Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are the two types of security policies?

Answers were Sorted based on User's Feedback



What are the two types of security policies?..

Answer / parveen

There are two types of Security Policies:

1. Local security Policy

2. Domain based policies that called Group Policy

Is This Answer Correct ?    20 Yes 1 No

What are the two types of security policies?..

Answer / alok sati

There are Two Types of security

1. LAN security (like Domain , Active Directory security)
2. Internet Security (Through Firewall, checkpoints)

Is This Answer Correct ?    11 Yes 3 No

What are the two types of security policies?..

Answer / pawan chalotra

software based security (like: Antivirus and windows firewall) and Hardware Based Security (like: Cisco firewall device and Cyberaom firewall device)

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Networking Security Interview Questions

What is the difference between Security and Safety?

4 Answers  


What defensive mechanisms for viruses can be encountered?

1 Answers  


Why LDAP is called light weight?

10 Answers   PC Solutions, Symantec, Veritas,


Cannot ping host machine(windows xp) from virtual machine(linux)in VMware, but can ping to Vmnet1 from virtual machine(linux) and can also ping from host machine(XP) to virtual mach.(linux), both side firewalls are disabled, networking type=host only.

1 Answers  


What are the different Kinds of Malware?

1 Answers   Infosys,


What are the main components of the CERT Taxonomy?

0 Answers  


What is the difference between routable and non- routable protocols

0 Answers   Elgi Equipments,


A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?

3 Answers   Wipro,


What is malware?

0 Answers  


What are manageable and non manageable switches?

0 Answers  


how secure is SAP applications?

1 Answers   Htmt,


Explain the difference between broadcast domain and collision domain?

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)