Networking Interview Questions
Questions Answers Views Company eMail

Where do you get updates on security?

560

If you need to encrypt and compress data for transmission, how would you achieve it?

637

What factors would you consider before deploying a web intrusion detection system?

553

What is Cross site scripting?

622

How does the HTTP handle state?

589

In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

549

What type of network do you use at home?

599

What is Cross Site Request Forgery and how to defend against it?

590

Name the port used by PING.

606

Explain abouT Security Life Cycle.

600

Define the meaning of an Authentication.

598

What is the sense of a fingerprint?

588

What a security mean in your sense?

617

What is a Password?

599

What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?

540


Un-Answered Questions { Networking }

Explain Protocols?

797


Define ip address?

619


What are two models of interprocess communication?

691


What are the different types of vpns?

564


Give one disadvantage of a peer to peer network?

604






Give the importance of the osi physical layer?

549


Explain what does cia stand for in security management?

549


How does tcp try to avoid network meltdown?

666


Explain about the job of the network layer under the osi reference model?

558


What characterizes a professional network administrator?

512


What are the layers in osi reference models?

186


Explain the basic difference between tcp/ip and osi model.

605


How do I stop pid 4 from using port 80?

589


Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

502


Explain different kinds of Switching techniques.

1150