This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What Is Tunneling Router? |
|
Answer» A router or SYSTEM capable of routing TRAFFIC by ENCRYPTING it and encapsulating it for TRANSMISSION across an untrusted network, for eventual de-encapsulation and decryption. A router or system capable of routing traffic by encrypting it and encapsulating it for transmission across an untrusted network, for eventual de-encapsulation and decryption. |
|
| 2. |
What Is Authentication Token? |
|
Answer» A portable device used for AUTHENTICATING a USER. Authentication tokens operate by challenge/response, time-based code sequences, or other TECHNIQUES. This MAY include paper-based lists of one-time PASSWORDS. A portable device used for authenticating a user. Authentication tokens operate by challenge/response, time-based code sequences, or other techniques. This may include paper-based lists of one-time passwords. |
|
| 3. |
Explain The Difference Between Gateway And Firewall? |
|
Answer» A NETWORK gateway JOINS two networks TOGETHER through a combination of hardware and software.A network firewall guards a computer network against unauthorized INCOMING or outgoing access. Network firewalls may be hardware devices or software programs. A network gateway joins two networks together through a combination of hardware and software.A network firewall guards a computer network against unauthorized incoming or outgoing access. Network firewalls may be hardware devices or software programs. |
|
| 4. |
Explain Abuse Of Privilege? |
|
Answer» When a user performs an ACTION that they should not have, ACCORDING to ORGANIZATIONAL POLICY or LAW. When a user performs an action that they should not have, according to organizational policy or law. |
|
| 5. |
What Is Worm? |
|
Answer» A standalone program that, when run, COPIES itself from ONE HOST to ANOTHER, and then runs itself on each newly infected host. The widely reported 'Internet Virus' of 1988 was not a virus at all, but ACTUALLY a worm. A standalone program that, when run, copies itself from one host to another, and then runs itself on each newly infected host. The widely reported 'Internet Virus' of 1988 was not a virus at all, but actually a worm. |
|
| 6. |
What Is Challenge/response? |
|
Answer» An AUTHENTICATION technique whereby a server sends an UNPREDICTABLE challenge to the USER, who computes a RESPONSE USING some form of authentication token. An authentication technique whereby a server sends an unpredictable challenge to the user, who computes a response using some form of authentication token. |
|
| 7. |
What Is Access Control Lists? |
|
Answer» Rules for PACKET filters (typically ROUTERS) that define which PACKETS to pass and which to BLOCK. Rules for packet filters (typically routers) that define which packets to pass and which to block. |
|
| 8. |
What Is Access Router? |
|
Answer» A router that CONNECTS your NETWORK to the external Internet. Typically, this is your first line of defense against attackers from the outside Internet. By enabling access CONTROL lists on this router, you'll be able to provide a level of protection for all of the hosts `behind' that router, effectively making that network a DMZ instead of an unprotected external LAN. A router that connects your network to the external Internet. Typically, this is your first line of defense against attackers from the outside Internet. By enabling access control lists on this router, you'll be able to provide a level of protection for all of the hosts `behind' that router, effectively making that network a DMZ instead of an unprotected external LAN. |
|
| 9. |
What Is Network-layer Firewall? |
|
Answer» A firewall in which traffic is EXAMINED at the NETWORK protocol PACKET layer. A firewall in which traffic is examined at the network protocol packet layer. |
|
| 10. |
What Is Insider Attack? |
|
Answer» An ATTACK ORIGINATING from INSIDE a PROTECTED NETWORK. An attack originating from inside a protected network. |
|
| 11. |
What Is Host-based Security? |
|
Answer» The TECHNIQUE of securing an individual SYSTEM from attack. HOST based security is operating system and version DEPENDENT. The technique of securing an individual system from attack. Host based security is operating system and version dependent. |
|
| 12. |
Explain How The The Two Servers Can Communicate When The Firewall Is There In Between? |
|
Answer» DEPEND on firewall CONFIGURATION, all most AUTHORIZE port NB 80, so we can communicate over Http protocol. Depend on firewall configuration, all most authorize port nb 80, so we can communicate over Http protocol. |
|
| 13. |
What Is Logging? |
|
Answer» The PROCESS of STORING information about events that occurred on the FIREWALL or NETWORK. The process of storing information about events that occurred on the firewall or network. |
|
| 14. |
What Is Proxy? |
|
Answer» A SOFTWARE agent that acts on behalf of a user. Typical proxies accept a connection from a user, make a decision as to whether or not the user or CLIENT IP address is permitted to use the proxy, perhaps does additional AUTHENTICATION, and then completes a connection on behalf of the user to a remote destination. A software agent that acts on behalf of a user. Typical proxies accept a connection from a user, make a decision as to whether or not the user or client IP address is permitted to use the proxy, perhaps does additional authentication, and then completes a connection on behalf of the user to a remote destination. |
|
| 15. |
What Is Screening Router? |
|
Answer» A router configured to PERMIT or DENY TRAFFIC based on a set of permission RULES installed by the administrator. A router configured to permit or deny traffic based on a set of permission rules installed by the administrator. |
|
| 16. |
Explain What Is Authorization? |
|
Answer» The PROCESS of determining what types of activities are permitted. USUALLY, authorization is in the context of authentication: once you have authenticated a USER, they may be AUTHORIZED different types of access or ACTIVITY. The process of determining what types of activities are permitted. Usually, authorization is in the context of authentication: once you have authenticated a user, they may be authorized different types of access or activity. |
|
| 17. |
Explain What Is Application-layer Firewall? |
|
Answer» A firewall system in which service is provided by processes that maintain COMPLETE TCP connection STATE and sequencing. APPLICATION layer firewalls OFTEN re-address traffic so that outgoing traffic appears to have originated from the firewall, RATHER than the internal host. A firewall system in which service is provided by processes that maintain complete TCP connection state and sequencing. Application layer firewalls often re-address traffic so that outgoing traffic appears to have originated from the firewall, rather than the internal host. |
|
| 18. |
Explain What Is Firewall? How To Enable Firewall In Windows Xp? |
|
Answer» To enable firewall in Window...Start - CONTROL PANEL - Security CENTER -TURN On the Firewall BUTTON and enable it. To enable firewall in Window...Start - Control panel - Security center -Turn On the Firewall Button and enable it. |
|
| 19. |
Explain In Windows 2003 Built In Fire Wall Is There Or Not? |
|
Answer» In WINDOWS 2003 SERVER, built in firewall is PRESENT. In windows 2003 server, built in firewall is present. |
|
| 20. |
Explain What Is Firewall? |
|
Answer» A firewall is a PART of a COMPUTER system or network that is DESIGNED to block unauthorized access while permitting authorized communications. It is a DEVICE or set of devices which is configured to permit or deny computer applications based upon a set of rules and other criteria. Firewalls can be implemented in EITHER hardware or software, or a combination of both. A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices which is configured to permit or deny computer applications based upon a set of rules and other criteria. Firewalls can be implemented in either hardware or software, or a combination of both. |
|