SIGN UP FREE
Survey Templates Surveys LAN Security Challenges and Network Access Control

LAN Security Challenges and Network Access Control

LAN Security Challenges and Network Access Control in BPOs and BFSIs


Please Enter your Name
Enter your Organization
Enter your mail ID
1. How often a guest/contractor wants to connect his/her device (laptop/Smart phones) to your network
2. Guest/contractor access control is most __________ job
3. Suppose a guest/contractor want to connect to your network. What configuration changes you do on guest/contractor machine and to your internal network devices.
4. VLANs can be used to avoid guest/contractor from accessing restricted network resources (bifurcation of guest network and corporate network).
5. Static IP configuration is more secure than DHCP
6. Guest/Contractor wants to access some application in network like some accounting application in the server.
1. Patch/update management is very important for securing enterprise networks
2. Patch/update Management is most cumbersome job
3. You apply patches/updates for
4. Best way to manage patches/updates is
5. One of your user disabled windows updates on his/her machine. How you identify it
6. A guest/Contractor wants to connect his laptop, but his machine does not have some important windows security updates.
7. A guest/Contractor wants to connect his laptop, but no antivirus/antispyware installed on his machine.
1. What percentage of your users use wireless network
2. In coming years Wireless networks will overtake wired network
3. What are you doing to protect wireless network
4. We use following wireless encryption methods
5. You are aware of following tools
6. IEEE 802.1x authentication increases security in wireless networks
7. Suppose a user wants to connect to wireless network and his/her machine does not support IEEE 802.1x authentication.
1. User/Group management is important because
2. How do you manage different users from different department?
3. A non HR department user wants to steal data from restricted HR Department Server (payroll), how can you mitigate this
4. When a HR executive logins through machine in a finance department. Then he/she can access
5. Suppose you want to block yahoo messenger for some user, you use
6. A guest/contractor and a CEO of your company logins to same Wireless Access Points
1. How often you face virus/worm outbreak in your network
2. Denial of Service attacker can be _________ of your network
3. Nmap is used for
4. Snort is used for
5. Does your network equipped with Intrusion Prevention/Detection System (IDS/IPS)
6. One of your machines in your network is somehow infected by worm, how you will identify that machine
7. Suppose you identify the infected machine what steps are taken?
8. One of your users wants to attack your server by Dos attack, how you will identify him
9. Suppose you caught him/her what steps are taken?
10. Whether your security infrastructure will able to mitigate zero day and bot net attacks
1. Security is weakest at its strongest link
2. How you mitigate Arp/Mac flooding by (please leave it as blank if you are not aware of this attack)
3. How you mitigate VLAN attacks (please leave it as blank if you are not aware of this attack)
4. How you mitigate Mac/Arp spoofing (please leave it as blank if you are not aware of this attack)
5. How you mitigate DNS/DHCP spoofing (please leave it as blank if you are not aware of this attack)
6. How you mitigate STP attacks (please leave it as blank if you are not aware of this attack)
1. You use Firewall for
2. What is your default Firewall Policy?
3. Suppose your outgoing default Firewall policy is Deny all except http traffic and your CEO wants to download some file from internet through FTP
4. P2P communications
5. TCP sequence randomization will increase the security
6. Best way to restrict web content filtering
1. What steps you follow to compliance with regulatory framework like Sarbanes-Oxley Act
2. Auditing is one of most tedious job
4. User/Group access controls are part of regulatory framework
5. How you collate all events from Firewall, Active Directory, IDS/IPS etc

Related templates and questionnaires