What are the methods of defense (in context to IT-Security)?
Answer Posted / s.m.feroz ahmed
Hi,
Context are used to overcome Failover with the help of
Context one can configure Failover and types of failover
are Active-Active,Active-Standby and a single Firewall can
be configured in such a manner which will act as multiple
firewalls by configuring Contexts .Contexts are configured
in order to overcome Failover for defense purpose.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is the difference between a virus and malware?
How long can a ddos attack last?
Explain what are digital signatures and smart cards?
What is cloud security?
How do we do authentication with message digest(md5)?
Different Bitwin ADSL & DSL ROUTER? How To Configure
What is shadow it?
What are the main components of the CERT Taxonomy?
What is next-generation firewall (ngfw)?
How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
Which are the different factors that affect the security of a network?
What is difference between arp & rarp? How both of these protocols will work, and where it will use?
What are digital signatures and smart cards?
What is stateful inspection firewall?