What are the methods of defense (in context to IT-Security)?
Answer Posted / s.m.feroz ahmed
Hi,
Context are used to overcome Failover with the help of
Context one can configure Failover and types of failover
are Active-Active,Active-Standby and a single Firewall can
be configured in such a manner which will act as multiple
firewalls by configuring Contexts .Contexts are configured
in order to overcome Failover for defense purpose.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is RIS?
What is terminal emulation, in which layer it comes
How does ransomware work?
What is difference between baseband and broadband transmission
What are the different types of network security?
How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
What is cloud security?
What is the difference between a virus and malware?
What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?
What is classful and classless routing?
What is subnet
What is the sense of a fingerprint?
What is difference between arp & rarp? How both of these protocols will work, and where it will use?
What is kerberos protocol?
What is remote access vpn?