Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Networking Security Interview Questions
Questions Answers Views Company eMail

What are the two types of security policies?

3 10951

What is the idea behind the Bell-La Padula model?

2289

What protects and describes the Chinese Wall model?

1 5874

What protects the Clark Wilson model?

Airtel,

1 5355

Name components of a firewall system?

HCL, SafariCom,

2 13869

Describe the term intrusion detection in the context of IT- security?

4 8240

Name firewall architectures?

4 9191

What defensive mechanisms for viruses can be encountered?

1 4165

What are the properties of universal trojan horses?

1 4938

what is sites, why we use it.

Symantec,

3 9507

Why we called Active directory is active?

ATS, Spectrum, Symantec, TCS,

11 23492

Why LDAP is called light weight?

PC Solutions, Symantec, Veritas,

10 35825

What if the machine doesnt show entry in Network neighbourhood and its showing it in Active directory users and computers?

HCL, Symantec,

3 8914

What database Active directory contains?

HP, IBM, Infosys, Infotech, Symantec,

5 23777

how secure is SAP applications?

Htmt,

1 4136


Post New Networking Security Questions

Un-Answered Questions { Networking Security }

What is cybersecurity?

1022


How does network security work?

974


Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

929


What does cia stand for in security management?

1069


Explain difference between broadcast domain and collision domain?

1078


What is network access control?

1081


If you need to encrypt and compress data for transmission, how would you achieve it?

1103


What is difference between discretionary access control and mandatory access control?

980


What is the difference between arp & rarp?

977


What is proxy firewall?

1014


How does the HTTP handle state?

1050


What is Cross Site Request Forgery and how to defend against it?

1021


Explain what is the role of single sign on in authentication technologies?

1054


Define the meaning of an Authentication.

1050


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

966