Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More Networking Security Interview Questions

What protects the Clark Wilson model?

1 Answers   Airtel,


Describe a TCP connection sequence

0 Answers   HCL,


What is Firewall? I saw in one website Firewall is software and hardware and combination of software and hardware.It is used to protect user information or avoiding crackers.how it is?Whether it is hardware?If not then why the images are like that?(a wall ).Please help me by answering this question.Advance thanks.

4 Answers   Excel,


which institute is best for net working in hyderabad

1 Answers  


What does cia stand for in security management?

0 Answers  






What is BSOD?

0 Answers  


What is threat-focused ngfw?

0 Answers  


Difference between bit rate and baud rate.

0 Answers   Elgi Equipments,


Why LDAP is called light weight?

10 Answers   PC Solutions, Symantec, Veritas,


What database Active directory contains?

5 Answers   HP, IBM, Infosys, Infotech, Symantec,


What is udp flood?

0 Answers  


What are major types of networks and explain

0 Answers   Elgi Equipments,


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)