which of the following network components is PRIMARILY set up to serve as security measure by preventing unauthorzed traffic between different segments of the network?
5 7125A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?
3 7141How do you Trace a person with IP Address? How do you detect a person using Fake IP (Proxy IP)?
4 8551What is Firewall? I saw in one website Firewall is software and hardware and combination of software and hardware.It is used to protect user information or avoiding crackers.how it is?Whether it is hardware?If not then why the images are like that?(a wall ).Please help me by answering this question.Advance thanks.
4 5802Post New Networking Security Questions
What is Cross site scripting?
How the telecommunicaton is working?I have heared that one control will be there for asia countries for other countries there will be another,what is that how they work?
What is multicasting?
congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....
What is site-to-site vpn?
What is the sense of a fingerprint?
explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)
What is classful and classless routing?
What are the types of Transmission media
What is stateful inspection firewall?
How do we use rsa for both authentication and secrecy?
What are the data units at different layers of the TCP / IP protocol suite
Explain difference between broadcast domain and collision domain?
Can you give me some ransomware variants?
What is frame relay, in which layer it comes