Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


 What is the difference between a vulnerability and an exploit?



 What is the difference between a vulnerability and an exploit?..

Answer / chaitanya

A lot of people would say that they are the same thing, and in a sense they would be right. However, one is a potential problem while the other is an active problem. Think of it like this: You have a shed with a broken lock where it won’t latch properly. In some areas such as major cities, that would be a major problem that needs to be resolved immediately, while in others like rural areas its more of a nuisance that can be fixed when you get around to it. In both scenarios it would be a vulnerability, while the major cities shed would be an example of an exploit – there are people in the area, actively exploiting a known problem.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Computer Security Interview Questions

How would you permanently remove the threat of data falling into the wrong hands?

1 Answers  


What are accessories in computer?

0 Answers  


What is SSL and why is it not enough when it comes to encryption?

1 Answers  


What is the Three-way handshake? How can it be used to create a DOS attack?

1 Answers  


You are remoted in to a headless system in a remote area. You have no physical access to the hardware and you need to perform an OS installation. What do you do?

1 Answers  


What is database in a computer?

0 Answers  


Is a console a computer?

0 Answers  


 You see a user logging in as root to perform basic functions. Is this a problem?

1 Answers  


What is the difference between a virus and a trojan?

0 Answers   Tavant Technologies, Zensar,


 How would you compromise an “Office Workstation” at a hotel?

1 Answers  


You find out that there is an active problem on your network. You can fix it, but it is out of your jurisdiction. What do you do?

1 Answers  


What is dora process in DHCP and how it works?

0 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)