOS 2 Windows 7 3 Windows XP 4 Windows 2003
Last Answer : 4 Windows 2003
Description : A ______ is a combination load balancer and application server that is a server placed between a firewall or router. a) ABC b) ACD c) ADC d) All of the mentioned
Last Answer : ADC
Description : . A ______ is a combination load balancer and application server that is a server placed between a firewall or router. a) ABC b) ACD c) ADC d) All of the mentioned
Description : ____intercepts all messages entering and leaving the network. The _____effectively hides the true network addresses: a) Circuit Level Gateway b) Proxy Server c) Packet Filter d) None of These
Last Answer : b) Proxy Server
Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.
Last Answer : d. To hide malicious activity on the network.
Description : The.... controls a client computer's resources. 1) Application program 2) Instruction set 3) Operating System 4) Server application
Last Answer : 4) Server application
Description : The.... controls a client computer's resources. 1 Application program 2 Instruction set 3 Operating System 4 Server application
Last Answer : 4 Server application
Description : Match List I (Political Systems) with List II (Nations) and select the correct answer using the code given below: L i st I : (Poli t i cal Syst ems) A. Federal, Presidential, Republic B. Federal, Parliamentary, Republic C. Unitary, ... -III (3) A-V, B-IV, C-II, D-III (4) A-V, B-II, C-III, D-IV
Last Answer : (1) A-IV, B-I, C-II, D-V
Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1) DSL modem 2) A multi-homed firewall 3) VLAN 4) A brouter that acts both as a bridge and a router
Last Answer : 2) A multi-homed firewall
Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1 DSL modem 2 A multi-homed firewall 3 VLAN 4 A brouter that acts both as a bridge and a router
Last Answer : 2 A multi-homed firewall
Description : Which statement best describes the Software as a Service cloud delivery model? A. A virtual machine provisioned and provided from the cloud which allows the customer to deploy custom ... and run the application on the customer's own computers and simplifying maintenance and support.
Last Answer : An application delivered to the client from the cloud which eliminates the need to install and run the application on the customer's own computers and simplifying maintenance and support.
Description : The reasons leading to popularity of client-server systems are: A) More powerful workstations on LANs B) Needed for graphical user interfaces of end users. C) Remove computing load for presentation services from the system managing a shared database resource. D) All
Last Answer : D) All
Description : What is the main function of Session layer in OSI model? a. Defines how data is formatted between the devices b. Made physical connection between server and client c. Both a and b d. None of the above
Last Answer : a. Defines how data is formatted between the devices
Description : The Post Office Protocol is an ………... protocol with both client (sender/receiver) and …………...functions A. electronic mail, server (storage) B. three layer , server C. UDP, transfer D. TCP, server
Last Answer : A. electronic mail, server (storage)
Description : The first paper published on firewall technology was in ____, when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls: a) 1988 b) 1999 c) 1992 d) None of These
Last Answer : a) 1988
Description : A _____ is a computer, appliance, or router that sits between the trusted and untrusted systems. (1) bridge (2) switch (3) firewall (4) hub
Last Answer : firewall
Description : 4. What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems
Last Answer : d. Open computer systems, communication systems, embedded systems
Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems
Description : What are the three general categories of computer systems that can contain digital evidence? A. Desktop, laptop, server B. Personal computer, Internet, mobile telephone C. Hardware, software, networks D. Open computer systems, communication systems, and embedded systems
Last Answer : D. Open computer systems, communication systems, and embedded systems
Description : What's a legit proxy server that would let me watch hulu outside the U.S.?
Last Answer : answer:www.hidemyass.com works just often enough for me (I’m in the Netherlands) that I’ll recommend it. But it doesn’t work always. What do you normally use?
Description : Would anyone that does not live in the United States and uses Firefox be willing to test out a Proxy server for me?
Last Answer : Moi help.
Description : How do I flush my proxy server?
Last Answer : This is a crazy question. If you had the know to set up a proxy server, you would have the ability to flush it. What type of proxy server is it? Is is physically at your location? Do you have administrator rights on the server? Can you connect via telnet/ssh to the server?
Description : Is there a to automatically use a proxy server when connecting to a network?
Last Answer : Use FoxyProxy Firefox extension :)
Description : What is a proxy server ?
Last Answer : Answer : A proxy is a type of computer network that indirectly connects the user to the Internet. And those who have this kind of service , they are proxy server , that is, the user and ... is hidden. In simple language , we can browse the net by keeping our information secret through proxy server
Description : What is a proxy server ps4?
Last Answer : In a computer network proxy servers act as intermediary for request from clients seeking resources from other servers (Wikipedia).Adding proxy servers can be hard if you are not used to network related topics. Proxy ... tips to add PS4 1. Select DHCP host as do not specify 2. Use DNS as automatic