-
Buffer over flow is a software weakness categorized under?
1.operational issues
2.design flaw
3.requirement oversight
4.implementation bug -
NTFS Security
How to secure data through NTFS Technique?
-
-
-
-
-
Basis for OSPF protocol?
Distance Vector Routing
-
Domain Controller
What is domain controller $how it manage a network security
-
-
-
-
-
-
-
RIPv1 vs. RIPv2
what is the difference between RIPv1 vs. RIPv ?State advantages and disadvantages in detailed. which is better to use?
-
Secure Transmission Medium
Which is the most secure transmission medium?
Which is the most insecure transmission medium? Justify -
-
-
Provisioning - Telecom domain
Hello All,
Can anyone explain what is the meaning of provisioning - usually used in telecommunication domain? What are the steps involved in provisioning a service request raised by mobile customer?
Thanks & Regards,
telecomgeek -
Trusting external connection is a software weakness categorized under ?
1.operational issues
2.design flaw
3.requirement oversight
4.implementation bug
Networks and Security Interview Questions
Ans