Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are the methods of defense (in context to IT-Security)?

Answer Posted / s.m.feroz ahmed

Hi,

Context are used to overcome Failover with the help of
Context one can configure Failover and types of failover
are Active-Active,Active-Standby and a single Firewall can
be configured in such a manner which will act as multiple
firewalls by configuring Contexts .Contexts are configured
in order to overcome Failover for defense purpose.

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is RIS?

977


What is terminal emulation, in which layer it comes

978


How does ransomware work?

994


What is difference between baseband and broadband transmission

1070


What are the different types of network security?

1024


How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

905


What is cloud security?

955


What is the difference between a virus and malware?

940


What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?

937


What is classful and classless routing?

951


What is subnet

1007


What is the sense of a fingerprint?

1005


What is difference between arp & rarp? How both of these protocols will work, and where it will use?

1032


What is kerberos protocol?

983


What is remote access vpn?

947