Recent Posts

Posted in Interview Network Security Uncategorized

Internet Cyber Threat and Malicious Internet Functioning.

Internet Cyber Threat and Malicious Internet Functioning – DDoS ATTACKS , Ransomware , Virus , Malware and Malicious Activity. Internet is full of story on Malicious…

Continue Reading...
Posted in Interview Uncategorized

AWS Interview Questions and Answers for Certified Solutions Architect – Associate Job

AWS Interview Questions and Answers – EC2 , VPC , S3 and Network and Security. Describe, What is EC2 instance ? An EC2 instance is…

Continue Reading...
Posted in F5 LBR BIG-IP

F5 Big IP LTM Setup of Virtual Interface Profile and Pool

F5 Big-IP LTM Setup of Virtual Server , Pool and SNATs Configuration Overview.   Image Source – www.techmusa.com – virtual server with IP 200.100.0.1/32 that will…

Continue Reading...
Posted in Cisco IPsec site to site vpn Network Security

SITE TO SITE IPSEC VPN PHASE-1 AND PHASE-2 TROUBLESHOOTING STEPS

SITE TO SITE IPSEC VPN PHASE-1 AND PHASE-2 TROUBLESHOOTING STEPS , NEGOTIATIONS STATES AND MESSAGES MM_WAIT_MSG   (Image Source – www.Techmusa.com)   Network Troubleshooting is…

Continue Reading...
Posted in NETWORK SECURITY Technology

PENETRATION TESTING AND SECURITY VULNERABILITY ASSESSMENT OVERVIEW

Penetration Assessment A penetration test (pen testing) is an initiative to determine and evaluate the network and system security assessment of an IT infrastructure.Such network assessment test…

Continue Reading...