Which of the following are true about firewalls?
1) Filters network traffic
2) Can be either a hardware or software device
3) Follows a set of rules
4) All the above

1 Answer

Answer :

4) All the above

Related questions

Description : Which of the following are true about firewalls? 1 Filters network traffic 2 Can be either a hardware or software device 3 Follows a set of rules 4 All the above

Last Answer : 4 All the above

Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : A firewall is a network security system ______based that controls incoming and outgoing network traffic based on a set of rules: a) Hardware b) Software c) Both hardware or software d) None of These

Last Answer : c) Both hardware or software

Description : Which among the following is correct: a) A firewall is a system designed to prevent unauthorized access to or from a private network. b) Firewalls can be implemented in both hardware and software or a combination of both. c) Both of Above d) None of these

Last Answer : c) Both of Above

Description : Firewalls are often categorized as: a) Network Firewalls b) Host Based Firewalls c) Either Network firewalls or Host based firewalls d) None of These

Last Answer : c) Either Network firewalls or Host based firewalls

Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance

Last Answer : a. You can control where traffic goes in the three networks

Description : Application layer firewalls works on the application level of the ____stack (i.e. all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application: a) TCP b) IP c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : It is the set of programs that enables your computers hardware device and application software to work together. A. Operating system B. Helper software C. System software D. Application software

Last Answer : C. System software

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : _________ is a combination of hardware and software that facilitates the sharing of information between computing devices. a) Network b) Peripheral c) Expansion Board d) Digital Device

Last Answer : a) Network

Description : Point out the wrong statement. a) A cloud is defined as the combination of the infrastructure of a datacenter with the ability to provision hardware and software b) High touch applications are best done on-premises c) The Google App Engine follows IaaS d) None of the mentioned

Last Answer : The Google App Engine follows IaaS

Description : Point out the wrong statement. A. A cloud is defined as the combination of the infrastructure of a datacenter with the ability to provision hardware and software B. High touch applications are best done on-premises C. The Google App Engine follows IaaS D. All of the above

Last Answer : The Google App Engine follows IaaS

Description : Point out the wrong statement. a) A cloud is defined as the combination of the infrastructure of a datacenter with the ability to provision hardware and software b) High touch applications are best done on- premises c) The Google App Engine follows IaaS d) None of the mentioned

Last Answer : The Google App Engine follows IaaS

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : Firewalls are used to protect a communication network system against: (A) Unauthorized attacks (B) Virus attacks (C) Data-driven attacks (D) Fire-attacks

Last Answer : Answer: A In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a ... outside network, such as the Internet, that is assumed to not be secure or trusted.

Description : What do you mean by cloud in cloud computing? A. Data exchanged among grid nodes. B. Provides tools to monitor and distribute the number of licenses. C. Provides logical view of data. D. Set of hardware, software, network, storage, services and interfaces.

Last Answer : Set of hardware, software, network, storage, services and interfaces.

Description : If you have more than one computer connected in the home, it is important to protect every computer. You should have a ____firewall (such as a router) to protect your network: a) Hardware b) Software c) HTML d) None of These

Last Answer : a) Hardware

Description : Network Architecture refers to the layout of the network consisting of the hardware, software, connectivity, communication protocols and mode of transmission, such as ____: a) Wired b) Wireless c) Wired or Wireless d) None of These

Last Answer : c) Wired or Wireless

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : A Group Ware is a (1) Hardware (2) Network (3) Software (4) Firmware

Last Answer : Software

Description : The first paper published on firewall technology was in ____, when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls: a) 1988 b) 1999 c) 1992 d) None of These

Last Answer : a) 1988

Description : Firewalls are used to protect: a) Home Networks b) Corporate Networks c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet especially ____: a) Intranets b) Extranets c) Both of Above d) None of These

Last Answer : a) Intranets

Description : Firewall as part of a router program a. filters only packets coming from internet b. filters only packets going to internet c. filters packets travelling from and to the intranet from the internet d. ensures rapid traffic of packets for speedy e-Commerce

Last Answer : c. filters packets travelling from and to the intranet from the internet 

Description : VLANs can_________. A) reduce network traffic B) provide anextra measure of security C) either (a)or (b) D) both (a) and (b)

Last Answer : both (a) and (b)

Description : The network layer contains which hardware device? a. Routers, Bridges b. Bridges only c. Bridges and switches d. Routers, Bridges and Switches

Last Answer : d. Routers, Bridges and Switches

Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the busspeed. ii) It is multipoint configuration. A) True, True B) True, False C) False, True D) False, False

Last Answer : A) True, True

Description : A service that concentrates on hardware follows the _________ as a Service model. a) IaaS b) CaaS c) PaaS d) All of the mentioned

Last Answer : IaaS

Description : A service that concentrates on hardware follows the _________ as a Service model. a) IaaS b) CaaS c) PaaS d) All of the mentioned

Last Answer : IaaS

Description : A service that concentrates on hardware follows the _________ as a Service model. a) IaaS b) CaaS c) PaaS d) All of the mentioned

Last Answer : IaaS

Description : Hardware and Software Network Solutions From Barracuda?

Last Answer : When it comes to security and performance of a computer network, Barracuda offers some of the best solutions. Whether it is software or hardware, Barracuda Networks is a company that can be ... the company's physical hardware, while the rest of the products are considered "virtual appliances."

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : ________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. a) Internet Hardware Addresses b) Ethernet Software Addresses c) Ethernet Hardware Addresses d) None of the mentioned

Last Answer : Ethernet Hardware Addresses

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : Human beings are referred to as Homosapinens, which device is called Sillico Sapiens? A) Monitor B) Hardware C) Robot D) Computer

Last Answer : Answer : D

Description : Regarding a VDU, Which statement is more correct? A) It is an output device B) It is an input device C) It is a peripheral device D) It is hardware item

Last Answer : Answer : C

Description : Which is a hardware component or system of components that allows a human being to interact with a computer? A. Interface device (IDF) B. Graphical User Interface (GUI) C. Musical Digital Instrument Interface (MIDI) D. None of the Above

Last Answer : A. Interface device (IDF)

Description : If no one follows any rules and morals, why should I? (see the details)

Last Answer : Because with teamwork you can fight and survive better than going alone.

Description : A valid XML document that follows all grammar rules is well_formed document. -Technology

Last Answer : True A well-formed XML document means that the document has the correct XML syntax and follows proper grammar rules.

Description : Which method of psychology follows scientific rules ?

Last Answer : The scientific method of psychology follows the principles of scientific law.

Description : A mode filter is a device that attenuates specific modes propagating in the core of an optical fiber. What mode propagating along single mode fibers do mode filters eliminate?

Last Answer : Second-order mode.

Description : __________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud. a) Database b) Network c) System d) Hardware

Last Answer : d) Hardware

Description : In Windows, Icons such as Add/ Remove programs, Add New Hardware, Modems etc.; are found in : (1) Task Bar (2) Control Panel (3) Network Neighbourhood (4) My Computer

Last Answer : Control Panel

Description : Good standalone free firewalls?

Last Answer : I`ve got just the program for you: Comodo Firewall.

Description : Can firewalls detect virus? -Technology

Last Answer : Firewalls do not screen computer viruses.As the location of firewalls is a good place for scanning, some firewalls have a plug-in virus scanning module.And some programs scan virus at a point either before or after a firewall.

Description : Do Hubs come with hardwire Firewalls like routers"?

Last Answer : Most do not, you can buy a standalone hardware firewall if you wish to do so.

Description : Which of the following is not the Networking Devices? A. Gateways B. Unix C. Routers D. Firewalls

Last Answer : B. Unix

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned