Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Security Interview Questions
Questions Answers Views Company eMail

What is an easy way to configure a network to allow only a single computer to login on a particular jack?

1 7159

You are remoted in to a headless system in a remote area. You have no physical access to the hardware and you need to perform an OS installation. What do you do?

1 5145

On a Windows network, why is it easier to break into a local account than an AD account?

1 6846

 What is the difference between an HIDS and a NIDS?

1 7712

What is the CIA triangle?

1 2705

You find out that there is an active problem on your network. You can fix it, but it is out of your jurisdiction. What do you do?

1 4375

You are an employee for a tech department in a non-management position. A high-level executive demands that you break protocol and allow him to use his home laptop at work. What do you do?

1 3338

 What is the difference between a vulnerability and an exploit?

1 3086

 How would you compromise an “Office Workstation” at a hotel?

1 5682

What is worse in Firewall Detection, a false negative or a false positive? And why?

1 8732

What’s better, a red team or a blue team?

1 2864

 What’s the difference between a White Box test and a Black Box test?

2 3271

 What is the difference between Information Protection and Information Assurance?

1 2881

 How would you lock down a mobile device?

1 2580

What is the difference between closed-source and open-source? Which is better?

1 3047


Un-Answered Questions { Security }

Which payphones will a red box work on?

1


How do I modify the irc client to hide my real username?

1


How do I crack vms passwords?

1


How do I build a red box?

1


How do I break out of a restricted shell?

1


How do I crack unix passwords?

1


What is a black box?

1


Is a console a computer?

991


What is a driver in computer?

947


 What is Exfiltration?

1857


What laptops hackers use?

802


What is the most commonly used computer application?

953


How do I access the password file under vms?

1


 Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?

1336


What are the most common computer applications?

931