Let’s have some Network Security Interview Questions

  • Protocol is a defined set of rules that decide how devices in a network will
    communicate, irrespective of their internal process, design, and structure.
  • For example, File Transfer Protocol(FTP) helps transfer files between devices.
  • Factors:
  1. Bandwidth: It is the amount of data that a medium can transfer.
  2. No of users: The no of users is inversely proportional to bandwidth. i.e if there are 6 device in a network, each device will get 1/6th of total bandwidth.
  3. Error rate: Noise and external interference might alter the data bits
    sent and lead to an error.
  • In wired connection, Nodes are connected with the help of Ethernet cable.All the devices in a wireless network can be connected with the help of wireless signal.
  • Data transfers at a faster rate in wired connections as compared to a
    wireless connection.
  • Packet Filtering is the best way to prevent ARP Spoofing. It blocks the fishy packets coming from unknown source.
  • software's like XArp can help to detect malicious packets.
  • Last but not the least, use of HTTPS can help you to authenticate data.
  • Use of Access Control list to deny Private IP address: You can limit user to access files from server, other networks and increase the performance of the network.
  • Filter traffic both the ways i.e traffic coming to the system and traffic going from the system. So that even the spoofed IP address wont send any sensitive data from the server to victim’s connection.
  • Static IP’s are provided by your ISP and they do not change at all.
  • Device using Static IP can be traced easily because IP addresses are unique per system and they do not change.
  • Maintenance cost is higher.
  • They change every time to connect to the network. (Wired or wireless)
  • It is very difficult to trace IP address because it changes , when you are connected to new network. For eg, every-time you change your WiFi connection or VPN connection IP is changed.
  • Maintenance cost is less.
  • Used when data needs high security.

--

--

--

Security Analyst, Bug XS Community Leader

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

6 tips to Secure and Optimize your Virtual Private Server (VPS)

Dear XTers,

The End of Passive Trust

The United States and Russian Hackers

{UPDATE} 不要做大挑战 Hack Free Resources Generator

Update 11. 2022 Russia-Ukraine war — Cyber group tracker. April 4.

Best Obsidian Authenticator alternative

360 Degrees around the OAuth

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Parth Shukla

Parth Shukla

Security Analyst, Bug XS Community Leader

More from Medium

“Tricking” our developers into liking application security

IoC and IoA overview

Let’s do a peek inside the admin’s dashboard: Abuse API endpoint

Why do Deserialization Vulnerabilities occur?