Test Mode
Reading Mode
Right = 0
Wrong = 0
It filters network traffic
It can be either a hardware or software device
It follows a set of rules
All of these
None of these
Fire attacks
authorized access
Virus attacks
Data - driven attack
Securing the computers
Data transmission
Authentication
Monitoring
ফায়ারওয়াল
এনক্রিপশন
পাসওয়ার্ড
এ্যান্টভাইরাস