Security Interview Questions
Questions Answers Views Company eMail

Define the term “DMZ” as it pertains to network security, and name three different common network devices that are typically found there?

1 2109

Will Norton Mobile Security slow down my smartphone’s performance?

1 2346

What are the System Requirements for Norton Mobile Security?

1 1580

How do users get exposed to mobile threats?

1 1651

What if I buy a new phone – will my subscription transfer?

1 1529

How many devices can I protect?

1 1786

What happens if I exceed the device limit? Can I get permission to add more devices if I exceed my limit?

1 1660

Which browsers does the Web Protection feature of Norton Mobile Security support?

1 1718

 Explain what is Ethical Hacking?

1 2023

List out some of the common tools used by Ethical hackers?

1 2100

 What are the types of ethical hackers?

1 2647

 What is footprinting in ethical hacking? What is the techniques used for footprinting?

1084

Explain what is Brute Force Hack?

1 1840

 Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?

974

Explain what is SQL injection?

1 2268


Un-Answered Questions { Security }

What is a hacking loop?

1


What is a trojan/worm/virus?

1


What is data source in computer?

568


What is a black box?

1


How do I hack chanop on irc?

1






What is dora process in DHCP and how it works?

2460


How do I access the password file under vms?

1


Which payphones will a red box work on?

1


How do I modify the irc client to hide my real username?

1


explain step by step role design process in sap security

600


 What is footprinting in ethical hacking? What is the techniques used for footprinting?

1084


How do I access the password file under unix?

1


What software do hackers use?

459


How do I fake posts to usenet?

1


What is a blue box?

1