-
Wireless security
In SOHO wireless N router what is the maximum speed and range that can be achieve. Which security which provide he maximum speed and range. What should be the security authentication.
-
Token Ring Segment
You need to connect a token ring segment to ethernet segment. Would you use a Router a BRouter or a Bridge? Explain your answer.
-
RSA
How do you use RSA for both authentication and secrecy?
-
Non financial are less prone to attack
Yes or No?
-
Buffer over flow is a software weakness categorized under?
1.operational issues
2.design flaw
3.requirement oversight
4.implementation bug -
NTFS Security
How to secure data through NTFS Technique?
-
-
-
-
-
Trust relationship between two different forests
How to create trust relationship between two different forests.
-
What are the situations in which Lightweight UDP Protocol would be acceptable
TCP is a robust protocol: Sequencing and error correction are ensured, but there is a penalty in overhead (for example, if
no re-sequencing or error correction is needed). UDP does not provide these services but is correspondingly simpler. Cite
specific situations in which the lightweight UDP protocol could be acceptable, that is, when error correction or sequencing
is not needed -
AH and ESP
a) Why does the Authentication Header not protect all header fields of the outer IP header?
b) Consider IP fragmentation: argue why the processing of incoming packets requires all fragments of an IP packet to be reassembled before the processing of IPSec can proceed.
c) What measures are taken in the AH or ESP protocol to prevent a replay attack?
d) Why it is...
Networks and Security Interview Questions
Ans