A firewall is a network security system ______based that controls
incoming
and outgoing network traffic based on a set of rules:
a) Hardware
b) Software
c) Both hardware or software
d) None of These

1 Answer

Answer :

c) Both hardware or software

Related questions

Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Description : Which of the following are true about firewalls? 1) Filters network traffic 2) Can be either a hardware or software device 3) Follows a set of rules 4) All the above

Last Answer : 4) All the above

Description : Which of the following are true about firewalls? 1 Filters network traffic 2 Can be either a hardware or software device 3 Follows a set of rules 4 All the above

Last Answer : 4 All the above

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : Which among the following is correct: a) A firewall is a system designed to prevent unauthorized access to or from a private network. b) Firewalls can be implemented in both hardware and software or a combination of both. c) Both of Above d) None of these

Last Answer : c) Both of Above

Description : Forensics is the systematic trucking of incoming and outgoing ruffic on your network (a) Network (b) Computer (c) Criminal (d) Server

Last Answer : d) Server

Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c

Last Answer : A. Flooding

Description : Why should my Skype connection be fast outgoing and slow incoming.

Last Answer : There’s many different variables that come into play. Is there wireless internet? What kind of internet are both of you using? What is your network card set to, full duplex? It really depends.

Description : what- A map is drawn on a coordinate grid, as shown. The line represents an incoming flight path. A plane is about to leave on a perpendicular flight path that runs through the point (0, 4).Which line represents the outgoing flight path?

Last Answer : y= -5x +4

Description : What are Outgoing Calls and Incoming Calls ?

Last Answer : Going out if you call someone. And if someone calls you on your phone, it's called an incoming call.

Description : Which of the following options correctly explains the term heat budget? (1) It is a mode of transfer of heat through matter by molecular activity. (2) It is the balance between incoming and outgoing radiation. ... waves. (4) It is the amount of heat which the surface of earth receives from the sun.

Last Answer : (2) It is the balance between in-coming and outgoing radiation. Explanation: Incoming heat being absorbed by the Earth, and outgoing heat escaping the Earth in the form of radiation are both ... each passing year. This balance between incoming and outgoing heat is known as Earth's heat budget.

Description : Which part acts as a relay station for the incoming and outgoing i pulses to and from the cerebrum?

Last Answer : Thalamus

Description : A 'body' which allows the short wavelength incoming solar radiation to enter in, but does not allow long wave length outgoing infra red radiation to escape out is called the (A) Global warming (B) Green house (C) Atmospheric effect (D) Ionosphere

Last Answer : (B) Green house

Description : What is geostrophic balance? (a) The exact balance of incoming SW and outgoing LW radiation at the top of the atmosphere. (b) The exact balance of vertical pressure gradient and gravity in ... friction. (d) The exact balance of the Coriolis force and the horizontal pressure gradient force.

Last Answer : (d) The exact balance of the Coriolis force and the horizontal pressure gradient force.

Description : The Greenhouse Effect is caused primarily by which of the following processes? w) blocking incoming short wave solar energy x) absorbing incoming short wave solar energy y) heating of the Earth's stratosphere z) absorbing outgoing long wave radiation from the Earth

Last Answer : ANSWER: Z -- ABSORBING OUTGOING LONG WAVE RADIATION FROM THE EARTH 

Description : Which of the following options correctly explains the term heat budget? (1) It is a mode of transfer of heat through matter by molecular activity. (2) It is the balance between incoming and outgoing radiation ... waves. (4) It is the amount of heat which the surface of earth receives from the sun.

Last Answer :  It is the balance between incoming and outgoing radiation

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1) Application layer Firewall 2) Packet Filtering Firewall 3) Router enhanced firewall 4) IP enabled firewall

Last Answer : 2) Packet Filtering Firewall

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 Application layer Firewall 2 Packet Filtering Firewall 3 Router enhanced firewall 4 IP enabled firewall

Last Answer : 2 Packet Filtering Firewall

Description : Firewall: (a) Amplifies weak outgoing signals to stronger ones -Technology

Last Answer : (d) A firewall can either be software based or hardware based and is used to prevent intruders from accessing your system.

Description : I found this in the Package Rules menu:

Last Answer : answer:

Description : Does a Network Bridge have it's own hardware firewall like a router?

Last Answer : A network bridge usually doesn't come with a firewall, just the router.

Description : Does a Network Hub have a hardware firewall?

Last Answer : Some network hubs have them installed for protection

Description : What is hardware and/or software that protects computers from intruders? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : c. Firewall

Description : Software that prevents unauthorized persons from accessing certain parts of a program, database or network is: a) Firewall b) Scanner c) Anti - Virus d) None of These

Last Answer : a) Firewall

Description : __________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud. a) Database b) Network c) System d) Hardware

Last Answer : d) Hardware

Description : What are some of the benefits of using a firewall for your LAN? 1) Increased access to Instant Messaging 2) Stricter access control to critical resources 3) Greater security to your LAN 4) Both 2 and 3

Last Answer : 4) Both 2 and 3

Description : What are some of the benefits of using a firewall for your LAN? 1 Increased access to Instant Messaging 2 Stricter access control to critical resources 3 Greater security to your LAN 4 Both 2 and 3

Last Answer : 4 Both 2 and 3

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : __________ is a measure of whether the operation is inside or outside the security boundary or network firewall. a) Per b) P c) Pre d) All of the mentioned

Last Answer : All of the mentioned

Description : A hardened firewall host on an Intranet is a. a software which runs in any of the computers in the intranet b. a software which runs on a special reserved computer on the intranet c. a stripped down computer connected to the intranet d. a mainframe connected to the intranet to ensure security

Last Answer : b. a software which runs on a special reserved computer on the intranet 

Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity

Last Answer : b) Cyber

Description : The first type of firewall was the packet filter which looks at: a) network addresses b) Ports of the packet and determines if that packet should be allowed or blocked c) Both of above d) None of These

Last Answer : c) Both of above

Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1) DSL modem 2) A multi-homed firewall 3) VLAN 4) A brouter that acts both as a bridge and a router

Last Answer : 2) A multi-homed firewall

Description : A packet filtering firewall operates at which of the following OSI layer? 1) At the Application layer 2) At the Transport Layer 3) At the Network Layer 4) Both 2 and 3

Last Answer : 4) Both 2 and 3

Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1 DSL modem 2 A multi-homed firewall 3 VLAN 4 A brouter that acts both as a bridge and a router

Last Answer : 2 A multi-homed firewall

Description : A packet filtering firewall operates at which of the following OSI layer? 1 At the Application layer 2 At the Transport Layer 3 At the Network Layer 4 Both 2 and 3

Last Answer : 4 Both 2 and 3

Description : ……….. is a software that controls and manages the hardware. -Technology

Last Answer : Operating Systemis a software that controls and manages the hardware.

Description : Software programme that controls a piece of hardware is called: A. Control Panel B. Driver C. Messenger D. Browser

Last Answer : ANSWER: B

Description : Software programme that controls a piece of hardware is called: A. Control Panel B. Driver C. Messenger D. Browser

Last Answer : ANSWER: B

Description : Which of the following will help you to improve your LAN security? 1) Change your passwords frequently 2) Install a firewall program 3) Use a proxy 4) All of the above

Last Answer : 3) Use a proxy

Description : Which of the following will help you to improve your LAN security? 1 Change your passwords frequently 2 Install a firewall program 3 Use a proxy 4 All of the above

Last Answer : 3 Use a proxy

Description : Which of the following tool is used for security checks as port scanning and firewall testing? A. Netcat B. Nmap C. Data communication D. Netscan

Last Answer : A. Netcat

Description : A firewall is a ______security system: a) Network b) File c) Program d) None of These

Last Answer : a) Network

Description : What do you mean by cloud in cloud computing? A. Data exchanged among grid nodes. B. Provides tools to monitor and distribute the number of licenses. C. Provides logical view of data. D. Set of hardware, software, network, storage, services and interfaces.

Last Answer : Set of hardware, software, network, storage, services and interfaces.

Description : It is the set of programs that enables your computers hardware device and application software to work together. A. Operating system B. Helper software C. System software D. Application software

Last Answer : C. System software

Description : If you have more than one computer connected in the home, it is important to protect every computer. You should have a ____firewall (such as a router) to protect your network: a) Hardware b) Software c) HTML d) None of These

Last Answer : a) Hardware

Description : Network Architecture refers to the layout of the network consisting of the hardware, software, connectivity, communication protocols and mode of transmission, such as ____: a) Wired b) Wireless c) Wired or Wireless d) None of These

Last Answer : c) Wired or Wireless

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : A Group Ware is a (1) Hardware (2) Network (3) Software (4) Firmware

Last Answer : Software