How does phishing work?
How does the HTTP handle state?
What is proxy firewall?
What are the types of Transmission media
What is RIS?
Which are the different factors that affect the security of a network?
If you need to encrypt and compress data for transmission, how would you achieve it?
How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
What is terminal emulation, in which layer it comes
explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)
What is a DNS resource record
What are the types fo ddos attacks?
What is threat-focused ngfw?
What are the different aspects of shadow it?
What is network access control?