Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are difference between Juniper and checkpoint firewall?
and Can you explain me about the difference between checkpoint
and Cisco pix firewall ?

Answer Posted / manjunatha murthy

Checkpoint is a software based firewall which can be
installed on various operating systems such as Windows,
Linux, IPSO, Solaris and thus make the Operating system to
become a stateful firewall.

Cisco Firewalls are not operation system firewalls, its IOS
based.

Is This Answer Correct ?    6 Yes 6 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Which are the different factors that affect the security of a network?

909


What is http flood?

950


Difference between bit rate and baud rate.

1035


What is trojan virus?

944


How to you keep yourself updated on network security ?

1024


What are the main components of the CERT Taxonomy?

3903


Define the meaning of an Authentication.

1004


What protocol is used by DNS name servers

1051


Explain what does cia stand for in security management?

916


What is cybersecurity?

988


What is difference between arp & rarp? How both of these protocols will work, and where it will use?

1028


Is vpn traffic encrypted?

1017


What is Imaging/ghosting?

1009


How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

902


What is Cross Site Request Forgery and how to defend against it?

972