Security Interview Questions
Questions Answers Views Company eMail

 Why would you want to use SSH from a Windows pc?

1 5448

What’s the difference between Symmetric and Asymmetric encryption?

1 2909

What is SSL and why is it not enough when it comes to encryption?

1 5606

 How would you find out what a POST code means?

1 3103

 What is the difference between a Black Hat and a White Hat?

1 2539

You need to reset a password-protected BIOS configuration. What do you do?

1 2573

What is XSS?

1 2533

How would you login to Active Directory from a Linux or Mac box?

1310

 What are salted hashes?

1 4212

What do you think of social networking sites such as Facebook and LinkedIn?

1 2763

What are the three ways to authenticate a person?

1 4914

How would you judge if a remote server is running IIS or Apache?

2 7867

What is data protection in transit vs data protection at rest?

1 3332

 You see a user logging in as root to perform basic functions. Is this a problem?

1 5006

How do you protect your home Wireless Access Point?

1 2574


Un-Answered Questions { Security }

What is a driver in computer?

541


How do I modify the irc client to hide my real username?

1


What are some irc channels of interest to hackers?

1


What is a table in computer?

552


What is a blue box?

1






What software do hackers use?

452


What is a ringback number?

1


How do hackers hack passwords?

440


What is database in a computer?

610


Which payphones will a red box work on?

1


 What is footprinting in ethical hacking? What is the techniques used for footprinting?

1078


I run an SMB. I have 4 people in my entire company and a web-based store. I don’t have the time, patience or manpower to have a computer guy. Why should I care about exploits and computer jibberish?

1690


What is a trojan/worm/virus?

1


What is meant by computer application?

552


Is a console a computer?

564