Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are the methods of defense (in context to IT-Security)?

Answer Posted / s.m.feroz ahmed

Hi,

Context are used to overcome Failover with the help of
Context one can configure Failover and types of failover
are Active-Active,Active-Standby and a single Firewall can
be configured in such a manner which will act as multiple
firewalls by configuring Contexts .Contexts are configured
in order to overcome Failover for defense purpose.

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the difference between a virus and malware?

993


How long can a ddos attack last?

1224


Explain what are digital signatures and smart cards?

1189


What is cloud security?

1031


How do we do authentication with message digest(md5)?

973


Different Bitwin ADSL & DSL ROUTER? How To Configure

3009


What is shadow it?

979


What are the main components of the CERT Taxonomy?

3968


What is next-generation firewall (ngfw)?

1106


How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

956


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

972


Which are the different factors that affect the security of a network?

967


What is difference between arp & rarp? How both of these protocols will work, and where it will use?

1070


What are digital signatures and smart cards?

1033


What is stateful inspection firewall?

1084