-
Token Ring Segment
You need to connect a token ring segment to ethernet segment. Would you use a Router a BRouter or a Bridge? Explain your answer.
-
RSA
How do you use RSA for both authentication and secrecy?
-
Non financial are less prone to attack
Yes or No?
-
Buffer over flow is a software weakness categorized under?
1.operational issues
2.design flaw
3.requirement oversight
4.implementation bug -
NTFS Security
How to secure data through NTFS Technique?
-
-
-
-
-
Basis for OSPF protocol?
Distance Vector Routing
-
Domain Controller
What is domain controller $how it manage a network security
-
-
-
-
-
-
-
RIPv1 vs. RIPv2
what is the difference between RIPv1 vs. RIPv ?State advantages and disadvantages in detailed. which is better to use?
-
Secure Transmission Medium
Which is the most secure transmission medium?
Which is the most insecure transmission medium? Justify -
Networks and Security Interview Questions
Ans