Firewalls are used to protect:
a) Home Networks
b) Corporate Networks
c) Both of Above
d) None of These

1 Answer

Answer :

c) Both of Above

Related questions

Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet especially ____: a) Intranets b) Extranets c) Both of Above d) None of These

Last Answer : a) Intranets

Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance

Last Answer : a. You can control where traffic goes in the three networks

Description : Firewalls are used to protect a communication network system against: (A) Unauthorized attacks (B) Virus attacks (C) Data-driven attacks (D) Fire-attacks

Last Answer : Answer: A In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a ... outside network, such as the Internet, that is assumed to not be secure or trusted.

Description : Application layer firewalls works on the application level of the ____stack (i.e. all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application: a) TCP b) IP c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which among the following is correct: a) A firewall is a system designed to prevent unauthorized access to or from a private network. b) Firewalls can be implemented in both hardware and software or a combination of both. c) Both of Above d) None of these

Last Answer : c) Both of Above

Description : The first paper published on firewall technology was in ____, when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls: a) 1988 b) 1999 c) 1992 d) None of These

Last Answer : a) 1988

Description : Firewalls are often categorized as: a) Network Firewalls b) Host Based Firewalls c) Either Network firewalls or Host based firewalls d) None of These

Last Answer : c) Either Network firewalls or Host based firewalls

Description : Which of the following are true about firewalls? 1) Filters network traffic 2) Can be either a hardware or software device 3) Follows a set of rules 4) All the above

Last Answer : 4) All the above

Description : Which of the following are true about firewalls? 1 Filters network traffic 2 Can be either a hardware or software device 3 Follows a set of rules 4 All the above

Last Answer : 4 All the above

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : How can I protect against corporate identity theft?

Last Answer : You really don't have to protect yourself against theft by a corporation. With the strict laws on the books these days no credible company would risk their reputation and finances by stealing from an ... can be a good way to go. Life Lock comes highly recommended and they gaurantee their protection.

Description : A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. ... it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet

Last Answer : c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

Description : Good standalone free firewalls?

Last Answer : I`ve got just the program for you: Comodo Firewall.

Description : Can firewalls detect virus? -Technology

Last Answer : Firewalls do not screen computer viruses.As the location of firewalls is a good place for scanning, some firewalls have a plug-in virus scanning module.And some programs scan virus at a point either before or after a firewall.

Description : Do Hubs come with hardwire Firewalls like routers"?

Last Answer : Most do not, you can buy a standalone hardware firewall if you wish to do so.

Description : Which of the following is not the Networking Devices? A. Gateways B. Unix C. Routers D. Firewalls

Last Answer : B. Unix

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : _________ is a computational model based on the structure of biological neural networks? (A) Artificial Neural Network (ANN) (B) Biological Network (C) Both(A) & (B) (D) None of the Above

Last Answer : (A) Artificial Neural Network (ANN)

Description : A tree topology (hierarchical topology) can be viewed as a collection of _______in a hierarchy: a) Bus Networks b) Star Networks c) Both of Above d) None of These

Last Answer : b) Star Networks

Description : HBA is used in ______: a) Storage Area Networks b) Software Based Networks Only c) Both of Above d) None of These

Last Answer : a) Storage Area Networks

Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or allhosts. ii) The class A network 128.0.0.0 is defined as the loopbacknetwork. A) i only B) ii only C) Both A and B D) None of the above

Last Answer : A) i only

Description : If you have more than one computer connected in the home, it is important to protect every computer. You should have a ____firewall (such as a router) to protect your network: a) Hardware b) Software c) HTML d) None of These

Last Answer : a) Hardware

Description : Office LANs that are spread geographically apart on a large scale can be connected using a corporate _____ 1) CAN 2) LAN 3) DAN 4) WAN 5) TAN

Last Answer : Answer :4

Description : _________ are long term corporate bonds that are unsecured in nature. A. DCF B. Debentures C. Covenant D. CRAs

Last Answer : B. Debentures Explanation: A long-term security yielding a fixed rate of interest, issued by a company and secured against assets are known as debentures.

Description : Which of the following is an investment advisory discipline? A. Corporate Industrial Finance B. Offshare Banking C. Wholesale Banking D. Wealth Management E. Trade Finance

Last Answer : D. Wealth Management Explanation: Wealth management as an investment-advisory discipline incorporates financial planning, investment portfolio management and a number of aggregated financial services ... retail banking, estate planning, legal resources, tax professionals and investment management.

Description : When a corporate entity wishes to raise money from the market it can do that by issuing A. Treasury Bills B. Kisan Vikas Patra C. National Savings Certificate D. Commercial Papers E. None of the Above

Last Answer : D. Commercial Papers Explanation: Commercial paper is an unsecured, short-term debt instrument issued by a corporation, typically for the financing of accounts receivable, inventories and meeting short-term liabilities.

Description : Who among the following regulates the Indian Corporate Debt Market? A. RBI B. NABARD C. SIDBI D. SEBI E. None of the Above

Last Answer : D. SEBI Explanation: Regulator for the Indian Corporate Debt Market is the Securities and Exchange Board of India (SEBI). SEBI controls bond market and corporate debt market in cases where entities raise money from public through public issues.

Description : Office LANs that are spread geographically apart on a large scale can be connected using a corporate: a) CAN b) WAN c) LAN d) None of These

Last Answer : b) WAN

Description : Office LANs that are spread geographically apart on a large scale can be connected using a corporate a) CAN b) LAN c) DAN d) WAN e) None of these

Last Answer : c) DAN

Description : An advantage of a distributed word processing network is 1) increased number of reports handled 2) less delay in inter-office communications 3) greater corporate control over outputs 4) All of these

Last Answer : 2) less delay in inter-office communications

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : Which type of computing is located at the edge of a business or corporate network and that allows data from sensors to be preprocessed? a.internet b.fog c.wireless d.WAN

Last Answer : Fog

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : _________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : Radial Basis Function (RBF) networks have _____ layers. (A) One (B) Four (C) Two (D) Three

Last Answer : (D) Three

Description : The most famous Recurrent Neural Network is _______ (A) Perceptrons (B) Radial Basis Networks (C) Hopfield net (D) None of the Above

Last Answer : (C) Hopfield net

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Computer systems are comprised of: a) Hardware, Software, Procedures, Networks and People b) Hardware, Programs, Processors, Procedures and People c) Hardware Programs, Information, People and Networks d) None of These

Last Answer : a) Hardware, Software, Procedures, Networks and People

Description : Virus can spread from one computer to another via use of: a) Infected Floppy Disk b) Computer Networks c) Internet d) All of Above e) None of These

Last Answer : d) All of Above

Description : A web site can contain one or more: a) Web Pages b) Spiders c) Networks d) None of These

Last Answer : a) Web Pages

Description : Internet refers to: a) A large Network of Networks b) A communication system for different states of India c) A communication system provided for large number of computer users. d) None of These

Last Answer : a) A large Network of Networks

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : The size of a ______can cover a city whose scope is less than 100 kilometer such as cable TV networks etc: a) MAN b) LAN c) WAN d) None of These

Last Answer : a) MAN

Description : Which among the following is correct features about LAN (Local Area Network): a) LANs are small size networks which only covers a few buildings or a campus up to few kilometers. b) LANs are widely used to connect ... to share printers in a Lab or in a department. d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which among the following includes the areas of Artificial Intelligence specialization: a) Games (Programming computers to play games against human opponents) b) Natural Languages (Programming computers to understand natural ... that occur in animal brains) d) All of the Above e) None of These

Last Answer : d) All of the Above