- 
                    
Buffer over flow is a software weakness categorized under?
1.operational issues
2.design flaw
3.requirement oversight
4.implementation bug - 
                    
Non financial are less prone to attack
Yes or No?
 - 
                    
 - 
                    
 - 
                    
 - 
                    
Provisioning - Telecom domain
Hello All,
Can anyone explain what is the meaning of provisioning - usually used in telecommunication domain? What are the steps involved in provisioning a service request raised by mobile customer?
Thanks & Regards,
telecomgeek - 
                    
 - 
                    
 - 
                    
 - 
                    
 - 
                    
LAN Connection
Suppose in a LAN, if one host does not get connection, what problem could have occured?
 - 
                    
Token Ring Segment
You need to connect a token ring segment to ethernet segment. Would you use a Router a BRouter or a Bridge? Explain your answer.
 - 
                    
Domain Controller
What is domain controller $how it manage a network security
 - 
                    
 - 
                    
RSA
How do you use RSA for both authentication and secrecy?
 - 
                    
Routing and Routed protocol
Explain what are routing protocol and routed protocol?
 - 
                    
Wireless security
In SOHO wireless N router what is the maximum speed and range that can be achieve. Which security which provide he maximum speed and range. What should be the security authentication.
 - 
                    
 - 
                    
Natting, Static Natting and Dynamic Natting
What is Natting, What is Static Natting and Dynamic Natting and how to apply on the traffic?
 - 
                    
 
Networks and Security Interview Questions

		
Ans