What are some of the benefits of using a firewall for your LAN?
1) Increased access to Instant Messaging
2) Stricter access control to critical resources
3) Greater security to your LAN
4) Both 2 and 3

1 Answer

Answer :

4) Both 2 and 3

Related questions

Description : What are some of the benefits of using a firewall for your LAN? 1 Increased access to Instant Messaging 2 Stricter access control to critical resources 3 Greater security to your LAN 4 Both 2 and 3

Last Answer : 4 Both 2 and 3

Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1) DSL modem 2) A multi-homed firewall 3) VLAN 4) A brouter that acts both as a bridge and a router

Last Answer : 2) A multi-homed firewall

Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1 DSL modem 2 A multi-homed firewall 3 VLAN 4 A brouter that acts both as a bridge and a router

Last Answer : 2 A multi-homed firewall

Description : Which of the following will help you to improve your LAN security? 1) Change your passwords frequently 2) Install a firewall program 3) Use a proxy 4) All of the above

Last Answer : 3) Use a proxy

Description : Which of the following will help you to improve your LAN security? 1 Change your passwords frequently 2 Install a firewall program 3 Use a proxy 4 All of the above

Last Answer : 3 Use a proxy

Description : If you want to connect to your own computer through the internet from another location you can use: a) Telnet b) Instant Messaging c) FTP d) E- Mail e) None of These

Last Answer : a) Telnet

Description : Which of these is not a means of personal communication on the internet? a) Chat b) Instant messaging c) Instanotes d) Electronic mail e) None of these

Last Answer : c) Instanotes

Description : My friends were using text messaging to instant message people through aim?

Last Answer : Were they? You should ask them how.

Description : Critical Region is: a) a set of instructions that access common shared resources which exclude one another in time b) the portion of the main memory which can be accessed only by one process at a time. c) Both of The Above d) None of The Above

Last Answer : a) a set of instructions that access common shared resources which exclude one another in time

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. ... it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet

Last Answer : c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

Description : What is value of using access control database transaction and firewall log files?

Last Answer : Need answer

Description : Do you know of any books that critique texting, instant messaging, or casual speech/writing among teens and young adults througout history?

Last Answer : answer:Try something like this: link The general area for that type of material appears to be (LC Classification: LC149) http://primo02v1 ... =false&query=isbn%2Cexact%2C0415687152&scp.scps=&dstmp=1413557781921&dym=true&bulkSize=30&vl(freeText0)=0415687152&group=GUEST&vid=discovere&institution=EMORY

Description : Is instant messaging ruining your life?

Last Answer : Nope. The opposite. Just text messages – no email. Fewer phone calls.

Description : Does "kk" stand for anything when chatting/instant messaging?

Last Answer : I’m guessing it’s similar to “ok,” “mk,” “k,” “mkay,” “okay,” etc. And they said the internet squelches creativity…

Description : Do you think communication technologies like blogs, instant messaging, texting, and the like, have weakened humanity's ability to communicate orally?

Last Answer : Actually, I think they have enhanced it for me. Now, how I type online is a lot like how I speak. In fact, I sometimes even mouth the words as I type them when I'm IMing, etc. The ... and express them accordingly is good, and even if it is online, it still improves my oral communication as well.

Description : Best instant messaging protocol?

Last Answer : answer:http://en.wikipedia.org/wiki/Comparison_of_instant_messaging_protocols Personally i prefer XMPP – lots of tools/features and easy to get going.

Description : Which Instant Messaging client is most reliable?

Last Answer : i prefer pidgin http://pidgin.im

Description : Instant messaging help!

Last Answer : adium on a mac trillian on PC

Description : Point out the wrong statement. a) All IM clients use peer-to-peer messaging b) IM software aimed at businesses such as XMPP, Lotus Sametime, and Microsoft Office Communicator use a client/server ... messaging is as popular in business as it is in personal communications d) None of the mentioned

Last Answer : None of the mentioned

Description : How many types of protocols are important for instant messaging? a) 2 b) 3 c) 4 d) All of the mentioned

Last Answer : 3

Description : Is it safe to send sensitive data via email or instant messaging (IM)?

Last Answer : No, you shouldn’t send sensitive personal information like credit card numbers, passwords, your date of birth or Social Security number using email or IM on your computer or any other Web-enabled devices such as a smartphone, tablet or personal digital assistant (PDA).

Description : Which among the following is correct: a) A firewall is a system designed to prevent unauthorized access to or from a private network. b) Firewalls can be implemented in both hardware and software or a combination of both. c) Both of Above d) None of these

Last Answer : c) Both of Above

Description : A firewall is a network security system ______based that controls incoming and outgoing network traffic based on a set of rules: a) Hardware b) Software c) Both hardware or software d) None of These

Last Answer : c) Both hardware or software

Description : Does stricter gun control prevent gun violence?

Last Answer : According to the Australians, it does.

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1) Application layer Firewall 2) Packet Filtering Firewall 3) Router enhanced firewall 4) IP enabled firewall

Last Answer : 2) Packet Filtering Firewall

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 Application layer Firewall 2 Packet Filtering Firewall 3 Router enhanced firewall 4 IP enabled firewall

Last Answer : 2 Packet Filtering Firewall

Description : If the angle of attack is increased beyond the critical angle of attack, the wing will no longer produce sufficient lift to support the weight of the aircraft: a. Unless the airspeed is greater ... below the natural horizon d. In which case, the control column should be pulled-back immediately

Last Answer : b. Regardless of airspeed or pitch attitude

Description : Which of the following tool is used for security checks as port scanning and firewall testing? A. Netcat B. Nmap C. Data communication D. Netscan

Last Answer : A. Netcat

Description : LAN stands for (1) Land Area Network (2) Local Area Network (3) Local Access Network (4) Local Area Netware

Last Answer : Local Area Network

Description : Which among the following is correct features about LAN (Local Area Network): a) LANs are small size networks which only covers a few buildings or a campus up to few kilometers. b) LANs are widely used to connect ... to share printers in a Lab or in a department. d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : A person who used his/her expertise to gain access to other people's computers to get information illegally or do damage is a ________: a) Hacker b) Analyst c) Instant Messenger d) Programmer e) Spammer

Last Answer : a) Hacker

Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.

Last Answer : Access to critical data is better controlled in a private cloud environment

Description : In your opinion do you really believe that stricter gun laws will stop these radical mass shootings?

Last Answer : But the black market will really boom, by making them illegal,the underworld will totally prosper,is that another form of privatization?

Description : Do you think stricter gun laws would prevent mass shootings in America?

Last Answer : No, I do not…. What law, specifically, would you like to seen enacted that you think would be helpful?

Description : Do any of you wish that your parents had been stricter disciplinarians?

Last Answer : answer:Two things I wish my parents had been more adamant about are cleaning and money management. My mom never made my sister and me keep our room clean, and very rarely had us clean up the mess. As a ... teach an old dog (me) new tricks - much less have that dog teach those tricks to her puppies!

Description : Which one of the following statements about self-regulatory programmes is FALSE? A)they are usually less expensive than governmental ones VU Cafeteria B)their guidelines are generally more ... nor the authority to enforce guidelines D)the guidelines are generally stricter than governmental ones

Last Answer : D)the guidelines are generally stricter than governmental ones

Description : What is the access point (AP) in a wireless LAN? a) device that allows wireless devices to connect to a wired network b) wireless devices itself c) both device that allows wireless devices to connect to a wired network and wireless devices itself d) all the nodes in the network

Last Answer : a) device that allows wireless devices to connect to a wired network

Description : Access - control based on a person's fingerprints is an example of _____: a) Biometric Identification b) Characteristic Identification c) Characteristic Security d) Fingerprint Security e) Logitstics

Last Answer : a) Biometric Identification

Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : c. i, ii, iii, iv 

Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above

Last Answer : c) Firewall

Description : Which will not harm computer resources a. firewall b. Virus c. Trojan horse d. None of the above

Last Answer : a. firewall

Description : Which of the following systems run an application layer firewall using proxy software? 1) Proxy NAT 2) Proxy client 3) Client 32 4) Proxy server

Last Answer : 4) Proxy server

Description : Which of the following systems run an application layer firewall using proxy software? 1 Proxy NAT 2 Proxy client 3 Client 32 4 Proxy server

Last Answer : 4 Proxy server

Description : Experienced PC security enthusiasts: What AV/Firewall/Spyware combo have you found to offer the best protection?

Last Answer : I use PCTools Firewall and AntiVirus, as well as ThreatFire and Ad-Aware. So far so good. I’ve been through dozens of FW and AV programs, and I could easily tell you which ones DON’T work. Anything made/sold/offered by Symantec

Description : I found this in the Package Rules menu:

Last Answer : answer:

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : __________ is a measure of whether the operation is inside or outside the security boundary or network firewall. a) Per b) P c) Pre d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above

Last Answer : d. all the above