Networking Security Interview Questions
Questions Answers Views Company eMail

What is IPCONFIG command? Why it is used?

573

What is BSOD?

594

What do you do when you get blue screen in a computer? How do you troubleshoot it?

614

What is RIS?

590

What is Imaging/ghosting?

607

What is the difference between a switch and a hub?

554

What are manageable and non manageable switches?

555

What is a DNS resource record

606

What protocol is used by DNS name servers

550

What is a ddos attack?

534

What are the different aspects of shadow it?

540

What is malware?

554

How does phishing work?

557

Why is it important to have a nac solution?

726

What is ransomware?

553


Post New Networking Security Questions

Un-Answered Questions { Networking Security }

What are the different types of vpns?

560


Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

500


What is udp flood?

574


What is an information security management system (isms)?

562


What is difference between baseband and broadband transmission

573






What is Imaging/ghosting?

607


What is site-to-site vpn?

535


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

543


How does network security work?

565


What is the sense of a fingerprint?

584


What is the role of single sign on in authentication technologies?

544


What is RIS?

590


What does cia stand for in security management?

545


If you need to encrypt and compress data for transmission, how would you achieve it?

632


Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?

503