To prevent unauthorized access to and / or from the network, a system known as ......., can be implemented -Technology

1 Answer

Answer :

To prevent unauthorized access to and / or from the network, a system known as Firewall, can be implemented by hardware and / or software.

Related questions

Description : Which among the following is correct: a) A firewall is a system designed to prevent unauthorized access to or from a private network. b) Firewalls can be implemented in both hardware and software or a combination of both. c) Both of Above d) None of these

Last Answer : c) Both of Above

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above

Last Answer : d) All of the Above

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. ... it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet

Last Answer : c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description :  ____ is known as unauthorized access to the system.  a) Decryption b) Encryption c) Hacking d) None of the above

Last Answer :  Hacking is known as unauthorized access to the system. 

Description : If you have implemented a network where hosts are assigned specific roles such as for file sharing and printing. Other hosts access those resources but do not host services of their own. what type of?

Last Answer : What is the answer ?

Description : Is a security software program that protects a computer from access by unauthorized users.?

Last Answer : That's called a firewall.

Description : Is a security software program that protects a computer from access by unauthorized users.?

Last Answer : That's called a firewall.

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : Unauthorized communication of information means and include:- a) To which he is not authorized to have access. b) Which he is not authorized to keep in his personal custody c) Both A & B d) None of these

Last Answer : c) Both A & B

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : Social engineering the ____ of exploiting the human elements to gain access to unauthorized resources. a. Art b. Science c. Hacking d. Skill

Last Answer : a. Art

Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above

Last Answer : d. All the above

Description : By security in e-Commerce we mean (i) Protecting an organization's data resource from unauthorized access (ii)Preventing disasters from happening (iii) Authenticating messages received by an organization (iv) Protecting messages sent on ... a. i, ii b. ii, iii c. iii, iv d. i, iii, iv

Last Answer : It's D

Description : Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet especially ____: a) Intranets b) Extranets c) Both of Above d) None of These

Last Answer : a) Intranets

Description : Firewalls are used to protect a communication network system against: (A) Unauthorized attacks (B) Virus attacks (C) Data-driven attacks (D) Fire-attacks

Last Answer : Answer: A In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a ... outside network, such as the Internet, that is assumed to not be secure or trusted.

Description : An unauthorized user is a network _______ issue. A) Performance B) Reliability C) Security D) All the above

Last Answer : Security

Description : Software that prevents unauthorized persons from accessing certain parts of a program, database or network is: a) Firewall b) Scanner c) Anti - Virus d) None of These

Last Answer : a) Firewall

Description : Select the most appropriate definition of Ethical hacking. a. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the viruses ... for security vulnerabilities and plugging the hole before the viruses get chance to handle them.

Last Answer : c. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the unauthorized peoples get a chance to exploit them.

Description : If an indwelling catheter is necessary, nursing interventions that should be implemented to prevent infection include a) performing meticulous perineal care daily with soap and water. Cleanliness of the area ... it is clamped because it may cause backflow of urine from the tubing into the bladder.

Last Answer : a) performing meticulous perineal care daily with soap and water. Cleanliness of the area will reduce potential for infection.

Description : Do you have any examples of good ideas that were around a long time before being implemented?

Last Answer : answer:Helicopters by Da Vinci took about four hundred years. It needed lightweight power-plant / engine.

Description : In IEEE 802.11, _______ isan optionalaccess method that can be implemented inan infrastructure network (not in an ad hocnetwork). A) DCF B) PCF C) either (a) or (b) D) neither (a) nor (b)

Last Answer : PCF

Description : A switched WAN is normally implemented as a _______ network. A) virtual-circuit B) datagram C) circuit-switched D) none of the above

Last Answer : virtual-circuit

Description : Data Link Control Protocol (HDLC) is implemented at the ……… A. Data link layer B. Network layer C. transport layer D. Physical layer

Last Answer : A. receive sliding window.

Description : A computer connected to a network is known as stand_alone computer. -Technology

Last Answer : FalseA computer connected to a network is known as host or node.

Description : ...... network device is known as an intelligent hub. -Technology

Last Answer : Switchnetwork device is known as an intelligent hub.

Description : What are the various measures that should be taken to prevent spyware from overtaking your system? -Technology

Last Answer : Preventions of SpywareDue to the seriousness of spyware and the harm, it can affect your system and personal information, it is highly recommended you to take the given measures to prevent ... and are capable of blocking suspicious traffic, which can prevent spyware from infecting your system.

Description : In the quest for a clean, fuel-efficient engine,why hasn't this technology,EVC,been implemented in today's modern internal combustion engine?

Last Answer : answer:Oh this is near and dear to my heart. I had the misfortune of actually doing this analysis for my employer about 10 years ago. Virtually every manufacturer has built and tested units like this. ... is hard for customers to justify the purchase. Believe me if they could sell it, they would.

Description : When camping how much civilization or technology should one have access to before it is no longer camping?

Last Answer : I swear I was at a campground once where a pizza was delivered to one of the campsites.

Description : In Random Access Memory if current will be interrupted, data will not lost. -Technology

Last Answer : FalseRandom Access Memory (RAM) is a volatile memory, if current is interrupted, data will lost.

Description : A magnetic tape is a direct access storage device. -Technology

Last Answer : FalseIt is a non-volatile memory hence, it is not direcdy accessible by the CPU.

Description : How NUMBER and DATE/TIME type fields are different in Access? Give any one difference. -Technology

Last Answer : NUMBER data type contains numeric values, while DATE/TIME type field contains date and time values.

Description : Define the AutoNumber data type in MS_ Access. -Technology

Last Answer : AutoNumber data type starts with a number for the first record and it automatically increases the number by a set of amount for each record.

Description : What is database template? Give the description of five templates, used in Microsoft Access 2007. -Technology

Last Answer : A template is a complete tracking application with predefined tables, forms, reports, queries, macros, and relationships. Each template creates a complete end-to-end solution that you can use ... to create a projects tracking database to track multiple projects and assign tasks to different people.

Description : Which field properties are used in Office Access 2007? Give the purpose of each field property. -Technology

Last Answer : Field PropertiesAfter you create a field and set its data types, you can also set additional field properties. Setting field properties can give the database extra flexibility and functionality.Some ... control.Text, Memo, Number,Date/Time, Currency,AutoNumber, Yes/No, OLEObject, Hyperlink.

Description : Microsoft Access is an example of (a) Computer -Technology

Last Answer : (b) MS-Access is the DataBase Management System (DBMS) found in the Microsoft Office suite.

Description : When you define a field for a table, which of the following parameters do Access always consider optional? -Technology

Last Answer : (d) Description field of the table is optional, as it depends on the databasedesigner that he/she wants to describe a field or not.

Description : Microsoft Office Access 2007 includes a set of database ………… which are designed for specific business needs. -Technology

Last Answer : Microsoft Office Access 2007 includes a set of database templates which are designed for specific business needs.

Description : Which program do you need to write HTML code? (a) Spreadsheet (b) Access -Technology

Last Answer : (c) From the given options, Notepad is useful program to write HTML code.

Description : ……… is not covered under file management. (a) Secure files (b) Easy access to files (c) Schedule processes (d) Keep backup of files -Technology

Last Answer : (c) Because schedule processes comes under processor management.

Description : ………….. is a visual desktop experience which provides an easy way to access desktop. -Technology

Last Answer : Aero is a visual desktop experience which provides an easy way to access desktop.

Description : A good way to safeguard access to your computer is to protect it. (a) Deadbolt -Technology

Last Answer : (d) Password is a good way to safeguard access to your computer to protect it.

Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology

Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.

Description : A good way to safeguard access to your computer is to _________ protect it. -Technology

Last Answer : A good way to safeguard access to your computer isPasswordto protect it.

Description : Random Access Memory and Read Only Memory are examples of ____________. -Technology

Last Answer : Random Access Memory and Read Only Memory are examples ofPrimary Memory.

Description : This part of utility software is used to prevent phosphor burning on computer monitors by blanking the screen with moving images. -Technology

Last Answer : (d) Screensavers fill the computer screen with moving images or patterns, when the computer is not in use.

Description : What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them? -Technology

Last Answer : Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them.

Description : Give three guidelines to prevent the virus attack. -Technology

Last Answer : Three guidelines to prevent the virus attack are as follows:1. Avoid the temptation to open unexpected E-mail attachments and downloads from unreliable sources. Resist the urge to double click ... download its updates regularly.3. Scan files downloaded from the Internet or other external sources.