Network Security Analyst Interview Questions

479

Network Security Analyst interview questions shared by candidates

Top Interview Questions

Sort: Relevance|Popular|Date
Jazz
Network Security Specialist was asked...March 21, 2019

Where do you live?

14 Answers

Lahore

rawalpindi

rawalpindi

Show More Responses
TotalEnergies

They asked me about Linux OS.

4 Answers

Hello

I want a job

If can you help me to get it

Show More Responses
Rackspace Technology

There are two directly-connected switches. Assume that they communicate fine on the physical layer. Why can't two hosts with assigned addresses 192.168.100.5/30 and 192.168.100.50/30 communicate with each other? Also assume that network addresses can be used. How would you remedy this by swapping out only ONE of the devices on the network?

4 Answers

The hosts are on two different subnets. Replace one of the switches with a properly-configured router. Less

the host which assign 192.168.100.5/30 and host 192.168.100.50/30 these subnet is not belong to same subnet Less

The subnet being used only provides 2 useable address, .5 and .6 the .50 address is out of the range. If there are only switches and no router, swap out one switch with a router and re-configure the network addresses. Less

Show More Responses
Ascend One

How many bits do you need for a subnet size.

3 Answers

Need to know subnetting off top of your head.

The minimum addresses needed is 2 bits for 4 addresses 2^(# of addresses) = 2^2 which used for pint to point links. Max addresses can go as much as class A IP address /8 so for maximum bits is 32-8 = 24 bit Less

If number of addreses required in a subnet is "N" , then you need 2 more (network and bcst addreses) in addition to "N". So "N+2" is rounded of to Next 2 to the power . For e.g if we need 64 addresses in a subnet then , 66 rounded to next 2 to the power is is 2**7 ie 128. so number of bits required is 7. Less

Alert Logic

Explain the steps involved in the UDP handshake

2 Answers

I smiled, that was all.

UDP is a connectionless protocol - TCP on the other hand, makes use of a well-known transaction 'The 3 way handshake' - its one of the main differences between the two protocols. Less

Happiest Minds Technologies

They asked me that am i willing to work in Rotational shift ?

2 Answers

My answer was yes

yes

Bitech International

how soon u can join.

2 Answers

preferably asap.

Immediately

bareMinerals

Do you consider yourself a Senior?

2 Answers

Yes

Yes.

InteliSecure

What training have you had and where do you see yourself in 5 years?

1 Answers

I have several degrees and certificates. I see my self in 5 years having gained the experiance in real time not just out of a book. Less

Softcell Technologies

I was asked questions on the networking basics and also certain topics related to the network security. Questions were asked on small things like how does a mail pass or how does a computer boot up to check the in-depth technical knowledge. Also various questions were asked on port nos and protocol nos and some questions related to Linux basics . Lastly some personal questions to end the interview

1 Answers

Learning the course module of CCNA will be of good use for cracking the interview. Doing a certification in the same would be an added advantage. Also Google the most famous questions or most frequently asked questions for this job role. Less

Viewing 1 - 10 of 479 interview questions

See Interview Questions for Similar Jobs

network security engineerit security analystnetwork analystnetwork security specialist

Glassdoor has 479 interview questions and reports from Network security analyst interviews. Prepare for your interview. Get hired. Love your job.