InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What Is Dos Attack? How Can It Be Prevented? |
|
Answer» DoS (Denial of SERVICE) attack can be produced by sending a flood of data or requests to a target system resulting in EITHER consume or crash of the target system’s resources. The attacker often uses IP SPOOFING to conceal his identity when LAUNCHING a DoS attack. DoS (Denial of Service) attack can be produced by sending a flood of data or requests to a target system resulting in either consume or crash of the target system’s resources. The attacker often uses IP spoofing to conceal his identity when launching a DoS attack. |
|
| 2. |
At Which Levels Firewalls Works? Define Firewall Generations And Their Roles.? |
|
Answer» Firewalls generally work at layer 3, 4 & 7. First generation firewalls provided PACKET filtering and operate at layer 3 (Network Layer). Second generation firewalls can operate up to the Transport layer (layer 4) and record all connectivity passing through it and decides whether a packet is the start of a NEW connection or a part of an existing connection, or without any part of the connection. Second generation firewalls are fundamentally USED for Stateful Inspection. Third generation firewalls can operate at layer 7. The key benefit of this application layer filtering is that it can “UNDERSTAND” certain applications and protocols (such as File Transfer Protocol (FTP), Domain Name SYSTEM (DNS), or Hypertext Transfer Protocol (HTTP)) on its own Firewalls generally work at layer 3, 4 & 7. First generation firewalls provided packet filtering and operate at layer 3 (Network Layer). Second generation firewalls can operate up to the Transport layer (layer 4) and record all connectivity passing through it and decides whether a packet is the start of a new connection or a part of an existing connection, or without any part of the connection. Second generation firewalls are fundamentally used for Stateful Inspection. Third generation firewalls can operate at layer 7. The key benefit of this application layer filtering is that it can “understand” certain applications and protocols (such as File Transfer Protocol (FTP), Domain Name System (DNS), or Hypertext Transfer Protocol (HTTP)) on its own |
|
| 3. |
What Is Gre And Why Is It Required? |
|
Answer» Generic Routing Encapsulation (GRE) is a protocol which encapsulates packets in order to ROUTE other protocols over IP networks. GRE places a wrapper around a packet during transmission of the DATA. After receiving, GRE removes the wrapper and enables the ORIGINAL packet for processing by the receiving stack. Following are the ADVANTAGES of GRE tunnels: 1. The tunnels connect discontinuous sub-networks. 2. It allows VPNs across wide area networks (WANS). 3. It encases multiple protocols over a single-protocol backbone. 4. The tunnels provide workarounds for networks with limited hops. Generic Routing Encapsulation (GRE) is a protocol which encapsulates packets in order to route other protocols over IP networks. GRE places a wrapper around a packet during transmission of the data. After receiving, GRE removes the wrapper and enables the original packet for processing by the receiving stack. Following are the Advantages of GRE tunnels: 1. The tunnels connect discontinuous sub-networks. 2. It allows VPNs across wide area networks (WANs). 3. It encases multiple protocols over a single-protocol backbone. 4. The tunnels provide workarounds for networks with limited hops. |
|
| 4. |
What Is Ssl Vpn? How Is It Different From Ipsec Vpn? |
|
Answer» SSL VPN facilitates REMOTE ACCESS connectivity from any internet ENABLED location without any special client from the remote SITE. We need a web browser and its NATIVE SSL encryption. SSL VPN facilitates remote access connectivity from any internet enabled location without any special client from the remote site. We need a web browser and its native SSL encryption. |
|
| 5. |
How Do You Check The Status Of The Tunnel’s Phase 1 & 2? |
|
Answer» Following commands are USED to check the status of tunnel phases: Phase 1: show crypto isakmp and State: MM_ACTIVE Phase 2: show crypto IPsec SA If we have a lot of tunnels and the OUTPUT is very CONFUSING, then we can USE a ‘show crypto IPsec SA peer 12.12.12.12’ command. Following commands are used to check the status of tunnel phases: Phase 1: show crypto isakmp and State: MM_ACTIVE Phase 2: show crypto IPsec SA If we have a lot of tunnels and the output is very confusing, then we can use a ‘show crypto IPsec SA peer 12.12.12.12’ command. |
|
| 6. |
What Is Site To Site And Remote Access Vpn? |
|
Answer» A site-to-site VPN permits offices in multiple locations to establish secure CONNECTIONS with each other over a public network such as the Internet. Site-to-site VPN is unlike other remote-ACCESS VPN as it removes the need for each computer to run VPN client software as if it is on a remote access VPN. A site-to-site VPN permits offices in multiple locations to establish secure connections with each other over a public network such as the Internet. Site-to-site VPN is unlike other remote-access VPN as it removes the need for each computer to run VPN client software as if it is on a remote access VPN. |
|
| 7. |
What Is Vpn And Describe Ipsec Vpn? |
|
Answer» Virtual Private Network (VPN) generates a secure network connection over any public network such as the INTERNET. IPsec VPN means VPN over IP Security allows TWO or more USERS to communicate securely by authenticating and encrypting each IP PACKET within a COMMUNICATION session. Virtual Private Network (VPN) generates a secure network connection over any public network such as the internet. IPsec VPN means VPN over IP Security allows two or more users to communicate securely by authenticating and encrypting each IP packet within a communication session. |
|
| 8. |
What Is Stateful Failover? |
|
Answer» Each time a SESSION is generated for a flow of traffic on the primary node, it is SYNCED to the secondary node too. When the primary node fails, sessions continue to pass traffic through the second node without having to reestablish the link. Each time a session is generated for a flow of traffic on the primary node, it is synced to the secondary node too. When the primary node fails, sessions continue to pass traffic through the second node without having to reestablish the link. |
|
| 9. |
Define Stateful Inspection? |
|
Answer» Stateful INSPECTION is also known as dynamic packet filtering which is a FIREWALL technology which supervises the state of active connections and ANALYSES this information to determine which network packets are allowed through the firewall. Stateful inspection analyses packets within the application LAYER. Stateful inspection is also known as dynamic packet filtering which is a firewall technology which supervises the state of active connections and analyses this information to determine which network packets are allowed through the firewall. Stateful inspection analyses packets within the application layer. |
|
| 10. |
What Do You Mean By Packet Filtering? |
|
Answer» Packet FILTERING is the process of allowing or block IP packets based on its source and destination addresses, ports, or protocols. The packet filter examines the header of each DATA packet based on a specific SET of rules. On that basis, it decides to block it or allow crossing. Packet filtering is also PART to PROTECT a local network from unwanted access. Packet filtering is the process of allowing or block IP packets based on its source and destination addresses, ports, or protocols. The packet filter examines the header of each data packet based on a specific set of rules. On that basis, it decides to block it or allow crossing. Packet filtering is also part to protect a local network from unwanted access. |
|
| 11. |
What Do You Mean By A Transparent Firewall? |
|
Answer» A TRANSPARENT firewall is thought to be as Layer 2 in any network. Installing a new firewall into a network can be a complicated process due to various issues for e.g. IP ADDRESS reconfiguration, network topology changes, current firewall etc. Since the firewall is not a routed hop, we can easily introduce a transparent firewall into an existing network. A transparent firewall is thought to be as Layer 2 in any network. Installing a new firewall into a network can be a complicated process due to various issues for e.g. IP address reconfiguration, network topology changes, current firewall etc. Since the firewall is not a routed hop, we can easily introduce a transparent firewall into an existing network. |
|
| 12. |
What Is The Difference Between Ips And Firewall? |
|
Answer» The main function of a firewall is to MANAGE traffic FLOW from an outside network. A firewall cannot detect an attack in which the data is deviating from its regular pattern, WHEREAS IPS can easily detect and reset that connection with its INBUILT anomaly DETECTION. The main function of a firewall is to manage traffic flow from an outside network. A firewall cannot detect an attack in which the data is deviating from its regular pattern, whereas IPS can easily detect and reset that connection with its inbuilt anomaly detection. |
|
| 13. |
What Is The Difference Between Gateway And Firewall Within A Network? |
|
Answer» NETWORK gateways connect TWO NETWORKS together whereas a FIREWALL ACTS as a shield to the computer against unauthorized incoming or outgoing access. Firewalls can be installed within a network as hardware devices or software programs. Network gateways connect two networks together whereas a firewall acts as a shield to the computer against unauthorized incoming or outgoing access. Firewalls can be installed within a network as hardware devices or software programs. |
|
| 14. |
How Can We Configure Nat Policies? |
|
Answer» To configure a Many-to-One NAT policy that allows all computers on the X1 interface to initiate traffic using the SonicWALL SECURITY appliance’s WAN IP ADDRESS, we need to perform the following steps:
To configure a Many-to-One NAT policy that allows all computers on the X1 interface to initiate traffic using the SonicWALL security appliance’s WAN IP address, we need to perform the following steps: |
|
| 15. |
Can We Configure Various Nat Policies Concurrently? |
|
Answer» A NAT policy provides us the flexibility to control Network Address Translation BASED on combinations of Source IP address, Destination IP address and Destination Services. Policy-based NAT allows us to activate different types of NAT at the same time. Following NAT configurations are available in SonicWALL.
A NAT policy provides us the flexibility to control Network Address Translation based on combinations of Source IP address, Destination IP address and Destination Services. Policy-based NAT allows us to activate different types of NAT at the same time. Following NAT configurations are available in SonicWALL. |
|
| 16. |
How To Create A Nat Policy? |
|
Answer» The Network Address Translation (NAT) engine in SONICWALL allows users to define granular NAT POLICIES for their incoming and outgoing TRAFFIC. By default, the SonicWALL SECURITY device has a preconfigured NAT policy to ALLOW all computers connected to the LAN to perform many to one NAT. It allows using the IP address of the WAN interface, and a policy not to perform NAT when traffic across other interfaces. The Network Address Translation (NAT) engine in SonicWALL allows users to define granular NAT policies for their incoming and outgoing traffic. By default, the SonicWALL security device has a preconfigured NAT policy to allow all computers connected to the LAN to perform many to one NAT. It allows using the IP address of the WAN interface, and a policy not to perform NAT when traffic across other interfaces. |
|
| 17. |
How Can We Access The Sonicwall Management Interface? |
|
Answer» We need to run the SETUP Tool to discover the SonicWALL’s IP address. Then we should try to ping the Sonic Wall's LAN interface IP and the upstream device's IP. We can use Sonic OS COMMAND Line Interface (CLI) GUIDE better known as the console port and use appropriate COMMANDS to RESET the settings. We need to run the Setup Tool to discover the SonicWALL’s IP address. Then we should try to ping the Sonic Wall's LAN interface IP and the upstream device's IP. We can use Sonic OS Command Line Interface (CLI) guide better known as the console port and use appropriate commands to reset the settings. |
|
| 18. |
How Can Sonicwall Firewall Be Configured Step By Step? |
|
Answer» We need to create an access rule:
We need to create an access rule: |
|
| 19. |
What Is Netextender Dell? |
|
Answer» NetExtender empowers Dell SonicWALL with Secured Remote Access (SRA) 4600 and 1600, ADDING facilities such as seamless and secure access to any resource on the corporate network, including SERVERS or custom applications. It is not a fat CLIENT. NetExtender is an SSL VPN client for securing WINDOWS, Mac, or Linux users which can be downloaded easily and allows us to run any application securely on the company's network. It uses Point-to-Point Protocol (PPP). NetExtender empowers Dell SonicWALL with Secured Remote Access (SRA) 4600 and 1600, adding facilities such as seamless and secure access to any resource on the corporate network, including servers or custom applications. It is not a fat client. NetExtender is an SSL VPN client for securing Windows, Mac, or Linux users which can be downloaded easily and allows us to run any application securely on the company's network. It uses Point-to-Point Protocol (PPP). |
|
| 20. |
What Is Sonicwall Mobile Connect? |
|
Answer» SonicWall Mobile Connect is a FREE app, which needs a concurrent user LICENSE on one of the SonicWALL router SOLUTIONS to function properly. SonicWall secures Mobile Access in 100 Series / SRA appliances running 7.5 or higher. SonicWall Mobile Connect is a free app, which needs a concurrent user license on one of the SonicWALL router solutions to function properly. SonicWall secures Mobile Access in 100 Series / SRA appliances running 7.5 or higher. |
|
| 21. |
What Are The Complex Issues Of Sonicwall? |
|
Answer» SonicWALL router configuration and deployment is very complex and needs highly trained expert for its installation. Its technology provides incredible and complex FUNCTIONALITY for its firewall CAPABILITIES. For organizations that need assistance, Remote Startup and Configuration SERVICE for the TZ Series is AVAILABLE from a wide RANGE of vendors. SonicWALL router configuration and deployment is very complex and needs highly trained expert for its installation. Its technology provides incredible and complex functionality for its firewall capabilities. For organizations that need assistance, Remote Startup and Configuration Service for the TZ Series is available from a wide range of vendors. |
|
| 22. |
Can Sonicwall Be Managed Centrally? |
|
Answer» TZ 100 series devices are EQUIPPED by SonicWALL's Global Management SYSTEM (GMS). This unique feature facilitates CENTRALIZED management of NUMEROUS SonicWALL devices, thereby lowering deployment and maintenance costs for larger organizations DUE to its GMS’ capability and remotely manages configurations, incorporate policies and reporting including supervision of real-time performance. TZ 100 series devices are equipped by SonicWALL's Global Management System (GMS). This unique feature facilitates centralized management of numerous SonicWALL devices, thereby lowering deployment and maintenance costs for larger organizations due to its GMS’ capability and remotely manages configurations, incorporate policies and reporting including supervision of real-time performance. |
|
| 23. |
What Is The Compatibility Features Of Sonicwall? |
|
Answer» SonicWALL TZ 100 is known for its compatibility. Several VPN encryption and validation technologies are supported, including DES, 3DES, AES, MD5, and SHA-1. Key exchange technologies that are supported include IKE, manual key, X.509 CERTIFICATES and L2TP over IPSec. Global VPN client platforms that are supported include WINDOWS 2000, XP, Vista and Windows 7, while the SSL VPN platforms that are supported include Mac OS X and multiple Linux distributions. RIP and static routes are that are supported on the TZ 100 platform is XAUTH/RADIUS, Active Directory, SSO, LDAP and Novell database validation. SonicWALL TZ 100 is known for its compatibility. Several VPN encryption and validation technologies are supported, including DES, 3DES, AES, MD5, and SHA-1. Key exchange technologies that are supported include IKE, manual key, X.509 certificates and L2TP over IPSec. Global VPN client platforms that are supported include Windows 2000, XP, Vista and Windows 7, while the SSL VPN platforms that are supported include Mac OS X and multiple Linux distributions. RIP and static routes are that are supported on the TZ 100 platform is XAUTH/RADIUS, Active Directory, SSO, LDAP and Novell database validation. |
|
| 24. |
How Sonicwall Helps Network Administrators? |
|
Answer» SonicWALL is known for its Standout FEATURES. Network administrators with a single INSTALLATION of SonicWALL obtain information on both site to site hardware and cross-platform software based VPN functionality, firewalled cases, DHCP SERVICES, comprehensive ROUTING capabilities, VOIP support, security supports at zonal and branch offices, logging and reporting functionality, perimeter protection and subscription services, load balancing capability, hardware failover capacity, an integrated network SWITCH with optional wireless connectivity. SonicWALL is known for its Standout features. Network administrators with a single installation of SonicWALL obtain information on both site to site hardware and cross-platform software based VPN functionality, firewalled cases, DHCP services, comprehensive routing capabilities, VOIP support, security supports at zonal and branch offices, logging and reporting functionality, perimeter protection and subscription services, load balancing capability, hardware failover capacity, an integrated network switch with optional wireless connectivity. |
|
| 25. |
What Is Sonicwall Tz 100 And Its Function? |
|
Answer» The SonicWALL TZ 100 is an efficient business WORKHORSE. This is a ROUTER, which boasts of widespread encryption capabilities, VPN and security compatibility which provides optional Unified Threat MANAGEMENT (UTM) SUBSCRIPTION services. It is fit for remote and branch OFFICES that must be securely connected to main headquarters' offices. The network security appliance is also an outstanding firewall option for small business organizations that require network security, remote connectivity functionality, and low-cost deployment. The SonicWALL TZ 100 is an efficient business workhorse. This is a router, which boasts of widespread encryption capabilities, VPN and security compatibility which provides optional Unified Threat Management (UTM) subscription services. It is fit for remote and branch offices that must be securely connected to main headquarters' offices. The network security appliance is also an outstanding firewall option for small business organizations that require network security, remote connectivity functionality, and low-cost deployment. |
|
| 26. |
What Is A Sonicwall Vpn? |
|
Answer» SonicWALL VPN specifies whether the VPN CONNECTION is being used to provide remote access or to connect TWO SonicWALL devices (Office Gateway). It also specifies the SonicWALL's IP address or DOMAIN name & provides a connection name and to click Next. SonicWALL VPN specifies whether the VPN connection is being used to provide remote access or to connect two SonicWALL devices (Office Gateway). It also specifies the SonicWALL's IP address or domain name & provides a connection name and to click Next. |
|
| 27. |
Why Do We Need A Firewall? |
|
Answer» Internet CONNECTION makes us exposed to hackers who access our FINANCIAL and personal information. Firewall works as a barrier, between our computer network and the internet. When we are connected to the Internet and are CONSTANTLY sending and RECEIVING information and can be EASILY hacked. SonicWALL is our first line of defense against security threats and control data over the Internet. Internet connection makes us exposed to hackers who access our financial and personal information. Firewall works as a barrier, between our computer network and the internet. When we are connected to the Internet and are constantly sending and receiving information and can be easily hacked. SonicWALL is our first line of defense against security threats and control data over the Internet. |
|
| 28. |
What Is A Dell Sonicwall? |
|
Answer» Dell Sonic Wall is a firewall solution that not only DETECTS security breaches but prevents them with Sonic Wall next-generation firewalls which have been recently awarded for its network security SOLUTIONS. Dell Sonic Wall blocks ransomware, encrypted threats, and phishing ATTACKS, not only on wired but also on wireless and MOBILE networks. Dell Sonic Wall is a firewall solution that not only detects security breaches but prevents them with Sonic Wall next-generation firewalls which have been recently awarded for its network security solutions. Dell Sonic Wall blocks ransomware, encrypted threats, and phishing attacks, not only on wired but also on wireless and mobile networks. |
|