Networking Security Interview Questions
Questions Answers Views Company eMail

What factors would you consider before deploying a web intrusion detection system?

555

What is Cross site scripting?

626

How does the HTTP handle state?

594

In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

551

What type of network do you use at home?

601

What is Cross Site Request Forgery and how to defend against it?

595

Name the port used by PING.

606

Explain abouT Security Life Cycle.

603

Define the meaning of an Authentication.

601

What is the sense of a fingerprint?

590

What a security mean in your sense?

619

What is a Password?

604

What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?

543

who is a hacker?

609

What are the types of LAN cables used? What is a cross cable?

575


Post New Networking Security Questions

Un-Answered Questions { Networking Security }

Why do we use virtual private network?

558


What are the types fo ddos attacks?

579


What is terminal emulation, in which layer it comes

555


How does arp works?

553


What does cia stand for in security management?

551






Explain the difference between discretionary access control and mandatory access control?

547


What are the main components of the CERT Taxonomy?

3526


What do you do when you get blue screen in a computer? How do you troubleshoot it?

624


What is classful and classless routing?

562


Diff bet ripv1 & ripv2?

551


How does ransomware work?

621


What is the sense of a fingerprint?

590


Explain what does cia stand for in security management?

555


What are the benefits of the firewall?

548


Explain what are digital signatures and smart cards?

587