Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is firewall?How it differs from ACLS?

Answer Posted / shailandra prakash trivedi

A firewall is a secure and trusted machine that sits between
a private network and a public network.
Access Control List is a list of permissions attached to an
object.The list specifies who or what is allowed to access
the object and what operations are allowed to be performed
on the object.

Is This Answer Correct ?    5 Yes 3 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Contrast link state and distance vector routing protocols, giving an example of each.

1625


When creating a static route, what is the gateway used to define?

2089


Explain HDLC

1637


Why transport layer protocols like TCP and UDP are called end-to-end protocols. What is the difference between them?

3339


What does ‘data transparency’ mean ? With the help of a flow chart, explain the process of bit de-stuffing at the receiver’s end.

1830


Give the equivalent binary word for the polynomial x8+x2+x+1.

1740


Explain the following ARQ techniques in detail 1. Stop and wait ARQ 2. Selective repeat ARQ

2538


When is a translating bridge used ?

1735


Explain what is meant by the term ‘integrated service digital network’. Give three reasons a company might choose an ISDN link in preference to a leased line.

1661


1. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?

2805


Explain FDDI

1796


If the transmitted code word is 10011000 and the received code word is 11001001. What is the error word ? Write transmitted code word , received code word and error word as polynomials.

3065


Differentiate between Link state and Distance Vector Routing algorithm.

1777


Explain Network Topologies and their uses.

1675


The physical layer service is a non-confirmed service. Assume that some bits of data are lost during transmission over physical media, which layer will detect the loss and take some remedial measures. Explain any one method clearly depicting how this operation is performed.

2777