Network security analyst Interview Questions


Network Security Analyst interview questions shared by candidates

Top Interview Questions

Sort: Relevance|Popular|Date
Network Security Specialist was asked...March 21, 2019

Where do you live?

14 Answers




Show More Responses

They asked me about Linux OS.

4 Answers


I want a job

If can you help me to get it

Show More Responses
Rackspace Technology

There are two directly-connected switches. Assume that they communicate fine on the physical layer. Why can't two hosts with assigned addresses and communicate with each other? Also assume that network addresses can be used. How would you remedy this by swapping out only ONE of the devices on the network?

4 Answers

The hosts are on two different subnets. Replace one of the switches with a properly-configured router. Less

the host which assign and host these subnet is not belong to same subnet Less

The subnet being used only provides 2 useable address, .5 and .6 the .50 address is out of the range. If there are only switches and no router, swap out one switch with a router and re-configure the network addresses. Less

Show More Responses
Ascend One

How many bits do you need for a subnet size.

3 Answers

Need to know subnetting off top of your head.

The minimum addresses needed is 2 bits for 4 addresses 2^(# of addresses) = 2^2 which used for pint to point links. Max addresses can go as much as class A IP address /8 so for maximum bits is 32-8 = 24 bit Less

If number of addreses required in a subnet is "N" , then you need 2 more (network and bcst addreses) in addition to "N". So "N+2" is rounded of to Next 2 to the power . For e.g if we need 64 addresses in a subnet then , 66 rounded to next 2 to the power is is 2**7 ie 128. so number of bits required is 7. Less

Happiest Minds Technologies

They asked me that am i willing to work in Rotational shift ?

2 Answers

My answer was yes


Alert Logic

Explain the steps involved in the UDP handshake

2 Answers

I smiled, that was all.

UDP is a connectionless protocol - TCP on the other hand, makes use of a well-known transaction 'The 3 way handshake' - its one of the main differences between the two protocols. Less

Bitech International

how soon u can join.

2 Answers

preferably asap.



Do you consider yourself a Senior?

2 Answers



Cyberoam Technologies

More related to security question . Firewall,Rule and NAT rule related. VPN

1 Answers



What training have you had and where do you see yourself in 5 years?

1 Answers

I have several degrees and certificates. I see my self in 5 years having gained the experiance in real time not just out of a book. Less

Viewing 1 - 10 of 422 interview questions

See Interview Questions for Similar Jobs

network security engineerit security analystnetwork security specialistnetwork analyst