Network security analyst Interview Questions

422

Network Security Analyst interview questions shared by candidates

Top Interview Questions

Sort: Relevance|Popular|Date
Jazz
Network Security Specialist was asked...March 21, 2019

Where do you live?

14 Answers

Lahore

rawalpindi

rawalpindi

Show More Responses
TotalEnergies

They asked me about Linux OS.

4 Answers

Hello

I want a job

If can you help me to get it

Show More Responses
Rackspace Technology

There are two directly-connected switches. Assume that they communicate fine on the physical layer. Why can't two hosts with assigned addresses 192.168.100.5/30 and 192.168.100.50/30 communicate with each other? Also assume that network addresses can be used. How would you remedy this by swapping out only ONE of the devices on the network?

4 Answers

The hosts are on two different subnets. Replace one of the switches with a properly-configured router. Less

the host which assign 192.168.100.5/30 and host 192.168.100.50/30 these subnet is not belong to same subnet Less

The subnet being used only provides 2 useable address, .5 and .6 the .50 address is out of the range. If there are only switches and no router, swap out one switch with a router and re-configure the network addresses. Less

Show More Responses
Ascend One

How many bits do you need for a subnet size.

3 Answers

Need to know subnetting off top of your head.

The minimum addresses needed is 2 bits for 4 addresses 2^(# of addresses) = 2^2 which used for pint to point links. Max addresses can go as much as class A IP address /8 so for maximum bits is 32-8 = 24 bit Less

If number of addreses required in a subnet is "N" , then you need 2 more (network and bcst addreses) in addition to "N". So "N+2" is rounded of to Next 2 to the power . For e.g if we need 64 addresses in a subnet then , 66 rounded to next 2 to the power is is 2**7 ie 128. so number of bits required is 7. Less

Happiest Minds Technologies

They asked me that am i willing to work in Rotational shift ?

2 Answers

My answer was yes

yes

Alert Logic

Explain the steps involved in the UDP handshake

2 Answers

I smiled, that was all.

UDP is a connectionless protocol - TCP on the other hand, makes use of a well-known transaction 'The 3 way handshake' - its one of the main differences between the two protocols. Less

Bitech International

how soon u can join.

2 Answers

preferably asap.

Immediately

bareMinerals

Do you consider yourself a Senior?

2 Answers

Yes

Yes.

Cyberoam Technologies

More related to security question . Firewall,Rule and NAT rule related. VPN

1 Answers

Answer

InteliSecure

What training have you had and where do you see yourself in 5 years?

1 Answers

I have several degrees and certificates. I see my self in 5 years having gained the experiance in real time not just out of a book. Less

Viewing 1 - 10 of 422 interview questions

See Interview Questions for Similar Jobs

network security engineerit security analystnetwork security specialistnetwork analyst