Get premium membership and access questions with answers, video lessons as well as revision papers.
- Firewall is a piece of hardware or software which functions in a networked environment to prevent some communications forbidden by the security policy.
- The purpose of a firewall is to keep bad thing outside a protected firewall implement a security policy. It might permit limited access from in or outside the network perimeters or from certain users or for certain activity.
Kavungya answered the question on May 10, 2019 at 13:49
- Define Anti spyware.(Solved)
Define Anti spyware.
Date posted: May 10, 2019. Answers (1)
- Describe Antivirus.(Solved)
Describe Antivirus.
Date posted: May 10, 2019. Answers (1)
- Define Cryptography.(Solved)
Define Cryptography.
Date posted: May 10, 2019. Answers (1)
- Describe the natural and environmental threats.(Solved)
Describe the natural and environmental threats.
Date posted: May 10, 2019. Answers (1)
- Describe the application controls.(Solved)
Describe the application controls.
Date posted: May 10, 2019. Answers (1)
- Describe the administration controls.(Solved)
Describe the administration controls.
Date posted: May 10, 2019. Answers (1)
- Describe the communication controls.(Solved)
Describe the communication controls.
Date posted: May 10, 2019. Answers (1)
- Describe the data security controls.(Solved)
Describe the data security controls.
Date posted: May 10, 2019. Answers (1)
- Describe the Access control.(Solved)
Describe the Access control.
Date posted: May 10, 2019. Answers (1)
- Describe the general computer controls.(Solved)
Describe the general computer controls.
Date posted: May 10, 2019. Answers (1)
- Explain the defense strategies implemented for computer crimes.(Solved)
Explain the defense strategies implemented for computer crimes.
Date posted: May 10, 2019. Answers (1)
- Describe intentional threats.(Solved)
Describe intentional threats.
Date posted: May 10, 2019. Answers (1)
- Describe Unintentional threats.(Solved)
Describe Unintentional threats.
Date posted: May 10, 2019. Answers (1)
- Describe computer systems Vulnerability.(Solved)
Describe computer systems Vulnerability.
Date posted: May 10, 2019. Answers (1)
- Describe the database availability.(Solved)
Describe the database availability.
Date posted: May 10, 2019. Answers (1)
- Describe the database management systems security features.(Solved)
Describe the database management systems security features.
Date posted: May 10, 2019. Answers (1)
- Outline the database security issues.(Solved)
Outline the database security issues.
Date posted: May 10, 2019. Answers (1)
- Describe database security.(Solved)
Describe database security.
Date posted: May 10, 2019. Answers (1)
- State and explain the contents of a database.(Solved)
State and explain the contents of a database.
Date posted: May 10, 2019. Answers (1)
- Explain the disadvantages of database approach.(Solved)
Explain the disadvantages of database approach.
Date posted: May 10, 2019. Answers (1)