Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are the methods of defense (in context to IT-Security)?

Answers were Sorted based on User's Feedback



What are the methods of defense (in context to IT-Security)?..

Answer / taylors engineering

it may still be influenced by the operating system
community in order to adjust the context to their needs.
The other driving force of changes will be the use of
cryptographic methods, which will contribute to some new
security functions, but also help to extend traditional
security functions across single system boundaries.
Looking at security functions as a whole it will turn out
that even the more classical ones are not yet mature but
stil need improvements in order to reach generality,
symmetry, and applicability.

Is This Answer Correct ?    1 Yes 0 No

What are the methods of defense (in context to IT-Security)?..

Answer / s.m.feroz ahmed

Hi,

Context are used to overcome Failover with the help of
Context one can configure Failover and types of failover
are Active-Active,Active-Standby and a single Firewall can
be configured in such a manner which will act as multiple
firewalls by configuring Contexts .Contexts are configured
in order to overcome Failover for defense purpose.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Networking Security Interview Questions

How the telecommunicaton is working?I have heared that one control will be there for asia countries for other countries there will be another,what is that how they work?

0 Answers   Excel, RT Outsourcing,


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

0 Answers  


What is proxy firewall?

0 Answers  


Can you give me some ransomware variants?

0 Answers  


What is terminal emulation, in which layer it comes

0 Answers   Elgi Equipments,


Where do you get updates on security?

0 Answers  


What is subnet

0 Answers   Elgi Equipments,


What are the two types of security policies?

3 Answers  


What is difference between discretionary access control and mandatory access control?

0 Answers  


What is ransomware?

0 Answers  


What if the machine doesnt show entry in Network neighbourhood and its showing it in Active directory users and computers?

3 Answers   HCL, Symantec,


which institute is best for net working in hyderabad

1 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)