Try Practicing some top interview questions for Computer Network Security by Pritish Kumar Halder below:

Q1. What Is Region?

When hierarchical routing is used, the routers are divided into what we call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions.

Q2. What Is Attenuation?

The degeneration of a signal over distance on a network cable is called attenuation.

Q3. What Is Kerberos?

It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files.

Q4. What Is Igp (Interior Gateway Protocol)?

It is any routing protocol used within an autonomous system.

Q5. What Are Major Types Of Networks And Explain?

1. Server-based network
2. Peer-to-peer network
3. Peer-to-peer network, computers can act as both servers sharing resources and as clients using the resources.
4. Server-based networks provide centralized control of network resources and rely on server computers to provide security and network administration.

Q6. What Is Brouter?

Hybrid devices that combine the features of both bridges and routers.

Q7. What Is Source Route?

It is a sequence of lP addresses identifying the route a datagram must follow. A source route may optionally be included in an IP datagram header.

Q8. What Is Raid?

A method for providing fault tolerance by using multiple hard disk drives.

Q9. What Is Slip (serial Line Interface Protocol)?

It is a very simple protocol used for transmission of IP datagrams across a serial line.

Q10. What Does The Mount Protocol Do ?

The Mount protocol returns a file handle and the name of the file system in which a requested file resides. The message is sent to the client from the server after reception of a client’s request.

Q11. What Are The Two Types Of Permission Technology Available?

1. Broadcast and
2.point-to-point

Q12. Which Protocol Does Https Use At The Airport Layer For Sending And Receiving Data?

TCP.

Q13. What Is The Minimum And Maximum Length Of The Header In The Tcp Segment And Lp Datagram?

The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes.

Q14. What Is A Management Information Base (mib)?

A Management Information Base is part of every SNMP-managed device. Each SNMP agent has the MIB database that contains information about the device’s status, its performance, connections, and configuration. The MIB is queried by SNMP.

Q15. What Is The Range Of Addresses In The Classes Of Internet Addresses ?

Class A 0.0.0.0 – 127.255.255.255
Class B 128.0.0.0 – 191 .255.255.255
Class C 192.0.0.0 – 223.255.255.255
Class D 224.0.0.0 – 239.255.255.255
Class E 240.0.0.0 – 247.255.255.255

Q16. What Are 10base2, 10base5 And 10baset Ethernet L ?

10Base2: An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments.

10Base5: An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment.

10BaseT: An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted-pair cabling.

Q17. In An Icmp Address Mask Request, What Is The Attacker Looking For?

The attacker is looking for the subnet/network mask of the victim. This would help the attacker to map the internal network.

Q18. What Protocol Is Used By Dns Name Servers?

DNS uses UDP for communication between servers, It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, trmission reliability suffers with UDP.

Q19. Why Is Rip V1 Insecure In A Network?

RIP v1 does not use a password for authentication as with Rip v@This makes it possible to attackers to send rogue RIP packets and corrupt the routing table.

Q20. What Is Gateway-to-gateway Protocol?

It is a protocol formerly used to exchange routing information between Internet core routers.

Q21. What Is A Multi-homed Host?

It is a host that has multiple network interfaces and that requires multiple IP addresses is called as a Multi-homed Host.

Q22. What Is The Hello Protocol Used For?

The HELLO protocol uses time instead of distance to determine optimal routing. It is an alternative to the Routing Information Protocol.

Q23. What Is External Data Representation?

External Data Representation is a method of encoding data within an RPC message, used to ensure that the data is not system-dependent.

Q24. What Is Passive Topology?

When the computers on the network simply listen and receive the signal, they are referred to as passive because they don’t amplify the signal in any way. Example for passive topology – linear bus.

Q25. Explain The Function Of Permission Control Block?

A TCB is a complex data structure that contains a considerable amount of information about each connection.

Reference: https://engineeringinterviewquestions.com/computer-network-security-interview-questions-answers/