What are the methods of defense (in context to IT-Security)?
Answer Posted / s.m.feroz ahmed
Hi,
Context are used to overcome Failover with the help of
Context one can configure Failover and types of failover
are Active-Active,Active-Standby and a single Firewall can
be configured in such a manner which will act as multiple
firewalls by configuring Contexts .Contexts are configured
in order to overcome Failover for defense purpose.
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is difference between discretionary access control and mandatory access control?
What is udp flood?
Why is it important to have a nac solution?
What is the general data protection regulation (gdpr)?
Why should you care about the OSI Reference Model
Explain how do we use rsa for both authentication and secrecy?
Explain the difference between discretionary access control and mandatory access control?
How does ransomware work?
What are the data units at different layers of the TCP / IP protocol suite
congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....
What is classful and classless routing?
What is a Password?
What are digital signatures and smart cards?
What is an arp and how does it work?
What is utm firewall?