Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


1- what is PHP ?
2- what is TS getway and TS application ?
3- what is channel in telecom and y we use ?
4- what is difference between spyware and mallware ?
5- what is main difference between standard and extended
ACL ?
please repley in sequence


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More Networking Security Interview Questions

What is multicasting?

0 Answers  


What is data loss prevention (dlp)?

0 Answers  


Explain what are digital signatures and smart cards?

0 Answers  


How does network security work?

0 Answers  


What is BSOD?

0 Answers  


What are the different types of network security?

0 Answers  


What is difference between discretionary access control and mandatory access control?

0 Answers  


What are difference between Juniper and checkpoint firewall? and Can you explain me about the difference between checkpoint and Cisco pix firewall ?

7 Answers   Accenture, HCL, IBM, Wipro,


What is Firewall? I saw in one website Firewall is software and hardware and combination of software and hardware.It is used to protect user information or avoiding crackers.how it is?Whether it is hardware?If not then why the images are like that?(a wall ).Please help me by answering this question.Advance thanks.

4 Answers   Excel,


What is risk in IT-Security?

1 Answers   CTC,


What database Active directory contains?

5 Answers   HP, IBM, Infosys, Infotech, Symantec,


A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?

3 Answers   Wipro,


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)