JavaScript is disabled!Click here to see how to enable
MscIT study materials
Home
MscIT Part II
Sem III
Question Bank Answer
Ethical Hacking
unit 1
unit 2
unit 3
unit 4
unit 5
ISM
unit 1
unit 2
unit 3
unit 4
unit 5
Virtualization
unit 1
unit 2
unit 3
unit 4
unit 5
Embedded System
unit 1
unit 2
unit 3
unit 4
unit 5
Practicals
Ethical Hacking
ISM
Virtualization
Embedded System
Sem IV
Question Bank Answer
Practicals
Project Ideas
visual basic
java
Breaking News
Sunday, August 16, 2015
ISM unit 2 question bank answers 55-60
QUESTION NUMBER 55-60
55. Recovering From a Security Compromise
Most organizations eventually face a successful compromise of one or more hosts on their network.
Read more ...
Share !
Tweet
Read more »
ISM unit 2 question bank answers 50-54
QUESTION NUMBER 50-54
50. State IEEE 802.11 Network Components and explain its Architectural Models.
IEEE 802.11 has two fundamental architectural components, as follows:
• ¬
Station (STA).
A STA is a wireless endpoint device. Typical examples of STAs are laptop
Read more ...
Share !
Tweet
Read more »
ISM unit 2 question bank answers 45-49
QUESTION NUMBER 45-49
45. What are the various policies based on applications, user identity & Network Activity.
Policies Based on Applications
Most early firewall work involved simply blocking unwanted or suspicious traffic at the network
Read more ...
Share !
Tweet
Read more »
Saturday, August 15, 2015
ISM unit 2 question bank answers 40-44
QUESTION NUMBER 40-44
Read more ...
Share !
Tweet
Read more »
ISM unit 2 question bank answers 35-39
QUESTION NUMBER 35-39
35. Explain how firewall act as network address translators.
Most firewalls can perform NAT, which is sometimes called port address translation (PAT) or
Read more ...
Share !
Tweet
Read more »
Friday, August 14, 2015
ISM unit 2 question bank answers 30-34
QUESTION BANK 30-34
30. What are the typical components of network based IDPS
A typical network-based IDPS is composed of sensors, one or more management servers, multiple
Read more ...
Share !
Tweet
Read more »
Thursday, August 13, 2015
ISM unit 2 question bank answers 25-29
QUESTION NUMBER 25-29
25. What are the various uses of IDPS technologies?
IDPSs are primarily focused on identifying possible incidents. For example, an IDPS could detect
Read more ...
Share !
Tweet
Read more »
Subscribe to:
Posts (Atom)
Designed By
Blogger Templates