Follow Our FB Page << >> for Daily Laughter. We Post Funny, Viral, Comedy Videos, Memes, Vines...

Networking Security Interview Questions
Questions Answers Views Company eMail

What are the stipulations of C2 level security?

1 8646

What is Secure Sockets Layer (SSL)?

3 6778

What is the principle of least privilege?

1 3838

What is the purpose of a firewall?

4 9808

What are the 5 aspects of IT-Security?


6 6637

What is the difference between Security and Safety?

4 16240

What is risk in IT-Security?


1 3919

What are the main components of the CERT Taxonomy?


What are the vulnerabilities according to the extended CERT Taxonomy?

1 2943

What are the possible means of Internet attacks?

2 3988

What is phishing?

Global Logic,

4 7515

What are the methods of defense (in context to IT-Security)?

Taylor Engineering,

2 3614

What is a security policy?

Airtel, Techworld,

1 4585

What is a security mechanism?

2 3753

What is a security policy?

1 4130

Post New Networking Security Questions

Un-Answered Questions { Networking Security }

Name the port used by PING.


If you need to encrypt and compress data for transmission, how would you achieve it?


How the telecommunicaton is working?I have heared that one control will be there for asia countries for other countries there will be another,what is that how they work?


What is a ddos attack?


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?


What are the different aspects of shadow it?


How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?


What are the types of phishing attacks?


What is difference between discretionary access control and mandatory access control?


Which are the different factors that affect the security of a network?


What is cloud security?


What is threat-focused ngfw?


What is IPCONFIG command? Why it is used?


What are worms?


What is terminal emulation, in which layer it comes