which of the following network components is PRIMARILY set up to serve as security measure by preventing unauthorzed traffic between different segments of the network?
5 6884A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?
3 6976How do you Trace a person with IP Address? How do you detect a person using Fake IP (Proxy IP)?
4 8336What is Firewall? I saw in one website Firewall is software and hardware and combination of software and hardware.It is used to protect user information or avoiding crackers.how it is?Whether it is hardware?If not then why the images are like that?(a wall ).Please help me by answering this question.Advance thanks.
4 5606Post New Networking Security Questions
What protocol is used by DNS name servers
What is the difference between routable and non- routable protocols
Diff bet ripv1 & ripv2?
What is udp flood?
What is information security?
Describe a TCP connection sequence
What is the difference between cybersecurity and information security?
What are the types of LAN cables used? What is a cross cable?
What are the main components of the CERT Taxonomy?
What factors would you consider before deploying a web intrusion detection system?
What is intrusion prevention systems (ips)?
How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?
What type of network do you use at home?
What is site-to-site vpn?