Can firewalls detect virus? -Technology

1 Answer

Answer :

Firewalls do not screen computer viruses.As the location of firewalls is a good place for scanning, some firewalls have a plug-in virus scanning module.And some programs scan virus at a point either before or after a firewall.

Related questions

Description : Firewalls are used to protect a communication network system against: (A) Unauthorized attacks (B) Virus attacks (C) Data-driven attacks (D) Fire-attacks

Last Answer : Answer: A In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a ... outside network, such as the Internet, that is assumed to not be secure or trusted.

Description : The first paper published on firewall technology was in ____, when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls: a) 1988 b) 1999 c) 1992 d) None of These

Last Answer : a) 1988

Description : Touch screen is an electronic ……….. display that can detect the presence and location of a touch within the display area. -Technology

Last Answer : Touch screen is an electronic visual display that can detect the presence and location of a touch within the display area.

Description : Are there free anti-virus downloads that will not only detect but fix the problem?

Last Answer : malwarebytes (malwarebytes.org) is a great program for removing such items. only thing is that the free version only detects viruses and spyware when you call upon it to scan. some other free programs that do run in the background at all times are Avast and Microsoft Security Essentials.

Description : Which device can detect the virus ?

Last Answer : The virus can be seen in the electron microscope.

Description : The following statement(s) is/are true concerning newer detection methods of systemic infection. a. Enzyme-linked immunosorbent assay (ELISA) is a rapid immunologic assay used for ... detected using advanced molecular techniques include cytomegalovirus (CMV) and human immunodeficiency virus (HIV)

Last Answer : Answer: a, b, c, d Although the classic detection of infection based on clinical signs of infection and bacterial culture remain the most common clinical tools, increasing ... including CMV and HIV. Furthermore, preliminary investigations into possible detection of fungal pathogens are underway

Description : Good standalone free firewalls?

Last Answer : I`ve got just the program for you: Comodo Firewall.

Description : Do Hubs come with hardwire Firewalls like routers"?

Last Answer : Most do not, you can buy a standalone hardware firewall if you wish to do so.

Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance

Last Answer : a. You can control where traffic goes in the three networks

Description : Which of the following is not the Networking Devices? A. Gateways B. Unix C. Routers D. Firewalls

Last Answer : B. Unix

Description : Application layer firewalls works on the application level of the ____stack (i.e. all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application: a) TCP b) IP c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Firewalls are often categorized as: a) Network Firewalls b) Host Based Firewalls c) Either Network firewalls or Host based firewalls d) None of These

Last Answer : c) Either Network firewalls or Host based firewalls

Description : Firewalls are used to protect: a) Home Networks b) Corporate Networks c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet especially ____: a) Intranets b) Extranets c) Both of Above d) None of These

Last Answer : a) Intranets

Description : Which among the following is correct: a) A firewall is a system designed to prevent unauthorized access to or from a private network. b) Firewalls can be implemented in both hardware and software or a combination of both. c) Both of Above d) None of these

Last Answer : c) Both of Above

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : Which of the following are true about firewalls? 1) Filters network traffic 2) Can be either a hardware or software device 3) Follows a set of rules 4) All the above

Last Answer : 4) All the above

Description : Which of the following are true about firewalls? 1 Filters network traffic 2 Can be either a hardware or software device 3 Follows a set of rules 4 All the above

Last Answer : 4 All the above

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : With which of the following NDE processes is it possible to detect both surface and slight subsurface defects up to 2mm below the surface a) Visual b) Dye Penetrant c) Magnetic Particle using DC d) Magnetic particle using AC

Last Answer : c) Magnetic Particle using DC

Description : Utility programs include (a) Virus scanning software (b) Backup software -Technology

Last Answer : (d) Utility programs includes virus scanning, backup, disk defragmenter software.

Description : Name some forms of virus attacks. -Technology

Last Answer : Worms, Trojan horse, Computer Virus etc.

Description : Define virus. -Technology

Last Answer : A virus is a harmful program, which on entering a computer, starts creating copies of itself. It then attacks by corrupting the executable files and folders saved on the computer.

Description : How does a virus affect your computer? -Technology

Last Answer : A virus is a software used to infect a computer. After virus code is written, it is buried within an essential programmed. Once the programmed is executed, the virus code is activated and attack copies itself to other programs.

Description : Give three guidelines to prevent the virus attack. -Technology

Last Answer : Three guidelines to prevent the virus attack are as follows:1. Avoid the temptation to open unexpected E-mail attachments and downloads from unreliable sources. Resist the urge to double click ... download its updates regularly.3. Scan files downloaded from the Internet or other external sources.

Description : If your computer attacked by a trojan horse virus, what damage it may cause? -Technology

Last Answer : If your computer attacked by a trojan horse virus, it can:1. Steal passwords2. Copy sensitive data3. Carry out any other harmful operations etc.

Description : Write minimum three ways by which a virus can spread to other systems. -Technology

Last Answer : Three ways by which a virus can spread to other systems are as follows:1. When an infected file is copied through the network.2. When a virus file is downloaded from the Internet.3. When an infected file is copied from a floppy disk, USB, DVD etc.

Description : What are the common symptoms of a virus attack? -Technology

Last Answer : Symptoms of Computer Viruses AttackThe list of symptoms of computer viruses attack, which indicate that your system is infected with a computer virus is as follows:1. Odd messages are displaying on ... .10. PC starts performing functions like opening or closing windows, running programs on its own.

Description : In a small office network, to protect every computer from hackers, virus or worm. -Technology

Last Answer : 1. True2. True3. False4. False

Description : A …….. is a virus that is often disguised as a useful computer program. -Technology

Last Answer : (a) Trojan horse is a virus, i.e. often disguised as a useful computer program.

Description : Which one of the following is not a malware? (a) Computer virus (b) Spam -Technology

Last Answer : (d) Application software refers to the condition in which your computer stops working.

Description : Which of the following is not a symptom of a virus attack? -Technology

Last Answer : (d) Your data is copied to another location is not a symptom of a virus attack.

Description : Which of the following is the first computer virus? (a) Brain -Technology

Last Answer : (c) Elk Cloner is the first computer virus created by Richard Skrenta.

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : Which one of the following is not a way to get a computer virus? (a) Through E_mail attachments -Technology

Last Answer : (c) By typing on the keyboard is not a way to get a computer virus.

Description : One limitation of antivirus programs is that they: (a) Sometimes start behaving like virus -Technology

Last Answer : (d) Antivirus can detect only those viruses for which they are programmed.

Description : ………… is the general term to refer to infectious software such as virus, worm, spyware etc. -Technology

Last Answer : Malware is the general term to refer to infectious software such as a virus, worm, spyware etc.

Description : Unlike a computer virus, a ……….. can replicate itself automatically. -Technology

Last Answer : Unlike a computer virus, a wormcan replicate itself automatically.

Description : A virus may corrupt or delete data on your computer. -Technology

Last Answer : True A virus may corrupt or delete data on your computer.

Description : A virus is a harmful program, which one entering a computer, starts creating copies of itself. -Technology

Last Answer : True Virus is a malicious program that is designed to make a system sick, just like a real virus.

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : Which of the following is not the source of virus? -Technology

Last Answer : Typing through key boardis not the source of virus.

Description : Researchers of which university in Bangladesh have discovered the technology to detect cancer through blood test ?

Last Answer : This study was conducted at Shahjalal University of Science and Technology, Sylhet, Bangladesh.

Description : While there, are many tests available to detect leaks on vessels, is there a technology available to quantify the leak, or measure the flow through a leak?

Last Answer : The RheoVac air in-leak monitor by Intek, Inc. in Westerville, OH is a viable meter that gives the actual air in-leakage flow rate. It also gives you exhauster capacity and a vacuum quality reading. If you want to find more information, you can view their web site below.

Description : What's the best anti-virus for best result's on my PC?

Last Answer : answer:Comodo is good, but not great. It is solid enough to keep you mostly safe, but I have yet to see it in any Top picks list. For anti-virus, I favor Avira Free. According to AV ... Avira is consistent). Other sources also place it pretty high, and it earns extra points as it is free.