Firewall

  Home  Computer Basics  Firewall


“Firewall guideline for job interview preparation. Explore list of Computer Firewall frequently asked questions(FAQs) asked in number of Firewall interviews. Post your comments as your suggestions, questions and answers on any Computer Firewall Interview Question or answer. Ask Computer Firewall Question, your question will be answered by our fellow friends.”



45 Firewall Questions And Answers

1⟩ What is uthentication?

The process of determining the identity of a user that is attempting to access a system.

authentication is a process that can verify pc identity(user name and pass etc).

 175 views

2⟩ What is IP Spoofing?

An attack whereby a system attempts to illicitly impersonate another system by using its IP network address.

In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system

 191 views

4⟩ What is Defense in Depth?

The security approach whereby each system on the network is secured to the greatest possible degree. May be used in conjunction with firewalls.

 172 views

6⟩ What is Bastion Host?

A system that has been hardened to resist attack, and which is installed on a network in such a way that it is expected to potentially come under attack. Bastion hosts are often components of firewalls, or may be ``outside'' web servers or public access systems. Generally, a bastion host is running some form of general purpose operating system (e.g., Unix, VMS, NT, etc.) rather than a ROM-based or firmware operating system.

 226 views

7⟩ What is DNS spoofing?

Assuming the DNS name of another system by either corrupting the name service cache of a victim system, or by compromising a domain name server for a valid domain.

 182 views

8⟩ Explain You are currently designing your own Desktop Publishing application, as you have not found any that?

You are currently designing your own Desktop Publishing application, as you have not found any that do exactly what you want with existing applications. As part of the design you are using a Controller to which you send all GUI requests. Not all objects can process the same commands. For example you can?t select the spell check tool when an image has the focus. To stop any possible errors you would like to filter out some of the messages as they are passed from these objects to

 195 views

9⟩ What is Cryptographic Checksum?

A one-way function applied to a file to produce a unique ``fingerprint'' of the file for later reference. Checksum systems are a primary means of detecting filesystem tampering on Unix.

 178 views

10⟩ What is Least Privilege?

Designing operational aspects of a system to operate with a minimum amount of system privilege. This reduces the authorization level at which various actions are performed and decreases the chance that a process or user with high privileges may be caused to perform unauthorized activity resulting in a security breach.

 181 views

11⟩ What is Challenge/Response?

An authentication technique whereby a server sends an unpredictable challenge to the user, who computes a response using some form of authentication token.

 188 views

13⟩ What is Worm?

A standalone program that, when run, copies itself from one host to another, and then runs itself on each newly infected host. The widely reported 'Internet Virus' of 1988 was not a virus at all, but actually a worm.

 179 views

15⟩ Explain What is Firewall?

A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices which is configured to permit or deny computer applications based upon a set of rules and other criteria.

Firewalls can be implemented in either hardware or software, or a combination of both.

 179 views

17⟩ Explain What is Authorization?

The process of determining what types of activities are permitted. Usually, authorization is in the context of authentication: once you have authenticated a user, they may be authorized different types of access or activity.

 171 views

19⟩ What is Screening Router?

A router configured to permit or deny traffic based on a set of permission rules installed by the administrator.

 160 views

20⟩ Explain the difference between gateway and firewall?

A network gateway joins two networks together through a combination of hardware and software.A network firewall guards a computer network against unauthorized incoming or outgoing access. Network firewalls may be hardware devices or software programs. ...

A network gateway joins two networks together through a combination of hardware and software.A network firewall guards a computer network against unauthorized incoming or outgoing access. Network firewalls may be hardware devices or software programs. ...

 155 views