Вы находитесь на странице: 1из 3

1. How Hash Function works In Router ?

2. What Are Digital Signature & Smart Cards ?


3. What Does CIA Stands For In Security Management ?
4. What Is Classful And Classless Routing ?

5. Difference Between RIPv1 & RIPv2 ?

6. What Is Multicasting ?

7. Is it possible to connect two private networks through


Internet using VPN concentrator? Answer

8. what is the difference between router ACLs and Firewall


ACLs? Answer

9. How do you use RSA for both authentication and secrecy?


Answer

10. What are the different types of network security?


Answer

11. how to provide ip address permanent by using DHCP


Server? Answer

12. Write the purpose of vnp and name the vnp technology
supported by windows 2000. Answer

13. What is the difference between BOOTP and RARP? Answer

14. Name some routing protocols? (RIP,OSPF etc..) Answer

15. Difference between discretionary access control and


mandatory access control? Answer

Cont By
bharat.jain@msn.com
16. What is the role of Single Sign On in authentication
technologies? Answer

17. What is the connection between socket and session?


Answer

18. What is ARP and how does it work? Answer

19. what is dora process in DHCP and how it works? Answer

20. how to restore flash memory of cisco 2600 series


router if IOS is currupt ? Answer

21. what are the different encryption types and tools


available. Answer

22. Difference between routing protocol and routed


protocol? Answer

23. Basis for OSPF protocol? Answer

24. Explain Kerberos Protocol ? Answer

25. What is the difference between IARP and RARP? Answer

26. What is meant by port blocking within LAN ? Answer

27. Can traceout command work across the firewall? If No


then why? If Yes then why? Answer

28. Why are proxy servers useful? Answer

29. What is IDS or IDP, and can you give me an example of


one? Answer

30. What is a log host? Answer

Cont
By
bharat.jain@msn.com

31. What is DNS Hijacking? Answer

32. What would you do if you discovered a Windows system


on your network has been comrpromised... Answer

33. What would you do if you discovered a UNIX or Network


device on your network has been comp... Answer

34. What is SSL? How do you create certificates? Answer

35. What is SSH? Answer What is GPG/PGP? Answer

36. What is a SYN Flood? Answer

37. What is a spoofed packet? Answer

38. What is a Denial of Service attack? Answer

39. Describe, genrally, how to manage a firewall Answer

40. What is a firewall?

By
bharat.jain@msn.com

Вам также может понравиться