Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Name components of a firewall system?

Answers were Sorted based on User's Feedback



Name components of a firewall system?..

Answer / joshi

Major components of a UTM(Unified Threat Management)
firewall appliance are
1. Anti-Spam
2. Anti-Virus
3. IDP/IDS
4. VPN
5. Content Filtering

Is This Answer Correct ?    24 Yes 5 No

Name components of a firewall system?..

Answer / s.m.feroz ahmed

Hi,

Components of firewall are :Console port to self configure
firewall device.RJ45 jack for connecting firewall with
router cable cross cabling for connecting router with
firewall .ethernet ports e0,e1 and e2 one can increase
ethernet ports .

Is This Answer Correct ?    1 Yes 7 No

Post New Answer

More Networking Security Interview Questions

What is the difference between Security and Safety?

4 Answers  


1- what is PHP ? 2- what is TS getway and TS application ? 3- what is channel in telecom and y we use ? 4- what is difference between spyware and mallware ? 5- what is main difference between standard and extended ACL ? please repley in sequence

0 Answers  


What is Secure Sockets Layer (SSL)?

3 Answers  


What protocol is used by DNS name servers

0 Answers  


How long can a ddos attack last?

0 Answers  


What are the properties of universal trojan horses?

1 Answers  


What is 3 DES 256 bit security in IPSec technology.

2 Answers   DEWA, Pact,


What are the data units at different layers of the TCP / IP protocol suite

0 Answers   Elgi Equipments,


How to make a system in Network secure?

3 Answers  


What are the 5 aspects of IT-Security?

6 Answers   Infosys,


Define the meaning of an Authentication.

0 Answers  


What are all the technical steps involved when the data transmission from server via router?

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)