Firewalls are frequently used to prevent unauthorized internet users from
accessing private networks connected to the internet especially ____:
a) Intranets
b) Extranets
c) Both of Above
d) None of These

1 Answer

Answer :

a) Intranets

Related questions

Description : The standard suit of protocols used by the Internet, Intranets, extranets andsome other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : Internet-like networks within an enterprise. A. Intranets B. Switching alternating C. Inter organizational networks D. Extranets

Last Answer : Intranets

Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : Which among the following is correct: a) A firewall is a system designed to prevent unauthorized access to or from a private network. b) Firewalls can be implemented in both hardware and software or a combination of both. c) Both of Above d) None of these

Last Answer : c) Both of Above

Description : Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit foranswer: A. Bandwidth alternatives B. Switching alternating C. Inter organizational networks D. Extranets

Last Answer : Inter organizational networks

Description : Internet-like networks between a company and its businesspartners. Select the best fit for answer: A. Bandwidth alternatives B. Switching alternating C. Inter organizational networks D. Extranets

Last Answer : Extranets

Description : Software that prevents unauthorized persons from accessing certain parts of a program, database or network is: a) Firewall b) Scanner c) Anti - Virus d) None of These

Last Answer : a) Firewall

Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Firewalls are used to protect: a) Home Networks b) Corporate Networks c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Firewalls are used to protect a communication network system against: (A) Unauthorized attacks (B) Virus attacks (C) Data-driven attacks (D) Fire-attacks

Last Answer : Answer: A In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a ... outside network, such as the Internet, that is assumed to not be secure or trusted.

Description : The first paper published on firewall technology was in ____, when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls: a) 1988 b) 1999 c) 1992 d) None of These

Last Answer : a) 1988

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance

Last Answer : a. You can control where traffic goes in the three networks

Description : Intranetsand extranets can use their network fire walls andother security features to establish secureInternet links within an enterpriseor with its trading partners. Select the best fit for answer: A. Network Server B. Virtual Private Network C. Networkoperating system D. OS

Last Answer : Virtual Private Network

Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : c. i, ii, iii, iv 

Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii 

Description : Social engineering the ____ of exploiting the human elements to gain access to unauthorized resources. a. Art b. Science c. Hacking d. Skill

Last Answer : a. Art

Description : Internet refers to: a) A large Network of Networks b) A communication system for different states of India c) A communication system provided for large number of computer users. d) None of These

Last Answer : a) A large Network of Networks

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the abov

Last Answer : c. Private networks contain a higher concentration of digital evidence.

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the above.

Last Answer : c. Private networks contain a higher concentration of digital evidence.

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital Evidences d. None of the above.

Last Answer : c. Private networks contain a higher concentration of digital Evidences

Description : Private networks can be a richer source of evidence than the Internet because: A. They retain data for longer periods of time. B. Owners of private networks are more cooperative with law enforcement. C. Private networks contain a higher concentration of digital evidence. D. All the above.

Last Answer : C. Private networks contain a higher concentration of digital evidence.

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the above.

Last Answer : c. Private networks contain a higher concentration of digital evidence.

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. ... it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet

Last Answer : c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above

Last Answer : d) All of the Above

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Application layer firewalls works on the application level of the ____stack (i.e. all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application: a) TCP b) IP c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Point out the wrong statement. A. Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems B. The Distributed Audit ... CardSpace specifications support the authentication type of data object D. All of the above

Last Answer : The OpenID and CardSpace specifications support the authentication type of data object

Description : Is a security software program that protects a computer from access by unauthorized users.?

Last Answer : That's called a firewall.

Description : Is a security software program that protects a computer from access by unauthorized users.?

Last Answer : That's called a firewall.

Description :  __________ is software that blocks unauthorized users from connecting to your computer. A. Firewall B. Quick lauch C. OneLogin D. Centrify

Last Answer : A. Firewall 

Description : A modem is not needed when accessing the internet through: a) LAN b) Cable c) Wi - Fi d) None of These

Last Answer : a) LAN

Description : Which application is used for accessing the information on internet ? (1) operating system (2) web browzer (3) microsoft word (4) system software

Last Answer : the answer is web browser

Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity

Last Answer : b) Cyber

Description :  ____ is known as unauthorized access to the system.  a) Decryption b) Encryption c) Hacking d) None of the above

Last Answer :  Hacking is known as unauthorized access to the system. 

Description : The two main types of Internet based B2B commerce are...... A. Net marketplaces and private industrial networks B. EDI and collaborative commerceC. Net marketplaces and collaborative commerce D. EDI and private industrial networks

Last Answer : D. EDI and private industrial networks

Description : Firewalls are often categorized as: a) Network Firewalls b) Host Based Firewalls c) Either Network firewalls or Host based firewalls d) None of These

Last Answer : c) Either Network firewalls or Host based firewalls

Description : Which of the following are true about firewalls? 1) Filters network traffic 2) Can be either a hardware or software device 3) Follows a set of rules 4) All the above

Last Answer : 4) All the above

Description : Which of the following are true about firewalls? 1 Filters network traffic 2 Can be either a hardware or software device 3 Follows a set of rules 4 All the above

Last Answer : 4 All the above

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : To prevent unauthorized access to and / or from the network, a system known as ......., can be implemented -Technology

Last Answer : To prevent unauthorized access to and / or from the network, a system known as Firewall, can be implemented by hardware and / or software.

Description : A ____ is a high-speed network that connect local networks in a city or town. (1) LAN (2) MAN (3) WAN (4) TAN

Last Answer : MAN

Description : ________ is the unauthorized copying of an organization’s internally developed software or the illegal duplication of commercially available software. A. Software license B. Software Piracy C. Both (A) and (B) D. None of the above.

Last Answer : B. Software Piracy

Description : Credit Card Fraud includes: a) Credit cards are illegally get and used to get movable or immovable property b) Unauthorized and illegal use of credit cards c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Credit Card Fraud includes: a) Credit cards are illegally get and used to get movable or immovable property b) Unauthorized and illegal use of credit cards c) Both of Above d) None of These

Last Answer : c) Both of Above