What are the data units at different layers of the TCP / IP protocol suite
What are the different Kinds of Malware?
Explain abouT Security Life Cycle.
What is Cross Site Request Forgery and how to defend against it?
What is site-to-site vpn?
What is subnet
How long can a ddos attack last?
What are the methods of defense (in context to IT-Security)?
What database Active directory contains?
5 Answers HP, IBM, Infosys, Infotech, Symantec,
what is the difference between firewall and antivirus?
2 Answers IL&FS Infrastructure Leasing Financial Services, Sitel,
What is data loss prevention (dlp)?
SAP GRC / Security & Authorizations TRAINING / Virsa and CC tools(GRC 5.3)
If you need to encrypt and compress data for transmission, how would you achieve it?