Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are the two types of security policies?

Answers were Sorted based on User's Feedback



What are the two types of security policies?..

Answer / parveen

There are two types of Security Policies:

1. Local security Policy

2. Domain based policies that called Group Policy

Is This Answer Correct ?    20 Yes 1 No

What are the two types of security policies?..

Answer / alok sati

There are Two Types of security

1. LAN security (like Domain , Active Directory security)
2. Internet Security (Through Firewall, checkpoints)

Is This Answer Correct ?    11 Yes 3 No

What are the two types of security policies?..

Answer / pawan chalotra

software based security (like: Antivirus and windows firewall) and Hardware Based Security (like: Cisco firewall device and Cyberaom firewall device)

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Networking Security Interview Questions

What are worms?

0 Answers  


Name components of a firewall system?

2 Answers   HCL, SafariCom,


How to you keep yourself updated on network security ?

0 Answers  


What are the different Kinds of Malware?

1 Answers   Infosys,


Where do you get updates on security?

0 Answers  


What is the sense of a fingerprint?

0 Answers  


Why we called Active directory is active?

11 Answers   ATS, Spectrum, Symantec, TCS,


What is the difference between a switch and a hub?

0 Answers  


What is remote access vpn?

0 Answers  


What is threat-focused ngfw?

0 Answers  


If you need to encrypt and compress data for transmission, how would you achieve it?

0 Answers  


Name the port used by PING.

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)