Networking Security Interview Questions
Questions Answers Views Company eMail

What is IPCONFIG command? Why it is used?

833

What is BSOD?

797

What do you do when you get blue screen in a computer? How do you troubleshoot it?

810

What is RIS?

795

What is Imaging/ghosting?

797

What is the difference between a switch and a hub?

775

What are manageable and non manageable switches?

759

What is a DNS resource record

823

What protocol is used by DNS name servers

790

What is a ddos attack?

706

What are the different aspects of shadow it?

735

What is malware?

753

How does phishing work?

744

Why is it important to have a nac solution?

926

What is ransomware?

744


Post New Networking Security Questions

Un-Answered Questions { Networking Security }

How does phishing work?

744


How does the HTTP handle state?

772


What is proxy firewall?

766


What are the types of Transmission media

822


What is RIS?

795


Which are the different factors that affect the security of a network?

731


If you need to encrypt and compress data for transmission, how would you achieve it?

859


How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

693


What is terminal emulation, in which layer it comes

741


explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)

692


What is a DNS resource record

823


What are the types fo ddos attacks?

791


What is threat-focused ngfw?

690


What are the different aspects of shadow it?

735


What is network access control?

820