which of the following network components is PRIMARILY set up to serve as security measure by preventing unauthorzed traffic between different segments of the network?
5 7113A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?
3 7131How do you Trace a person with IP Address? How do you detect a person using Fake IP (Proxy IP)?
4 8538What is Firewall? I saw in one website Firewall is software and hardware and combination of software and hardware.It is used to protect user information or avoiding crackers.how it is?Whether it is hardware?If not then why the images are like that?(a wall ).Please help me by answering this question.Advance thanks.
4 5789Post New Networking Security Questions
What is Imaging/ghosting?
What are all the technical steps involved when the data transmission from server via router?
What is Cross Site Request Forgery and how to defend against it?
How does network security work?
If you need to encrypt and compress data for transmission, how would you achieve it?
What is difference between arp & rarp? How both of these protocols will work, and where it will use?
What is next-generation firewall (ngfw)?
What is RIS?
How do we do authentication with message digest(md5)?
Define the meaning of an Authentication.
What is site-to-site vpn?
What is a DNS resource record
Why is it important to have a nac solution?
What is shadow it?
Difference between the communication and transmission.