Firewall

  Home  Computer Basics  Firewall


“Firewall guideline for job interview preparation. Explore list of Computer Firewall frequently asked questions(FAQs) asked in number of Firewall interviews. Post your comments as your suggestions, questions and answers on any Computer Firewall Interview Question or answer. Ask Computer Firewall Question, your question will be answered by our fellow friends.”



45 Firewall Questions And Answers

21⟩ What is Authentication Token?

A portable device used for authenticating a user. Authentication tokens operate by challenge/response, time-based code sequences, or other techniques. This may include paper-based lists of one-time passwords.

 180 views

22⟩ What is Tunneling Router?

A router or system capable of routing traffic by encrypting it and encapsulating it for transmission across an untrusted network, for eventual de-encapsulation and decryption.

 165 views

23⟩ Explain What is Application-Layer Firewall?

A firewall system in which service is provided by processes that maintain complete TCP connection state and sequencing. Application layer firewalls often re-address traffic so that outgoing traffic appears to have originated from the firewall, rather than the internal host.

 174 views

24⟩ Explain employee assistance program (EAP) application is now required to be deployed?

Your companys employee assistance program (EAP) application is now required to be deployed on the Web. The following are characteristics and requirements of the new system: The UI is an off-the-shelf, unsigned terminal-emulator applet. The applet communicates with a terminal server using a proprietary TCP/IP-based protocol. The terminal server sits behind the corporate firewall and listens on port 10001. The only configurable items for the applet

 198 views

25⟩ What is Screened Host?

A host on a network behind a screening router. The degree to which a screened host may be accessed depends on the screening rules in the router.

 162 views

28⟩ What is IP Splicing/Hijacking?

An attack whereby an active, established, session is intercepted and co-opted by the attacker. IP Splicing attacks may occur after an authentication has been made, permitting the attacker to assume the role of an already authorized user. Primary protections against IP Splicing rely on encryption at the session or network layer.

 183 views

29⟩ What is Screened Subnet?

A subnet behind a screening router. The degree to which the subnet may be accessed depends on the screening rules in the router.

 180 views

30⟩ What is Virtual Network Perimeter?

A network that appears to be a single protected network behind firewalls, which actually encompasses encrypted virtual links over untrusted networks.

 161 views

31⟩ What is Data Driven Attack?

A form of attack in which the attack is encoded in innocuous-seeming data which is executed by a user or other software to implement an attack. In the case of firewalls, a data driven attack is a concern since it may get through the firewall in data form and launch an attack against a system behind the firewall.

 165 views

32⟩ What is Dual Homed Gateway?

A dual homed gateway is a system that has two or more network interfaces, each of which is connected to a different network. In firewall configurations, a dual homed gateway usually acts to block or filter some or all of the traffic trying to pass between the networks.

 170 views

33⟩ What is Trojan Horse?

A software entity that appears to do something normal but which, in fact, contains a trapdoor or attack program.

the software which protects the computer from getting virus which totally affects the total working of the computer

 182 views

35⟩ What is Virus?

A replicating code segment that attaches itself to a program or data file. Viruses might or might not not contain attack programs or trapdoors.

Viruses is hidden software

program.

 162 views

38⟩ What is Proxy?

A software agent that acts on behalf of a user. Typical proxies accept a connection from a user, make a decision as to whether or not the user or client IP address is permitted to use the proxy, perhaps does additional authentication, and then completes a connection on behalf of the user to a remote destination.

 164 views

39⟩ What is Intrusion Detection?

Detection of break-ins or break-in attempts either manually or via software expert systems that operate on logs or other information available on the network.

 196 views

40⟩ What is Logging?

The process of storing information about events that occurred on the firewall or network.

 195 views