1. Explain What is Firewall?

A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices which is configured to permit or deny computer applications based upon a set of rules and other criteria.
Firewalls can be implemented in either hardware or software, or a combination of both.

2. Explain In windows 2003 built in fire wall is there or not?

In windows 2003 server, built in firewall is present

3. Explain What is firewall? How to enable firewall in Windows XP?

To enable firewall in Window...Start - Control panel - Security center -Turn On the Firewall Button and enable it. ...

4. Explain What is Application-Layer Firewall?

A firewall system in which service is provided by processes that maintain complete TCP connection state and sequencing. Application layer firewalls often re-address traffic so that outgoing traffic appears to have originated from the firewall, rather than the internal host.

5. Explain What is Authorization?

The process of determining what types of activities are permitted. Usually, authorization is in the context of authentication: once you have authenticated a user, they may be authorized different types of access or activity.

6. What is Screening Router?

A router configured to permit or deny traffic based on a set of permission rules installed by the administrator.

7. What is Proxy?

A software agent that acts on behalf of a user. Typical proxies accept a connection from a user, make a decision as to whether or not the user or client IP address is permitted to use the proxy, perhaps does additional authentication, and then completes a connection on behalf of the user to a remote destination.

8. What is Logging?

The process of storing information about events that occurred on the firewall or network.

9. Explain How the the two servers can communicate when the firewall is there in between?

Depend on firewall configuration, all most authorize port nb 80, so we can communicate over Http protocol. ...

10. What is Host-based Security?

The technique of securing an individual system from attack. Host based security is operating system and version dependent.

Download Interview PDF

11. What is Insider Attack?

An attack originating from inside a protected network.

12. What is Network-Layer Firewall?

A firewall in which traffic is examined at the network protocol packet layer.

13. What is Access Router?

A router that connects your network to the external Internet. Typically, this is your first line of defense against attackers from the outside Internet. By enabling access control lists on this router, you'll be able to provide a level of protection for all of the hosts `behind' that router, effectively making that network a DMZ instead of an unprotected external LAN.

14. What is Access Control Lists?

Rules for packet filters (typically routers) that define which packets to pass and which to block.

15. What is Challenge/Response?

An authentication technique whereby a server sends an unpredictable challenge to the user, who computes a response using some form of authentication token.

16. What is Worm?

A standalone program that, when run, copies itself from one host to another, and then runs itself on each newly infected host. The widely reported 'Internet Virus' of 1988 was not a virus at all, but actually a worm.

17. Explain Abuse of Privilege?

When a user performs an action that they should not have, according to organizational policy or law.

18. Explain the difference between gateway and firewall?

A network gateway joins two networks together through a combination of hardware and software.A network firewall guards a computer network against unauthorized incoming or outgoing access. Network firewalls may be hardware devices or software programs. ...

A network gateway joins two networks together through a combination of hardware and software.A network firewall guards a computer network against unauthorized incoming or outgoing access. Network firewalls may be hardware devices or software programs. ...

19. What is Authentication Token?

A portable device used for authenticating a user. Authentication tokens operate by challenge/response, time-based code sequences, or other techniques. This may include paper-based lists of one-time passwords.

20. What is Tunneling Router?

A router or system capable of routing traffic by encrypting it and encapsulating it for transmission across an untrusted network, for eventual de-encapsulation and decryption.

21. What is IP Splicing/Hijacking?

An attack whereby an active, established, session is intercepted and co-opted by the attacker. IP Splicing attacks may occur after an authentication has been made, permitting the attacker to assume the role of an already authorized user. Primary protections against IP Splicing rely on encryption at the session or network layer.

22. Explain employee assistance program (EAP) application is now required to be deployed?

Your companys employee assistance program (EAP) application is now required to be deployed on the Web. The following are characteristics and requirements of the new system: The UI is an off-the-shelf, unsigned terminal-emulator applet. The applet communicates with a terminal server using a proprietary TCP/IP-based protocol. The terminal server sits behind the corporate firewall and listens on port 10001. The only configurable items for the applet

23. What is Screened Host?

A host on a network behind a screening router. The degree to which a screened host may be accessed depends on the screening rules in the router.

24. Explain Can traceout command work across the firewall? If No then why? If Yes then why?

Traceroute is based on ICMP type 30 under Windows and UDP under *NIX; traceroute pacjets that would hit the firewall should be dropped similarly any echo replay coming from inside the firewall should be restricted outbound. The answer: traceroute can ...

25. In what way firewall provides security and how far it works to different intruders and attackers? and what are all the disadvantages in the firewalls security access?

A firewall block everything.it depends on you when configuring your network wat traffic to let in and wat traffic to block.its acts as a gaurd to u r network.its like a screening of a person on a airport...its does a deep pack inspection.

Download Interview PDF

26. What is Screened Subnet?

A subnet behind a screening router. The degree to which the subnet may be accessed depends on the screening rules in the router.

27. What is Virtual Network Perimeter?

A network that appears to be a single protected network behind firewalls, which actually encompasses encrypted virtual links over untrusted networks.

28. What is Dual Homed Gateway?

A dual homed gateway is a system that has two or more network interfaces, each of which is connected to a different network. In firewall configurations, a dual homed gateway usually acts to block or filter some or all of the traffic trying to pass between the networks.

29. What is Data Driven Attack?

A form of attack in which the attack is encoded in innocuous-seeming data which is executed by a user or other software to implement an attack. In the case of firewalls, a data driven attack is a concern since it may get through the firewall in data form and launch an attack against a system behind the firewall.

30. Explain the difference between router ACLs and Firewall ACLs?

Fundamental purpose: 1)Routers are designed to route traffic, not stop it.2)Firewalls are designed to examine and accept/reject traffic. But the both ACL are do the same job. Depending upon our requirments we do our ACL configuration on it. ...

31. What is Trojan Horse?

A software entity that appears to do something normal but which, in fact, contains a trapdoor or attack program.

the software which protects the computer from getting virus which totally affects the total working of the computer

32. Explain If JumpStart clients are on a different subnet to the DHCP server, what must be configured to enable
If JumpStart clients are on a different subnet to the DHCP server, what must be configured to enable them to communicate with the DHCP server?

I think we can configure helper address on the subnet vlan.
Than client can communicate with the DHCP server.

33. What is Intrusion Detection?

Detection of break-ins or break-in attempts either manually or via software expert systems that operate on logs or other information available on the network.

34. What is Perimeter-based Security?

The technique of securing a network by controlling access to all entry and exit points of the network.

35. What is Virus?

A replicating code segment that attaches itself to a program or data file. Viruses might or might not not contain attack programs or trapdoors.

Viruses is hidden software
program.

36. What is Log Retention?

How long audit logs are retained and maintained.

37. What is Bastion Host?

A system that has been hardened to resist attack, and which is installed on a network in such a way that it is expected to potentially come under attack. Bastion hosts are often components of firewalls, or may be ``outside'' web servers or public access systems. Generally, a bastion host is running some form of general purpose operating system (e.g., Unix, VMS, NT, etc.) rather than a ROM-based or firmware operating system.

38. What is DNS spoofing?

Assuming the DNS name of another system by either corrupting the name service cache of a victim system, or by compromising a domain name server for a valid domain.

39. Explain You are currently designing your own Desktop Publishing application, as you have not found any that?

You are currently designing your own Desktop Publishing application, as you have not found any that do exactly what you want with existing applications. As part of the design you are using a Controller to which you send all GUI requests. Not all objects can process the same commands. For example you can?t select the spell check tool when an image has the focus. To stop any possible errors you would like to filter out some of the messages as they are passed from these objects to

40. What is Cryptographic Checksum?

A one-way function applied to a file to produce a unique ``fingerprint'' of the file for later reference. Checksum systems are a primary means of detecting filesystem tampering on Unix.

Download Interview PDF

41. What is Least Privilege?

Designing operational aspects of a system to operate with a minimum amount of system privilege. This reduces the authorization level at which various actions are performed and decreases the chance that a process or user with high privileges may be caused to perform unauthorized activity resulting in a security breach.

42. What is uthentication?

The process of determining the identity of a user that is attempting to access a system.

authentication is a process that can verify pc identity(user name and pass etc).

43. What is Defense in Depth?

The security approach whereby each system on the network is secured to the greatest possible degree. May be used in conjunction with firewalls.

44. What is IP Spoofing?

An attack whereby a system attempts to illicitly impersonate another system by using its IP network address.

In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system

45. What is Log Processing?

How audit logs are processed, searched for key events, or summarized.