Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Security Interview Questions
Questions Answers Views Company eMail

 Why would you want to use SSH from a Windows pc?

1 6564

What’s the difference between Symmetric and Asymmetric encryption?

1 3727

What is SSL and why is it not enough when it comes to encryption?

1 6502

 How would you find out what a POST code means?

1 4008

 What is the difference between a Black Hat and a White Hat?

1 3317

You need to reset a password-protected BIOS configuration. What do you do?

1 3460

What is XSS?

1 3347

How would you login to Active Directory from a Linux or Mac box?

1788

 What are salted hashes?

1 5140

What do you think of social networking sites such as Facebook and LinkedIn?

1 3537

What are the three ways to authenticate a person?

1 5845

How would you judge if a remote server is running IIS or Apache?

2 9115

What is data protection in transit vs data protection at rest?

1 4116

 You see a user logging in as root to perform basic functions. Is this a problem?

1 5900

How do you protect your home Wireless Access Point?

1 3441


Un-Answered Questions { Security }

How do I hack chanop on irc?

1


What is password shadowing?

1


What are accessories in computer?

913


A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?

4284


 Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?

1297


Which payphones will a red box work on?

1


What is nis/yp?

1


How do I break out of a restricted shell?

1


What are some irc channels of interest to hackers?

1


I run an SMB. I have 4 people in my entire company and a web-based store. I don’t have the time, patience or manpower to have a computer guy. Why should I care about exploits and computer jibberish?

2108


What is the most commonly used computer application?

918


 What is Exfiltration?

1814


What software do hackers use?

834


What are the 3 types of hackers?

841


I’m the CEO of a Fortune 500 company. I make more in an afternoon than you make in a year. I don’t care about this stupid security stuff, it just costs time and money and slows everything down. Why should I care about this junk?

1711