Showing posts with label Networks and Security. Show all posts
Showing posts with label Networks and Security. Show all posts

Interview Questions : Networks and Security

How do you use RSA for both authentication and secrecy?
How do you do authentication with message digest(MD5)?
How does traceroute work?
Difference between discretionary access control and mandatory access control?
What is ARP and how does it work?
Explain Kerberos Protocol ?
Name some routing protocols? (RIP,OSPF etc..)
What are digital signatures and smart cards?
What is the connection between socket and session?
What is the role of Single Sign On in authentication technologies?
What are all the technical steps involved when the data transmission from server via router?
How hash function works in router?
Different between broadcast domain and collision domain.?
What does CIA stand for in security management?
What is classful and classless routing ?
Difference between RIPv1 & RIPv2 ?
What is multicasting ?
Basis for OSPF protocol?
What is meant by port blocking within LAN ?
What is difference between ARP & RARP ?
What do you understand by 'even circuit' in networking?
Difference between routing protocol and routed protocol?
How to retrieve administrator password without using any third party tools?
what are the different encryption types and tools available?
Is it possible to connect two private networks through Internet using VPN concentrator?
what is the difference between router ACLs and Firewall ACLs?

Networks and Security

1. How do you use RSA for both authentication and secrecy?

2. What is ARP and how does it work?

3. What's the difference between a switch and a router?

4. Name some routing protocols? (RIP,OSPF etc..)

5. How do you do authentication with message digest(MD5)? (Usually MD is used for finding tampering of data)

6. How do you implement a packet filter that distinguishes following cases and selects first case and rejects second case.

i) A host inside the corporate n/w makes a ftp request to outside host and the outside host sends reply.

ii) A host outside the network sends a ftp request to host inside. for the packet filter in both cases the source and destination fields will look the same.

7. How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

8. Explain Kerberos Protocol ?

9. What are digital signatures and smart cards?

10. Difference between discretionary access control and mandatory access control?