CoolInterview.com - World's Largest Collection of Interview Questions & Answers, FAQs, queries, sample papers, exam papers, dumps, what, why, how, where, when questions
Our Services
Get 9,000 Interview Questions & Answers in an eBook.




Get it now !!
Send your Resume to 6000 Companies
Firewalls Interview Questions & Answers - Learning Mode
COOLINTERVIEW.COM COMPUTERS INTERVIEW QUESTIONS FIREWALLS INTERVIEW QUESTIONS QUESTIONS & ANSWERS - LEARNING MODE

Firewalls Interview Questions & Answers - Learning Mode

Firewalls are software programs or hardware devices that filter the traffic that flows into you PC or your network through a internet connection. They sift through the data flow & block that which they deem (based on how & for what you have tuned the firewall) harmful to your network or computer system. Firewall has two network interfaces: one for the external side of the network, one for the internal side. Its purpose is to control what traffic is allowed to traverse from one side to the other. As the most basic level, firewalls can block traffic intended for particular IP addresses or server ports.

Try Firewalls Interview Questions & Answers - Exam Mode

1 2 3 Next

Sort By : Latest First | Oldest First | By Rating

Firewalls Interview Questions & Answers - Learning Mode
Try Firewalls Interview Questions & Answers - Exam Mode
Question: What is the difference between gateway and firewall?

Answer:
A network gateway joins two networks together through a combination of hardware and software.A network firewall guards a computer network against unauthorized incoming or outgoing access. Network firewalls may be hardware devices or software programs. ... Source: CoolInterview.com
Question: What is the difference between router ACLs and Firewall ACLs?

Answer:
Fundamental purpose: 1)Routers are designed to route traffic, not stop it.2)Firewalls are designed to examine and accept/reject traffic. But the both ACL are do the same job. Depending upon our requirments we do our ACL configuration on it. ... Source: CoolInterview.com
Question: If JumpStart clients are on a different subnet to the DHCP server, what must be configured to enable
If JumpStart clients are on a different subnet to the DHCP server, what must be configured to enable them to communicate with the DHCP server?


Answer: If JumpStart clients are on a different subnet to the DHCP server, what must be configured to enable
If JumpStart clients are on a different subnet to the DHCP server, what must be configured to enable them to communicate with the DHCP server? Source: CoolInterview.com
Question: What is Tunneling Router?

Answer: A router or system capable of routing traffic by encrypting it and encapsulating it for transmission across an untrusted network, for eventual de-encapsulation and decryption. Source: CoolInterview.com
Question: What is Cryptographic Checksum?

Answer: A one-way function applied to a file to produce a unique ``fingerprint'' of the file for later reference. Checksum systems are a primary means of detecting filesystem tampering on Unix. Source: CoolInterview.com
Question: What is Logging?

Answer: The process of storing information about events that occurred on the firewall or network. Source: CoolInterview.com
Question: What is Data Driven Attack?

Answer: A form of attack in which the attack is encoded in innocuous-seeming data which is executed by a user or other software to implement an attack. In the case of firewalls, a data driven attack is a concern since it may get through the firewall in data form and launch an attack against a system behind the firewall. Source: CoolInterview.com
Question: What is Screened Subnet?

Answer: A subnet behind a screening router. The degree to which the subnet may be accessed depends on the screening rules in the router. Source: CoolInterview.com
Question: What is Application-Layer Firewall?

Answer: A firewall system in which service is provided by processes that maintain complete TCP connection state and sequencing. Application layer firewalls often re-address traffic so that outgoing traffic appears to have originated from the firewall, rather than the internal host. Source: CoolInterview.com
Question: What is Log Processing?

Answer: How audit logs are processed, searched for key events, or summarized. Source: CoolInterview.com
Question: Your company?s employee assistance program (EAP) application is now required to be deployed

Answer: Your company?s employee assistance program (EAP) application is now required to be deployed on the Web. The following are characteristics and requirements of the new system: ? The UI is an off-the-shelf, unsigned terminal-emulator applet. ? The applet communicates with a terminal server using a proprietary TCP/IP-based protocol. ? The terminal server sits behind the corporate firewall and listens on port 10001. ? The only configurable items for the applet Source: CoolInterview.com
Question: You are currently designing your own Desktop Publishing application, as you have not found any that

Answer: You are currently designing your own Desktop Publishing application, as you have not found any that do exactly what you want with existing applications. As part of the design you are using a Controller to which you send all GUI requests. Not all objects can process the same commands. For example you can?t select the spell check tool when an image has the focus. To stop any possible errors you would like to filter out some of the messages as they are passed from these objects to Source: CoolInterview.com
Question: What is Host-based Security?

Answer: The technique of securing an individual system from attack. Host based security is operating system and version dependent. Source: CoolInterview.com
Question: In windows 2003 built in fire wall is there or not?

Answer: In Windows 2003 Server,?built in firewall is present. ... Source: CoolInterview.com
Question: What is firewall? How to enable firewall in Windows XP?

Answer: To enable firewall in Window...Start - Controlpanel - Security center -Turn On the Firewall Button and enable it. ... Source: CoolInterview.com
Question: What is Log Retention?

Answer: How long audit logs are retained and maintained. Source: CoolInterview.com
Question: What is Virtual Network Perimeter?

Answer: A network that appears to be a single protected network behind firewalls, which actually encompasses encrypted virtual links over untrusted networks. Source: CoolInterview.com
Question: What is Network-Layer Firewall?

Answer: A firewall in which traffic is examined at the network protocol packet layer. Source: CoolInterview.com
Question: What is Screened Host?

Answer: A host on a network behind a screening router. The degree to which a screened host may be accessed depends on the screening rules in the router. Source: CoolInterview.com
Question: What is Authorization?

Answer: The process of determining what types of activities are permitted. Usually, authorization is in the context of authentication: once you have authenticated a user, they may be authorized different types of access or activity. Source: CoolInterview.com

1 2 3 Next



India News Network
Latest 20 Questions
Payment of time- barred debt is: (a) Valid (b) Void (c) Illegal (d) Voidable
Consideration is defined in the Indian Contract Act,1872 in: (a) Section 2(f) (b) Section 2(e) (c) Section 2(g) (d) Section 2(d)
Which of the following is not an exception to the rule, "No consideration, No contract": (a) Natural love and affection (b) Compensation for involuntary services (c) Completed gift (d) Agency
Consideration must move at the desire of: (a) The promisor (b) The promisee (c) The promisor or any other party (d) Both the promisor and the promisee
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal
Cache = 0.03125 Seconds