Google

Firewalls Interview Questions

Firewalls Interview Questions

  1. What is Virus?
  2. What is Proxy?
  3. What is Worm?
  4. What is Logging?
  5. What is Trojan horse?
  6. What is Bastion Host?
  7. What is Authorization?
  8. What is DNS spoofing?
  9. What is Log Retention?
  10. What is Least Privilege?
  11. What is Access Router?
  12. What is Authentication?
  13. What is Screened Host?
  14. What is Log Processing?
  15. What is Data encryption?
  16. What is Screened Subnet?
  17. What is Defense in Depth?
  18. What is Screening Router?
  19. What is Tunneling Router?
  20. What is Abuse of Privilege?
  21. What is Data Driven Attack?
  22. What is Intrusion Detection?
  23. What is Challenge/Response?
  24. What is Access Control Lists?
  25. What is Host-based Security?
  26. What is Authentication Token?
  27. What is IP Splicing/Hijacking?
  28. What is Dual Homed Gateway?
  29. What is Network-Layer Firewall?
  30. What is Cryptographic Checksum?
  31. What is Perimeter-based Security?
  32. What is Virtual Network Perimeter?
  33. What is Application-Layer Firewall?
  34. In windows 2003 built in fire wall is there or not?
  35. What is the difference between gateway and firewall?
  36. What is firewall? How to enable firewall in Windows XP?
  37. What is the difference between router ACLs and Firewall ACLs?
  38. Configured to enable them to communicate with the DHCP server?
  39. How the two servers can communicate when the firewall is there in between?
  40. Can trace out command work across the firewall? If No then why? If Yes then why?
Article Global Facebook Twitter Myspace Friendfeed Technorati del.icio.us Digg Google StumbleUpon Eli Pets



Recent Interview Tips Articles



Follow us on Google Plus