Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Security Interview Questions
Questions Answers Views Company eMail

What are the types of computer based social engineering attacks? Explain what is Phishing?

1 3085

Explain what is Network Sniffing?

1 2552

Explain what is ARP Spoofing or ARP poisoning?

1 3006

How you can avoid or prevent ARP poisoning?

1 2910

What is Mac Flooding?

1 3165

 Explain what is DHCP Rogue Server?

1 2886

Explain what is Cross-site scripting and what are the types of Cross site scripting?

1 2840

Explain what is Burp Suite, what are the tools it consist of?

1 9247

Explain what is Pharming and Defacement?

1 3688

Explain how you can stop your website getting hacked?

2 3147

Explain what is Keylogger Trojan?

1 2585

Explain what is Enumeration?

1 2819

Explain what is NTP?

1 2833

 Explain what is MIB?

1 2830

 Mention what are the types of password cracking techniques?

1 2611


Un-Answered Questions { Security }

Is a console a computer?

958


What is a table in computer?

930


What is dora process in DHCP and how it works?

2999


A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?

4284


How do I gain root from a suid script or program?

1


explain step by step role design process in sap security

608


What tools do real hackers use?

809


What is a spooler on a computer?

1072


What is database in a computer?

968


How do I access the password file under unix?

1


what is the use of scul transaction in sap security in ecc server?

832


What is a ringback number?

1


What is a blue box?

1


1. Assume that passwords are selected from four-character combination of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second. a. Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to recover the correct password? b. Assuming feedback to the adversary flagging an error as each incorrect character is entered, what is the expected time to discover the correct password?

2142


What is data source in computer?

932