What are the methods of defense (in context to IT-Security)?
Answer Posted / s.m.feroz ahmed
Hi,
Context are used to overcome Failover with the help of
Context one can configure Failover and types of failover
are Active-Active,Active-Standby and a single Firewall can
be configured in such a manner which will act as multiple
firewalls by configuring Contexts .Contexts are configured
in order to overcome Failover for defense purpose.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Diff bet ripv1 & ripv2?
How does ransomware work?
What are manageable and non manageable switches?
What is terminal emulation, in which layer it comes
Difference between bit rate and baud rate.
What is difference between baseband and broadband transmission
Define the meaning of an Authentication.
What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?
What is malware?
What is the difference between cybersecurity and information security?
What is the difference between a switch and a hub?
Explain what is the role of single sign on in authentication technologies?
Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....
What are the benefits of the firewall?