Tuesday, April 19, 2011

Computer Network Analyst

About the bts installations & monitoring in telecom

what s difference between GSM & BSM

How hash function works in router?

What are digital signatures and smart cards?

What are digital signatures and smart cards?

What does CIA stand for in security management?

What is classful and classless routing ? Difference between RIPv1 & RIPv2 ? What is multic...

Is it possible to connect two private networks through Internet using VPN concentrator?

what is the difference between router ACLs and Firewall ACLs?

How do you use RSA for both authentication and secrecy?

What are the different types of network security?

how to provide ip address permanent by using DHCP Server?

Write the purpose of vnp and name the vnp technology supported by windows 2000.

What is the difference between BOOTP and RARP?

Difference between discretionary access control and mandatory access control?

What is the role of Single Sign On in authentication technologies?

What is the connection between socket and session?

What is ARP and how does it work?

what is dora process in DHCP and how it works?

how to restore flash memory of cisco 2600 series router if IOS is currupt ?

what are the different encryption types and tools available.

Difference between routing protocol and routed protocol?

Basis for OSPF protocol?

Explain Kerberos Protocol ?

What is the difference between IARP and RARP?

What is meant by port blocking within LAN ?

Can traceout command work across the firewall? If No then why? If Yes then why?

Why are proxy servers useful?

What is IDS or IDP, and can you give me an example of one?

What is a log host?

What is DNS Hijacking?

What would you do if you discovered a Windows system on your network has been comrpromised...

What would you do if you discovered a UNIX or Network device on your network has been comp...

What is SSL? How do you create certificates?

What is SSH?

What is GPG/PGP?

What is a SYN Flood?

What is a “spoofed” packet?

What is a Denial of Service attack?

Describe, genrally, how to manage a firewall

What is a firewall?

How many memory layers are in the shared pool?

No comments:

Post a Comment