Vous êtes sur la page 1sur 5

w Home (../index.php) | Interview Questions (index.php) | Articles (../articles/) | Directory (../dir/index.

php)
| @Forum (../forum/index.php) | Q Contact Us (../contactUs.php)
Global Guideline- Interviewer and IntervieweeGuide
e.g. HR Interview Questions
Search
Add New Question ()
Computer Firewall Interview Preparation Guide Download PDF O
(Download.php?sc=Firewall)
Firewall guideline for job interview preparation. Explore list of Computer Firewall frequently asked
questions(FAQs) asked in number of Firewall interviews. Post your comments as your suggestions,
questions and answers on any Computer Firewall Interview Question or answer. Ask Computer
Firewall Question, your question will be answered by our fellow friends.
45 Firewall Questions and Answers:
1 :: What is Log Processing? (Answer.php?a=What_is_Log_Processing)
How audit logs are processed, searched for key events, or summarized.
IsThisAnswer Correct? 10 Yes 0 No Post Your Answer
2 :: What is IP Spoofing? (Answer.php?a=What_is_IP_Spoofing)
An attack whereby a system attempts to illicitly impersonate another system by using its IP network
address.
In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet
Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of
concealing the identity of the sender or impersonating another computing system
IsThisAnswer Correct? 2 Yes 0 No Post Your Answer
3 :: What is Defense in Depth? (Answer.php?a=What_is_Defense_in_Depth)
The security approach whereby each system on the network is secured to the greatest possible
degree. May be used in conjunction with firewalls.
IsThisAnswer Correct? 1 Yes 0 No Post Your Answer
4 :: What is uthentication? (Answer.php?a=What_is_uthentication)
The process of determining the identity of a user that is attempting to access a system.
authentication is a process that can verify pc identity(user name and pass etc).
IsThisAnswer Correct? 2 Yes 1 No Post Your Answer
5 :: What is Least Privilege? (Answer.php?a=What_is_Least_Privilege)
Designing operational aspects of a system to operate with a minimum amount of system privilege.
This reduces the authorization level at which various actions are performed and decreases the
chance that a process or user with high privileges may be caused to perform unauthorized activity
resulting in a security breach.
IsThisAnswer Correct? 2 Yes 0 No Post Your Answer
6 :: What is Cryptographic Checksum? (Answer.php?a=What_is_Cryptographic_Checksum)
A one-way function applied to a file to produce a unique ``fingerprint'' of the file for later reference.
Checksum systems are a primary means of detecting filesystem tampering on Unix.
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
7 :: Explain You are currently designing your own Desktop Publishing application, as you have not
found any that? (Answer.php?
a=Explain_You_are_currently_designing_your_own_Desktop_Publishing_application_as_you_have_not_found_an)
You are currently designing your own Desktop Publishing application, as you have not found any that
do exactly what you want with existing applications. As part of the design you are using a Controller
to which you send all GUI requests. Not all objects can process the same commands. For example
you can?t select the spell check tool when an image has the focus. To stop any possible errors you
would like to filter out some of the messages as they are passed from these objects to
(http://feeds.feedburner.com/GlobalGuideLine)
I nter vi ew C ateg or i es :
(index.php)
(Details.php?c=Accounting_Finance_Marketing_Interview_Questions_a )
(Details.php?c=Aerospace )
(Details.php?c=Analysis_Interview_Questions_and_Answers )
(Details.php?c=Applications_Programs_Interview_Questions_and_Answ )
(Details.php?c=Arts )
(Details.php?c=Basic_Common_Interview_Questions_Answers. )
(Questions.php?sc=Ambition_Interview_Questions_and_Answers )
(Questions.php?sc=Analytical )
(Questions.php?sc=Aptitude )
(Questions.php?sc=Aptitude_Knowledge_Questions_Answers )
(Questions.php?sc=Assertiveness_Interview_Questions_and_Answers )
(Questions.php?sc=Basic_Common_Interview_Questions_and_Answers )
(Questions.php?sc=Behavioral )
(Questions.php?sc=Business_intelligence_Interview_Questions_and_Answers_ )
(Questions.php?sc=Career_Advice_Requests )
(Questions.php?sc=Career_Change )
(Questions.php?sc=Career_Goals_Interview_Questions_and_Answers )
(Questions.php?sc=Citizenship_Interview_Questions_and_Answers )
(Questions.php?sc=Coaching_Ability_Interview_Questions_and_Answers )
(Questions.php?sc=Communication_Skills_Interview_Questions_and_Answers )
(Questions.php?sc=Computer_Basics_Interview_Questions_and_Answers )
(Questions.php?sc=Computer_security )
(Questions.php?sc=Confidence_Building_Interview_Questions_and_Answers )
(Questions.php?sc=Conflict_Interview_Questions_and_Answers )
(Questions.php?sc=Corporate_Communication )
(Questions.php?sc=Creativity_Interview_Questions_and_Answers )
(Questions.php?sc=Current_Affairs_2009 )
(Questions.php?sc=Current_Affairs_2010 )
(Questions.php?sc=Current_Affairs_2011 )
(Questions.php?sc=Decision_Making_Interview_Questions_and_Answers )
(Questions.php?sc=Decisiveness_Authority )
(Questions.php?sc=Delegation_Ability_Interview_Questions_and_Answers )
(Questions.php?sc=Determination_Interview_Questions_and_Answers )
(Questions.php?sc=Ethics_Interview_Questions_and_Answers )
(Questions.php?sc=Exit_Interview_Questions_and_Answers_ )
(Questions.php?sc=Firewall )
(Questions.php?sc=Flexibility_Interview_Questions_and_Answers )
(Questions.php?sc=Frequently_Asked_Interview_Questions_and_Answers_ )
(Questions.php?sc=Funny )
(Questions.php?sc=General_Knowledge )
(Questions.php?sc=Group_Interview_Questions_and_Answers )
(Questions.php?sc=Group_Discussions )
(Questions.php?sc=Hacking )
(Questions.php?sc=How_to_Answer )
(Questions.php?sc=Illegal_Interview_Questions_and_Answers )
(Questions.php?sc=Incident )
(Questions.php?sc=Initiative_Interview_Questions_and_Answers )
(Questions.php?sc=Interests )
(Questions.php?sc=Job_Career )
(Questions.php?sc=Job_Awareness_Interview_Questions_and_Answers )
(Questions.php?sc=Job_Knowledge_Interview_Questions_and_Answers )
(Questions.php?sc=Job_Performance_Interview_Questions_and_Answers_ )
(Questions.php?sc=Job_Tips_Interview_Questions_and_Answers_ )
(Questions.php?sc=Judgment_Interview_Questions_and_Answers )
(Questions.php?sc=Learning_Skills_Interview_Questions_and_Answers )
(Questions.php?sc=Listening_Skills_Interview_Questions_and_Answers )
(Questions.php?sc=Logical_Interview_Questions_and_Answers_ )
w

Interview Guides

Basic Common

Firewall
Best DDoS Detection
prolexic.com/ddos-detection
Interview Questions Guide (index.php)
Aerospace (Details.php?c=Aerospace )
Arts (Details.php?c=Arts )
Analytical (Questions.php?sc=Analytical )
Aptitude (Questions.php?sc=Aptitude )
Behavioral (Questions.php?sc=Behavioral )
Career Advice Requests
Career Change (Questions.php?sc=Career_Change )
Computer security
Corporate Communication
Current Affairs 2009
Current Affairs 2010
Current Affairs 2011
Decisiveness / Authority
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
8 :: What is DNS spoofing? (Answer.php?a=What_is_DNS_spoofing)
Assuming the DNS name of another system by either corrupting the name service cache of a victim
system, or by compromising a domain name server for a valid domain.
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
9 :: What is Bastion Host? (Answer.php?a=What_is_Bastion_Host)
A system that has been hardened to resist attack, and which is installed on a network in such a way
that it is expected to potentially come under attack. Bastion hosts are often components of firewalls,
or may be ``outside'' web servers or public access systems. Generally, a bastion host is running
some form of general purpose operating system (e.g., Unix, VMS, NT, etc.) rather than a ROM-
based or firmware operating system.
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
10 :: What is Log Retention? (Answer.php?a=What_is_Log_Retention)
How long audit logs are retained and maintained.
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
11 :: What is Virus? (Answer.php?a=What_is_Virus)
A replicating code segment that attaches itself to a program or data file. Viruses might or might not
not contain attack programs or trapdoors.
Viruses is hidden software
program.
IsThisAnswer Correct? 1 Yes 0 No Post Your Answer
12 :: What is Perimeter-based Security? (Answer.php?a=What_is_Perimeter-based_Security)
The technique of securing a network by controlling access to all entry and exit points of the network.
IsThisAnswer Correct? 1 Yes 0 No Post Your Answer
13 :: What is Intrusion Detection? (Answer.php?a=What_is_Intrusion_Detection)
Detection of break-ins or break-in attempts either manually or via software expert systems that
operate on logs or other information available on the network.
IsThisAnswer Correct? 1 Yes 0 No Post Your Answer
14 :: Explain If JumpStart clients are on a different subnet to the DHCP server, what must be
configured to enable
If JumpStart clients are on a different subnet to the DHCP server, what must be configured to
enable them to communicate with the DHCP server? (Answer.php?
a=Explain_If_JumpStart_clients_are_on_a_different_subnet_to_the_DHCP_server_what_must_be_configured_to)
I think we can configure helper address on the subnet vlan.
Than client can communicate with the DHCP server.
IsThisAnswer Correct? 1 Yes 0 No Post Your Answer
15 :: What is Trojan Horse? (Answer.php?a=What_is_Trojan_Horse)
A software entity that appears to do something normal but which, in fact, contains a trapdoor or
attack program.
the software which protects the computer from getting virus which totally affects the total working of
the computer
IsThisAnswer Correct? 1 Yes 0 No Post Your Answer
16 :: Explain the difference between router ACLs and Firewall ACLs? (Answer.php?
a=Explain_the_difference_between_router_ACLs_and_Firewall_ACLs)
Fundamental purpose: 1)Routers are designed to route traffic, not stop it.2)Firewalls are designed to
examine and accept/reject traffic. But the both ACL are do the same job. Depending upon our
requirments we do our ACL configuration on it. ...
IsThisAnswer Correct? 1 Yes 0 No Post Your Answer
17 :: What is Data Driven Attack? (Answer.php?a=What_is_Data_Driven_Attack)
A form of attack in which the attack is encoded in innocuous-seeming data which is executed by a
user or other software to implement an attack. In the case of firewalls, a data driven attack is a
concern since it may get through the firewall in data form and launch an attack against a system
behind the firewall.
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
18 :: What is Dual Homed Gateway? (Answer.php?a=What_is_Dual_Homed_Gateway)
A dual homed gateway is a system that has two or more network interfaces, each of which is
connected to a different network. In firewall configurations, a dual homed gateway usually acts to
block or filter some or all of the traffic trying to pass between the networks.
IsThisAnswer Correct? 2 Yes 0 No Post Your Answer
19 :: What is Virtual Network Perimeter? (Answer.php?
Find us on Facebook
Interview Questions Answers
14,078 people like Interview Questions Answers.
Facebook social plugin
Like
Shar e T hi s Pag e:
f
(http://www.facebook.com/share.php?
u=http://globalguideline.com/interview_questions/Questions.php?
sc=Firewall&t=)
_
(https://plus.google.com/109575479305880892023/posts)
V
(http://www.twitter.com/home?
status=+http://globalguideline.com/interview_questions/Questions.php?
sc=Firewall)
m
(http://www.linkedin.com/shareArticle?
mini=true&url=http://globalguideline.com/interview_questions/Questions.php?
sc=Firewall&title=&summary=&source=Global%20Guideline)

(http://www.pinterest.com/globalguideline/interview-
questions-
answers/followers/)
m
(http://feeds.feedburner.com/GlobalGuideline)
19 :: What is Virtual Network Perimeter? (Answer.php?
a=What_is_Virtual_Network_Perimeter)
A network that appears to be a single protected network behind firewalls, which actually
encompasses encrypted virtual links over untrusted networks.
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
20 :: What is Screened Subnet? (Answer.php?a=What_is_Screened_Subnet)
A subnet behind a screening router. The degree to which the subnet may be accessed depends on
the screening rules in the router.
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
21 :: In what way firewall provides security and how far it works to different intruders and
attackers? and what are all the disadvantages in the firewalls security access? (Answer.php?
a=In_what_way_firewall_provides_security_and_how_far_it_works_to_different_intruders_and_attackers_and)
A firewall block everything.it depends on you when configuring your network wat traffic to let in and
wat traffic to block.its acts as a gaurd to u r network.its like a screening of a person on a airport...its
does a deep pack inspection.
IsThisAnswer Correct? 1 Yes 0 No Post Your Answer
22 :: Explain Can traceout command work across the firewall? If No then why? If Yes then why?
(Answer.php?
a=Explain_Can_traceout_command_work_across_the_firewall_If_No_then_why_If_Yes_then_why)
Traceroute is based on ICMP type 30 under Windows and UDP under *NIX; traceroute pacjets that
would hit the firewall should be dropped similarly any echo replay coming from inside the firewall
should be restricted outbound. The answer: traceroute can ...
IsThisAnswer Correct? 0 Yes 1 No Post Your Answer
23 :: What is Screened Host? (Answer.php?a=What_is_Screened_Host)
A host on a network behind a screening router. The degree to which a screened host may be
accessed depends on the screening rules in the router.
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
24 :: Explain employee assistance program (EAP) application is now required to be deployed?
(Answer.php?
a=Explain_employee_assistance_program_EAP_application_is_now_required_to_be_deployed)
Your companys employee assistance program (EAP) application is now required to be deployed on
the Web. The following are characteristics and requirements of the new system: The UI is an off-the-
shelf, unsigned terminal-emulator applet. The applet communicates with a terminal server using a
proprietary TCP/IP-based protocol. The terminal server sits behind the corporate firewall and listens
on port 10001. The only configurable items for the applet
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
25 :: What is IP Splicing/Hijacking? (Answer.php?a=What_is_IP_SplicingHijacking)
An attack whereby an active, established, session is intercepted and co-opted by the attacker. IP
Splicing attacks may occur after an authentication has been made, permitting the attacker to
assume the role of an already authorized user. Primary protections against IP Splicing rely on
encryption at the session or network layer.
IsThisAnswer Correct? 1 Yes 0 No Post Your Answer
26 :: What is Tunneling Router? (Answer.php?a=What_is_Tunneling_Router)
A router or system capable of routing traffic by encrypting it and encapsulating it for transmission
across an untrusted network, for eventual de-encapsulation and decryption.
IsThisAnswer Correct? 1 Yes 0 No Post Your Answer
27 :: What is Authentication Token? (Answer.php?a=What_is_Authentication_Token)
A portable device used for authenticating a user. Authentication tokens operate by
challenge/response, time-based code sequences, or other techniques. This may include paper-
based lists of one-time passwords.
IsThisAnswer Correct? 1 Yes 0 No Post Your Answer
28 :: Explain the difference between gateway and firewall? (Answer.php?
a=Explain_the_difference_between_gateway_and_firewall)
A network gateway joins two networks together through a combination of hardware and software.A
network firewall guards a computer network against unauthorized incoming or outgoing access.
Network firewalls may be hardware devices or software programs. ...
A network gateway joins two networks together through a combination of hardware and software.A
network firewall guards a computer network against unauthorized incoming or outgoing access.
Network firewalls may be hardware devices or software programs. ...
IsThisAnswer Correct? 1 Yes 0 No Post Your Answer
29 :: Explain Abuse of Privilege? (Answer.php?a=Explain_Abuse_of_Privilege)
When a user performs an action that they should not have, according to organizational policy or law.
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
30 :: What is Worm? (Answer.php?a=What_is_Worm)
A standalone program that, when run, copies itself from one host to another, and then runs itself on
each newly infected host. The widely reported 'Internet Virus' of 1988 was not a virus at all, but
actually a worm.
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
31 :: What is Challenge/Response? (Answer.php?a=What_is_ChallengeResponse)
An authentication technique whereby a server sends an unpredictable challenge to the user, who
computes a response using some form of authentication token.
IsThisAnswer Correct? 1 Yes 0 No Post Your Answer
32 :: What is Access Control Lists? (Answer.php?a=What_is_Access_Control_Lists)
Rules for packet filters (typically routers) that define which packets to pass and which to block.
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
33 :: What is Access Router? (Answer.php?a=What_is_Access_Router)
A router that connects your network to the external Internet. Typically, this is your first line of defense
against attackers from the outside Internet. By enabling access control lists on this router, you'll be
able to provide a level of protection for all of the hosts `behind' that router, effectively making that
network a DMZ instead of an unprotected external LAN.
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
34 :: What is Network-Layer Firewall? (Answer.php?a=What_is_Network-Layer_Firewall)
A firewall in which traffic is examined at the network protocol packet layer.
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
35 :: What is Insider Attack? (Answer.php?a=What_is_Insider_Attack)
An attack originating from inside a protected network.
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
36 :: What is Host-based Security? (Answer.php?a=What_is_Host-based_Security)
The technique of securing an individual system from attack. Host based security is operating system
and version dependent.
IsThisAnswer Correct? 1 Yes 0 No Post Your Answer
37 :: Explain How the the two servers can communicate when the firewall is there in between?
(Answer.php?
a=Explain_How_the_the_two_servers_can_communicate_when_the_firewall_is_there_in_between)
Depend on firewall configuration, all most authorize port nb 80, so we can communicate over Http
protocol. ...
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
38 :: What is Logging? (Answer.php?a=What_is_Logging)
The process of storing information about events that occurred on the firewall or network.
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
39 :: What is Proxy? (Answer.php?a=What_is_Proxy)
A software agent that acts on behalf of a user. Typical proxies accept a connection from a user,
make a decision as to whether or not the user or client IP address is permitted to use the proxy,
perhaps does additional authentication, and then completes a connection on behalf of the user to a
remote destination.
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
40 :: What is Screening Router? (Answer.php?a=What_is_Screening_Router)
A router configured to permit or deny traffic based on a set of permission rules installed by the
administrator.
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
41 :: Explain What is Authorization? (Answer.php?a=Explain_What_is_Authorization)
The process of determining what types of activities are permitted. Usually, authorization is in the
context of authentication: once you have authenticated a user, they may be authorized different types
of access or activity.
IsThisAnswer Correct? 1 Yes 0 No Post Your Answer
42 :: Explain What is Application-Layer Firewall? (Answer.php?a=Explain_What_is_Application-
Layer_Firewall)
A firewall system in which service is provided by processes that maintain complete TCP connection
state and sequencing. Application layer firewalls often re-address traffic so that outgoing traffic
appears to have originated from the firewall, rather than the internal host.
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
43 :: Explain What is firewall? How to enable firewall in Windows XP? (Answer.php?
a=Explain_What_is_firewall_How_to_enable_firewall_in_Windows_XP)
Most Popul ar I ntervi ew Gui des
Networking (Details.php?c=Basic_Networking)
Accounting Finance Marketing Business
(Details.php?
c=Accounting_Finance_Marketing_Interview_Questions_a)
Computer Programming (Details.php?
c=Basic_Programming_Interview_Questions_and_Answers)
Operating System (Details.php?
c=Operating_System_Interview_Questions_and_Answers)
Computer Hardware (Details.php?
c=Computer_Hardware_Interview_Questions_and_answers)
Web Tutori al s
JavaScript Tutorial
(../JavaScript_Guide/index.php)
XML Tutorial
(../xml/index.php)
SQL Tutorial
(../sql/index.php)
HTML Tutorial
(../html/index.php)
CSS Tutorial
(../CSSGuide/index.php)
XSLT Tutorial
(../xslt/index.php)
SEO Tutorial
(../articles/research.php?
c=Search_Engine_Optimization_Updates)
Database Articles
(../articles/research.php?
c=Research_Articles_and_Updates_about_Database)
Web Hosting Guide
(../articles/research.php?
c=Web_Hosting_GuideLine)
Keep i n touch wi th us
f
(http://www.facebook.com/share.php?
u=http://globalguideline.com/interview_questions/Questions.php?
sc=Firewall&t=)
_
(https://plus.google.com/109575479305880892023/posts)
V
(http://www.twitter.com/home?
status=+http://globalguideline.com/interview_questions/Questions.php?
sc=Firewall)
m
(http://www.linkedin.com/shareArticle?
mini=true&url=http://globalguideline.com/interview_questions/Questions.php?
sc=Firewall&title=&summary=&source=Global%20Guideline)

(http://www.pinterest.com/globalguideline/interview-
questions-
answers/followers/)
m
(http://feeds.feedburner.com/GlobalGuideline)
Subscribeand Get Updates
QAdd New Question ()
To enable firewall in Window...Start - Control panel - Security center -Turn On the Firewall Button
and enable it. ...
IsThisAnswer Correct? 0 Yes 0 No Post Your Answer
44 :: Explain In windows 2003 built in fire wall is there or not? (Answer.php?
a=Explain_In_windows_2003_built_in_fire_wall_is_there_or_not)
In windows 2003 server, built in firewall is present
IsThisAnswer Correct? 1 Yes 0 No Post Your Answer
45 :: Explain What is Firewall? (Answer.php?a=Explain_What_is_Firewall)
A firewall is a part of a computer system or network that is designed to block unauthorized access
while permitting authorized communications. It is a device or set of devices which is configured to
permit or deny computer applications based upon a set of rules and other criteria.
Firewalls can be implemented in either hardware or software, or a combination of both.
IsThisAnswer Correct? 2 Yes 0 No Post Your Answer
Subscribe
Copyright 2007 - 2013 www.globalguideline.com All Rights Reserved. 1217 Vi si tors Are Onl i ne Now
About Us (../about-us.php) | Contact Us (../contactUs.php) | Terms of use (../terms-of-use.php) | Privacy Policy (../privacy_guideline.php) | Google+ (https://plus.google.com/109575479305880892023)

Vous aimerez peut-être aussi