Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are the methods of defense (in context to IT-Security)?

Answer Posted / s.m.feroz ahmed

Hi,

Context are used to overcome Failover with the help of
Context one can configure Failover and types of failover
are Active-Active,Active-Standby and a single Firewall can
be configured in such a manner which will act as multiple
firewalls by configuring Contexts .Contexts are configured
in order to overcome Failover for defense purpose.

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Diff bet ripv1 & ripv2?

1027


How does ransomware work?

1106


What are manageable and non manageable switches?

1123


What is terminal emulation, in which layer it comes

1123


Difference between bit rate and baud rate.

1173


What is difference between baseband and broadband transmission

1216


Define the meaning of an Authentication.

1114


What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?

1035


What is malware?

1076


What is the difference between cybersecurity and information security?

1183


What is the difference between a switch and a hub?

1118


Explain what is the role of single sign on in authentication technologies?

1117


Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

1000


congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....

1670


What are the benefits of the firewall?

1103