Security Interview Questions
Questions Answers Views Company eMail

What are accessories in computer?

554

What are the most common computer applications?

568

What is a spooler on a computer?

581

What is meant by computer application?

558

What is the most commonly used computer application?

556


Un-Answered Questions { Security }

Who is the best hacker in the world?

512


How do I fake posts to usenet?

1


What is a spooler on a computer?

581


How do I hack chanop on irc?

1


A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?

3846






what is the use of scul transaction in sap security in ecc server?

830


 What is Exfiltration?

1437


explain step by step role design process in sap security

600


What tools do real hackers use?

459


What is database in a computer?

619


what is the role in sap security?

384


What is a trojan/worm/virus?

1


What is a blue box?

1


What are some irc channels of interest to hackers?

1


How do I access the password file under vms?

1