Security Interview Questions
Questions Answers Views Company eMail

What are the types of computer based social engineering attacks? Explain what is Phishing?

1 2511

Explain what is Network Sniffing?

1 1949

Explain what is ARP Spoofing or ARP poisoning?

1 2384

How you can avoid or prevent ARP poisoning?

1 2254

What is Mac Flooding?

1 2528

 Explain what is DHCP Rogue Server?

1 2153

Explain what is Cross-site scripting and what are the types of Cross site scripting?

1 2212

Explain what is Burp Suite, what are the tools it consist of?

1 8479

Explain what is Pharming and Defacement?

1 3055

Explain how you can stop your website getting hacked?

2 2435

Explain what is Keylogger Trojan?

1 2020

Explain what is Enumeration?

1 2253

Explain what is NTP?

1 2197

 Explain what is MIB?

1 2286

 Mention what are the types of password cracking techniques?

1 2087


Un-Answered Questions { Security }

What is a black box?

1


How do I access the password file under vms?

1


1. Assume that passwords are selected from four-character combination of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second. a. Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to recover the correct password? b. Assuming feedback to the adversary flagging an error as each incorrect character is entered, what is the expected time to discover the correct password?

1692


What is database in a computer?

617


What is data source in computer?

568






Does indexing slow down computer?

593


How do I gain root from a suid script or program?

1


What's Security Tests

75


What tools do real hackers use?

455


what is the use of scul transaction in sap security in ecc server?

830


How do I modify the irc client to hide my real username?

1


What is meant by computer application?

558


What are accessories in computer?

552


What is dora process in DHCP and how it works?

2458


How do I crack unix passwords?

1