which of the following network components is PRIMARILY set up to serve as security measure by preventing unauthorzed traffic between different segments of the network?
5 7247A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?
3 7258How do you Trace a person with IP Address? How do you detect a person using Fake IP (Proxy IP)?
4 8680What is Firewall? I saw in one website Firewall is software and hardware and combination of software and hardware.It is used to protect user information or avoiding crackers.how it is?Whether it is hardware?If not then why the images are like that?(a wall ).Please help me by answering this question.Advance thanks.
4 5916Post New Networking Security Questions
Explain the difference between broadcast domain and collision domain?
Where do you get updates on security?
What is cloud security?
What is meant by port blocking within lan?
What is proxy firewall?
What are the types of LAN cables used? What is a cross cable?
What is an arp?
Why should you care about the OSI Reference Model
explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)
What does cia stand for in security management?
What is ospf protocol
Which are the different factors that affect the security of a network?
What is shadow it?
What is terminal emulation, in which layer it comes
What is a ddos attack?