Firewalls Interview Questions
- What is Virus?
- What is Proxy?
- What is Worm?
- What is Logging?
- What is Trojan horse?
- What is Bastion Host?
- What is Authorization?
- What is DNS spoofing?
- What is Log Retention?
- What is Least Privilege?
- What is Access Router?
- What is Authentication?
- What is Screened Host?
- What is Log Processing?
- What is Data encryption?
- What is Screened Subnet?
- What is Defense in Depth?
- What is Screening Router?
- What is Tunneling Router?
- What is Abuse of Privilege?
- What is Data Driven Attack?
- What is Intrusion Detection?
- What is Challenge/Response?
- What is Access Control Lists?
- What is Host-based Security?
- What is Authentication Token?
- What is IP Splicing/Hijacking?
- What is Dual Homed Gateway?
- What is Network-Layer Firewall?
- What is Cryptographic Checksum?
- What is Perimeter-based Security?
- What is Virtual Network Perimeter?
- What is Application-Layer Firewall?
- In windows 2003 built in fire wall is there or not?
- What is the difference between gateway and firewall?
- What is firewall? How to enable firewall in Windows XP?
- What is the difference between router ACLs and Firewall ACLs?
- Configured to enable them to communicate with the DHCP server?
- How the two servers can communicate when the firewall is there in between?
- Can trace out command work across the firewall? If No then why? If Yes then why?