What are the different type of networking / internetworking devices
What is terminal emulation, in which layer it comes
What is shadow it?
How do you Trace a person with IP Address? How do you detect a person using Fake IP (Proxy IP)?
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
How does dlp work?
Explain what are digital signatures and smart cards?
Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?
Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?
how secure is SAP applications?
Describe the term intrusion detection in the context of IT- security?
Define the meaning of an Authentication.
What are the types fo ddos attacks?