Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Security Interview Questions
Questions Answers Views Company eMail

What is an easy way to configure a network to allow only a single computer to login on a particular jack?

1 7104

You are remoted in to a headless system in a remote area. You have no physical access to the hardware and you need to perform an OS installation. What do you do?

1 5065

On a Windows network, why is it easier to break into a local account than an AD account?

1 6787

 What is the difference between an HIDS and a NIDS?

1 7615

What is the CIA triangle?

1 2642

You find out that there is an active problem on your network. You can fix it, but it is out of your jurisdiction. What do you do?

1 4306

You are an employee for a tech department in a non-management position. A high-level executive demands that you break protocol and allow him to use his home laptop at work. What do you do?

1 3254

 What is the difference between a vulnerability and an exploit?

1 2992

 How would you compromise an “Office Workstation” at a hotel?

1 5627

What is worse in Firewall Detection, a false negative or a false positive? And why?

1 8667

What’s better, a red team or a blue team?

1 2783

 What’s the difference between a White Box test and a Black Box test?

2 3190

 What is the difference between Information Protection and Information Assurance?

1 2821

 How would you lock down a mobile device?

1 2528

What is the difference between closed-source and open-source? Which is better?

1 2979


Un-Answered Questions { Security }

What is a ringback number?

1


I run an SMB. I have 4 people in my entire company and a web-based store. I don’t have the time, patience or manpower to have a computer guy. Why should I care about exploits and computer jibberish?

2103


Does indexing slow down computer?

1002


What are some irc channels of interest to hackers?

1


 What is Exfiltration?

1813


How do hackers hack passwords?

807


What os do hackers use?

872


How would you login to Active Directory from a Linux or Mac box?

1788


What software do hackers use?

833


What laptops do hackers use?

890


What is a table in computer?

928


What is meant by computer application?

902


Who is the most dangerous hacker?

881


What are the most common computer applications?

891


How do I modify the irc client to hide my real username?

1