Firewalls are used to protect a communication network system against: (A) Unauthorized attacks (B) Virus attacks (C) Data-driven attacks (D) Fire-attacks

1 Answer

Answer :

Answer: A In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed to not be secure or trusted.

Related questions

Description : Which among the following is correct: a) A firewall is a system designed to prevent unauthorized access to or from a private network. b) Firewalls can be implemented in both hardware and software or a combination of both. c) Both of Above d) None of these

Last Answer : c) Both of Above

Description : Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet especially ____: a) Intranets b) Extranets c) Both of Above d) None of These

Last Answer : a) Intranets

Description : Expressive communication is driven by (A) Passive aggression (B) Encoder’s personality characteristics (C) External clues (D) Encoder-decoder contract

Last Answer : (B) Encoder’s personality characteristics

Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above

Last Answer : d. All the above

Description : Software that prevents unauthorized persons from accessing certain parts of a program, database or network is: a) Firewall b) Scanner c) Anti - Virus d) None of These

Last Answer : a) Firewall

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : Firewalls are used to protect: a) Home Networks b) Corporate Networks c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Who do you trust the most now to protect American workers jobs against the profit driven robot revolution?

Last Answer : The only way to do that is at least make the robots here and companies can only buy here. Also for every robot that replaces a worker, they must pay 2 times into social security as if it ... ¼th of their employees. Of course people can also refuse to buy from these companies that displace people.

Description : Can firewalls detect virus? -Technology

Last Answer : Firewalls do not screen computer viruses.As the location of firewalls is a good place for scanning, some firewalls have a plug-in virus scanning module.And some programs scan virus at a point either before or after a firewall.

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : In a fuel cell driven vehicle, the energy is obtained from the combustion of (A) Methane (B) Hydrogen (C) LPG (D) CNG

Last Answer : (B) Hydrogen

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse

Last Answer : B) Zombie

Description : Encryption is required to (i) protect business information from eavesdropping when it is transmitted on internet (ii)efficiently use the bandwidth available in PSTN (iii) to protect information stored in companies' databases from ... a. i and ii b. ii and iii c. iii and iv d. i and iv

Last Answer : d. i and iv 

Description : A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. ... it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet

Last Answer : c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance

Last Answer : a. You can control where traffic goes in the three networks

Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Firewalls are often categorized as: a) Network Firewalls b) Host Based Firewalls c) Either Network firewalls or Host based firewalls d) None of These

Last Answer : c) Either Network firewalls or Host based firewalls

Description : Which of the following are true about firewalls? 1) Filters network traffic 2) Can be either a hardware or software device 3) Follows a set of rules 4) All the above

Last Answer : 4) All the above

Description : Which of the following are true about firewalls? 1 Filters network traffic 2 Can be either a hardware or software device 3 Follows a set of rules 4 All the above

Last Answer : 4 All the above

Description : A major barrier in the transmission of cognitive data in the process of communication is an individual’s (A) personality (B) expectation (C) social status (D) coding ability

Last Answer : (D) coding ability

Description : A computer virus is (1) a chemical that attacks silicon. (2) a micro-organism that destroys integrated circuits. (3) data that the computer fails to handle. (4) a special kind of computer programme.

Last Answer :  a special kind of computer programme.

Description : Unauthorized communication of information means and include:- a) To which he is not authorized to have access. b) Which he is not authorized to keep in his personal custody c) Both A & B d) None of these

Last Answer : c) Both A & B

Description : Rule 11 of CCS Conduct rules explained a) Evidence before committee b) Unauthorized communication of information c) Election d) Gift

Last Answer : b) Unauthorized communication of information

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above

Last Answer : d) All of the Above

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : To prevent unauthorized access to and / or from the network, a system known as ......., can be implemented -Technology

Last Answer : To prevent unauthorized access to and / or from the network, a system known as Firewall, can be implemented by hardware and / or software.

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : Encoding or scrambling data for transmission across a network is known as: (A) Decryption (B) Protection (C) Detection (D) Encryption

Last Answer : (D) Encryption

Description : Which of the following are the fundamental duties? (a) To respect the National Flag. (b) To protect and improve the natural environment. (c) For a parent to provide opportunities for education to his/her child. (d) To protect ... (C) (a), (c) and (d) (D) (a), (b), (c) and (d)

Last Answer : Answer: D

Description : The President of India takes oath (A) to uphold the sovereignty and integrity of India. (B) to bear true faith and allegiance to the Constitution of India. (C) to uphold the Constitution and Laws of the country. (D) to preserve, protect and defend the Constitution and the law of the country. 

Last Answer : (D) to preserve, protect and defend the Constitution and the law of the country.

Description : The Fundamental Duties of a citizen include 1. Respect for the Constitution, the National Flag and the National Anthem 2. To develop the scientific temper. 3. Respect for the Government. 4. To protect Wildlife. Choose the correct answer ... 3 (B) 1, 2 and 4 (C) 2, 3 and 4 (D) 1, 3, 4 and 2

Last Answer : (B) 1, 2 and 4

Description : Which of the following statements is correct? (A) Virus improves the speed of processing information through computer (B) Internet does not allow the virus to spread (C) Virus is a part of software (D) Virus is an operating system

Last Answer : Answer: C

Description : In a small office network, to protect every computer from hackers, virus or worm. -Technology

Last Answer : 1. True2. True3. False4. False

Description : What sort of face covering do you prefer to protect yourself against the virus?

Last Answer : If you can blow through it and it blows out a flame , it’s not protecting you from diddly squat, just makes it hard to breathe, so please, for the love of god, buy legit masks instead of knitting your own people.

Description : What types of threats can virus protection protect against?

Last Answer : Virus protection software can protect against viruses that are known. New viruses that haven't been updated in the system yet may still slip through the software. To prevent this update your protection frequently and get software that can eliminate viruses as well.

Description : Which of the following statements is true? (A) Smart cards do not require an operating system. (B) Smart cards and PCs use some operating system. (C) COS is smart card operating system. (D) The communication between reader and card is in full duplex mode.

Last Answer : (C) COS is smart card operating system

Description : An unauthorized user is a network _______ issue. A) Performance B) Reliability C) Security D) All the above

Last Answer : Security

Description : Select the most appropriate definition of Ethical hacking. a. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the viruses ... for security vulnerabilities and plugging the hole before the viruses get chance to handle them.

Last Answer : c. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the unauthorized peoples get a chance to exploit them.

Description : What countries, if any, have plans in place for EMP bursts or attacks to protect society and banking from going into apocalyptic scenarios?

Last Answer : Need Answer

Description : What countries, if any, have plans in place for EMP bursts or attacks to protect society and banking from going into apocalyptic scenarios?

Last Answer : Need Answer

Description : How to protect your wordpress website from cyber attacks?

Last Answer : Answers is the place to go to get the answers you need and to ask the questions you want

Description : How to protect your wordpress website from cyber attacks?

Last Answer : Answers is the place to go to get the answers you need and to ask the questions you want

Description : An unsolicited e-mail message sent to many recipient at once is a (A) Worm (B) Virus (C) Threat (D) Spam

Last Answer : Answer: D

Description : Computer Virus is a (A) Hardware (B) Bacteria (C) Software (D) None of these

Last Answer : (C) Software

Description : Effective communication pre-supposes (A) Non-alignment (B) Domination (C) Passivity (D) Understanding

Last Answer : (D) Understanding

Description : Classroom communication is the basis of (A) Social identity (B) External inanities (C) Biased passivity (D) Group aggression

Last Answer : (A) Social identity

Description : Positive classroom communication leads to (A) Coercion (B) Submission (C) Confrontation (D) Persuasion

Last Answer : (D) Persuasion