0% found this document useful (0 votes)
5 views

Mouse (Plural Mice, Also Mouses) : Pointing Device Two-Dimensional Pointer Display Graphical User Interface Computer

Uploaded by

palmari.v0511
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Mouse (Plural Mice, Also Mouses) : Pointing Device Two-Dimensional Pointer Display Graphical User Interface Computer

Uploaded by

palmari.v0511
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

A computer

mouse (plural mice, also mouses)[nb 1] is a hand-held pointing device that detects two-
dimensional motion relative to a surface. This motion is typically translated into the
motion of the pointer (called a cursor) on a display, which allows a smooth control of
the graphical user interface of a computer.

The first public demonstration of a mouse controlling a computer system was done

by system.

In addition to moving a cursor, computer mice have one or more buttons to allow
operations such as the selection of a menu item on a display. Mice often also feature
other elements, such as touch surfaces and scroll wheels, which enable additional
control and dimensional input.

Sensitivity Label: General


Question 7.

Sensitivity Label: General


What Is Vpn (virtual Private Network)?

IP Sec (IP Security) is nothing but set of protocol. which is for make secure
communication between two host machine, or network over public network such as
Internet. IPSec is for Confidentiality , Integrity, Authenticity and Anti Replay protection.
There is two IPSec protocol which provide security

settings before continuing with other firewall configuration tasks. You must perform
these initial configuration tasks either from the MGT interface, even if you do not plan
to use this interface for your firewall management, or using a direct serial connection
to the console port on the firewall.ESP (Encapsulation Security Payload)
AH (Authentication Header).

Question 1. Explain Esp And Ah Ipsec Protocol?

Answer :

ESP:ESP Protocol is nothing but the part of IPsec suit , Its provide Confidentiality,
Integrity and Authenticity. It is used in 2 mode
1. Transport mode
2.Tunnel mode.

AH: AH is the most important part of IPsec suit, Its provide only Authentication and
Integrity, Its does not provide Encryption. It is also used to two mode Transport mode
and Tunnel mode.

Question 10. What Is Explicit Rule In Checkpoint Firewall?

Answer :

Explicit rules are the rules which are created manually by network security
administrator .

Question 11. What Is Hide Nat?

Answer :

Hide NAT is for translate multiple private IP or Network with single public IP address.
Means many to one translation. Its can be used in source NAT translation. we can not
use hide NAT while configuring Destination NAT.

Question 12. What Is Destination Nat?

Answer :
Destination NAT is nothing but when we need to translate Destination IP address with

Sensitivity Label: General


internal private network from public IP address. Only static NAT is their in Destination
NAT.

Question 13. Difference Between Automatic Nat And Manual Nat?

Answer :

Automatic NAT:

Automatic created by Firewall Network Security Administrator


Can not modify
Can not create “No NAT” rule
Can not create Dual NAT
Port forwarding not possible
Proxy ARP by default enabled
Manual NAT:

Sensitivity Label: General

You might also like