SIC ANswers With Question
SIC ANswers With Question
Security in Computing
1. What is SIC?
Threat can refer to anything which can hamper the normal activity of
a PC either via a malware or any hacking attack.
Packet-filtering firewalls
Circuit-level gateways
Stateful inspection firewalls
Application-level gateways (a.k.a. proxy firewalls)
Next-gen firewalls
Software firewalls
Hardware firewalls
8. Define cryptography.
Cryptography is technique of securing information and
communications through use of codes so that only those person for
whom the information is intended can understand it and process it.
o Scalable Performance.
The SSH protocol is a method for secure remote login from one
computer to another.
An access control list (ACL) contains rules that grant or deny access
to certain digital environments. There are two types of ACLs:
o Worms. ...
o Trojan Horses. ...
o Spyware/Adware. ...
o Rootkit. ...
o Related Resources:
Hub
Switch
Router
Bridge
Gateway
Modem
Repeater
Access Point
Key Features:
Unlimited devices.
E-learning.
Customize single/multi user activities.
Practical Viva Questions
Security in Computing
Interactive Environment.
Visualizing Networks.
Real-time mode and Simulation mode.
Self-paced.
Supports majority of networking protocols.
Routers, modems
40. What is the use of DNS server, NTP server and SYSLOG
server.
The main function of DNS is to translate domain names into IP
Addresses, which computers can understand.
Network Time Protocol (NTP) is a protocol used to synchronize
computer clock times in a network. It belongs to and is one of the
oldest parts of the TCP/IP protocol suite.
Syslog stands for System Logging Protocol and is a standard
protocol used to send system log or event messages to a
specific server, called a syslog server.
41.What is VPN?
Media Gateway
Media Server
Application Server
Practical Viva Questions
Security in Computing
46.What is PBX?
47.What is SIEM?
Practical Viva Questions
Security in Computing
51.What is phishing?
54. What is the purpose of the data link layer in the TCP/IP or
OSI layer?
56. What are the two flags used in the core handshake of a
typical TCP connection establishment?
-- ROM
o Simplex mode.
o Half-duplex mode.
o Full-duplex mode.