What are the methods of defense (in context to IT-Security)?

Answer Posted / s.m.feroz ahmed

Hi,

Context are used to overcome Failover with the help of
Context one can configure Failover and types of failover
are Active-Active,Active-Standby and a single Firewall can
be configured in such a manner which will act as multiple
firewalls by configuring Contexts .Contexts are configured
in order to overcome Failover for defense purpose.

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is difference between discretionary access control and mandatory access control?

569


What is udp flood?

591


Why is it important to have a nac solution?

744


What is the general data protection regulation (gdpr)?

564


Why should you care about the OSI Reference Model

632






Explain how do we use rsa for both authentication and secrecy?

597


Explain the difference between discretionary access control and mandatory access control?

558


How does ransomware work?

626


What are the data units at different layers of the TCP / IP protocol suite

591


congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....

1134


What is classful and classless routing?

573


What is a Password?

615


What are digital signatures and smart cards?

569


What is an arp and how does it work?

655


What is utm firewall?

590