-
Buffer over flow is a software weakness categorized under?
1.operational issues
2.design flaw
3.requirement oversight
4.implementation bug -
Non financial are less prone to attack
Yes or No?
-
-
-
-
Provisioning - Telecom domain
Hello All,
Can anyone explain what is the meaning of provisioning - usually used in telecommunication domain? What are the steps involved in provisioning a service request raised by mobile customer?
Thanks & Regards,
telecomgeek -
-
-
-
-
LAN Connection
Suppose in a LAN, if one host does not get connection, what problem could have occured?
-
Token Ring Segment
You need to connect a token ring segment to ethernet segment. Would you use a Router a BRouter or a Bridge? Explain your answer.
-
Domain Controller
What is domain controller $how it manage a network security
-
-
RSA
How do you use RSA for both authentication and secrecy?
-
Routing and Routed protocol
Explain what are routing protocol and routed protocol?
-
Wireless security
In SOHO wireless N router what is the maximum speed and range that can be achieve. Which security which provide he maximum speed and range. What should be the security authentication.
-
-
Natting, Static Natting and Dynamic Natting
What is Natting, What is Static Natting and Dynamic Natting and how to apply on the traffic?
-
Networks and Security Interview Questions
Ans