CoolInterview.com - World's Largest Collection of Interview Questions & Answers, FAQs, queries, sample papers, exam papers, dumps, what, why, how, where, when questions
Our Services
Get 9,000 Interview Questions & Answers in an eBook.




Get it now !!
Send your Resume to 6000 Companies
Networks Security Interview Questions & Answers - Learning Mode
COOLINTERVIEW.COM NETWORKING INTERVIEW QUESTIONS NETWORKS SECURITY INTERVIEW QUESTIONS QUESTIONS & ANSWERS - LEARNING MODE

Networks Security Interview Questions & Answers - Learning Mode

Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment. Network Security is an organization's strategy and provisions for ensuring the security of its assets and of all network traffic. Network security is manifested in an implementation of security policy hardware, and software.

Try Networks Security Interview Questions & Answers - Exam Mode

1

Sort By : Latest First | Oldest First | By Rating

Networks Security Interview Questions & Answers - Learning Mode
Try Networks Security Interview Questions & Answers - Exam Mode
Question: What is meant by port blocking within LAN ?



Answer: Restricting the users from accessing a set of services within the local area network is called port blocking.
Source: CoolInterview.com
Question: Basis for OSPF protocol



Answer: (a) OSPF has two primary characteristics. The first is that the protocol is open, which means that its specification is in the public domain. The OSPF specification is published as Request For Comments (RFC) 1247.

The second principal characteristic is that OSPF is based on the SPF algorithm, which sometimes is referred to as the Dijkstra algorithm, named for the person credited with its creation.

(b)OSPF is a link-state routing protocol that calls for the sending of link-state ad Source: CoolInterview.com
Question: for a small lan which class of addressing is used?



Answer: Class C is used for small network environment
because the users are also less Source: CoolInterview.com
Question: What does CIA stand for in security management?



Answer: I found from cisco.com, may be this is what u looking for.

Confidentiality,
Integrity,and
Availability

Source: CoolInterview.com
Question: What is difference between ARP & RARP ? How both of these protocols will work, and where it will use ?





Answer: ARP -Meaning of ARP ? "Address Resolution Protocol", is used to map ip Network addresses to the hardware (Media Access Control sub layer) addresses used by the data link protocol. The ARP protocol operates between the network layer and the data link layer in the Open System Interconnection (osi) model.


RARP-RARP (Reverse Address Resolution Protocol) is a protocol by which a physical machine in a local area network can request to learn its IP address from a gateway server's Addre Source: CoolInterview.com
Question: How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?



Answer: See traceroute works using ICMP packets. First source sends an ICMP packet with Time to Live (TTL) field as 1 to the destination address. Now intermediate router receives the packet and sees that TTL field has expired, so it sends a ICMP TTL expired reply. Now the source machine again sends the ICMP packet with TTL field as 2. This time second intermediate router replies. This process is repeated till destination is reached. That way the source can get the entire route upto destination. Source: CoolInterview.com
Question: Difference between discretionary access control and mandatory access control?



Answer: Das is used by itself according to it it is access and comtrolled while mas it has to be compulsory give the access controll. Source: CoolInterview.com
Question: Different between broadcast domain and collision domain. or explian broadcast domain and collision domain.



Answer: Brodcast Domain

send the packet to all the Present Network

IT may be send by the person

it may broadcast by the switch when the address not found in the Network.

For breaking brodcat domain We can Use Router

Collision Domain:

Switch has no collision as compare to hun (layer on Device
Source: CoolInterview.com
Question: What is the role of Single Sign On in authentication technologies?




Answer: Single sign-on (SSO) is mechanism whereby a single action of user authentication and authorization can permit a user to access all computers and systems where he has access permission, without the need to enter multiple passwords. Single sign-on reduces human error, a major component of systems failure and is therefore highly desirable but difficult to implement.

Source: CoolInterview.com
Question: Explain Kerberos Protocol ?



Answer: it is an authentications protocol. Source: CoolInterview.com
Question: What is classful and classless routing ?
Diff bet RIPv1 & RIPv2 ?
What is multicasting ?
What is VLSM ?



Answer: Classfull routing protocol is a routing protocol that strictly. follows the classfull IP like IGRP,RIP<br><br>Classless Routing A scheme which allocates blocks of Internet addresses in a way that allows summarisation into a smaller number of routing table entries.<br><br> Source: CoolInterview.com
Question: How hash function works in router



Answer: Just btype the following at router> prompt

Router>enable

password>cisco

Router#

is displayed.
Source: CoolInterview.com
Question: What are digital signatures and smart cards?



Answer: Digital signature : Information that is encrypted with an entity private key and is appended to a message to assure the recipient of the authenticity and integrity of the message. The digital signature proves that the message was signed by the entity that owns, or has access to, the private key or shared secret symmetric key.
smart cards : Smart cards help businesses evolve and expand their products and services in a rapidly changing global market. In addition to the well known commercial a Source: CoolInterview.com
Question: In mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?


Answer: whatis CCNA Networking? Source: CoolInterview.com
Question: What is ARP and how does it work?



Answer: ARP(ADDRESS RESOLUTION PROTOCOL) is a network layer protocol which associates the physical hardware address of a network node(commonly known as a MAC ADDRESS) to its ip address. now an ARP creates a table known as ARP CACHE/TABLE that maps ip addresses to the hardware addressess of nodes on the local network.

if based on the ip address it sees that it has the node's mac address in its ARP TABLE then transmitting to that ip address is done quicker because the destination is known and v Source: CoolInterview.com
Question: What are all the technical steps involved when the data trasmission from server via router?



Answer: When data goes through the server the first step is that it will check the gateway ip address means network main router IP if this will correct then the nexp porcess is done by router itselef , where the packets have to be sent that is in routing talbe what is your next destination? and after it will recognize by the next network the same process is be done by theri network router and server.
Source: CoolInterview.com
Question: How do you use RSA for both authentication and secrecy?



Answer: RSA is based upon public key/private key concept. For authentication one can encrypt the hash (MD5/SHA) of the data with his private key. This is known as digital signature. And secrecy is achieved by encrypting the data with the public key of the target user. Generally we dont use RSA for encryption because of key size (1024 bits). Rather a symmetric session key (128/256 bit) is established between communicating parties and is used for encryption. Source: CoolInterview.com
Question: How do you do authentication with message digest(MD5)? (Usually MD is used for finding tampering of data)



Answer: The unique number will be generated by MD5, if it is tamped with someone, the value will be changed so you know you are tampered Source: CoolInterview.com

1



India News Network
Latest 20 Questions
Payment of time- barred debt is: (a) Valid (b) Void (c) Illegal (d) Voidable
Consideration is defined in the Indian Contract Act,1872 in: (a) Section 2(f) (b) Section 2(e) (c) Section 2(g) (d) Section 2(d)
Which of the following is not an exception to the rule, "No consideration, No contract": (a) Natural love and affection (b) Compensation for involuntary services (c) Completed gift (d) Agency
Consideration must move at the desire of: (a) The promisor (b) The promisee (c) The promisor or any other party (d) Both the promisor and the promisee
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal
Cache = 0.046875 Seconds