Follow Our FB Page << CircleMedia.in >> for Daily Laughter. We Post Funny, Viral, Comedy Videos, Memes, Vines...

Networking Security Interview Questions
Questions Answers Views Company eMail

What are the stipulations of C2 level security?

1 8646

What is Secure Sockets Layer (SSL)?

3 6778

What is the principle of least privilege?

1 3838

What is the purpose of a firewall?

4 9808

What are the 5 aspects of IT-Security?

Infosys,

6 6637

What is the difference between Security and Safety?

4 16240

What is risk in IT-Security?

CTC,

1 3919

What are the main components of the CERT Taxonomy?

3138

What are the vulnerabilities according to the extended CERT Taxonomy?

1 2943

What are the possible means of Internet attacks?

2 3988

What is phishing?

Global Logic,

4 7515

What are the methods of defense (in context to IT-Security)?

Taylor Engineering,

2 3614

What is a security policy?

Airtel, Techworld,

1 4585

What is a security mechanism?

2 3753

What is a security policy?

1 4130


Post New Networking Security Questions






Un-Answered Questions { Networking Security }

Name the port used by PING.

216


If you need to encrypt and compress data for transmission, how would you achieve it?

208


How the telecommunicaton is working?I have heared that one control will be there for asia countries for other countries there will be another,what is that how they work?

1543


What is a ddos attack?

190


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

199






What are the different aspects of shadow it?

197


How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

171


What are the types of phishing attacks?

187


What is difference between discretionary access control and mandatory access control?

196


Which are the different factors that affect the security of a network?

168


What is cloud security?

195


What is threat-focused ngfw?

185


What is IPCONFIG command? Why it is used?

213


What are worms?

181


What is terminal emulation, in which layer it comes

211