Security Interview Questions
Questions Answers Views Company eMail

 Why would you want to use SSH from a Windows pc?

1 5865

What’s the difference between Symmetric and Asymmetric encryption?

1 3250

What is SSL and why is it not enough when it comes to encryption?

1 5973

 How would you find out what a POST code means?

1 3482

 What is the difference between a Black Hat and a White Hat?

1 2872

You need to reset a password-protected BIOS configuration. What do you do?

1 2882

What is XSS?

1 2874

How would you login to Active Directory from a Linux or Mac box?

1469

 What are salted hashes?

1 4615

What do you think of social networking sites such as Facebook and LinkedIn?

1 3056

What are the three ways to authenticate a person?

1 5315

How would you judge if a remote server is running IIS or Apache?

2 8467

What is data protection in transit vs data protection at rest?

1 3648

 You see a user logging in as root to perform basic functions. Is this a problem?

1 5456

How do you protect your home Wireless Access Point?

1 2897


Un-Answered Questions { Security }

How do I fake posts to usenet?

1


explain step by step role design process in sap security

606


I’m the CEO of a Fortune 500 company. I make more in an afternoon than you make in a year. I don’t care about this stupid security stuff, it just costs time and money and slows everything down. Why should I care about this junk?

1505


How do hackers hack passwords?

566


What are some irc channels of interest to hackers?

1


Which payphones will a red box work on?

1


What is database in a computer?

751


How do I break out of a restricted shell?

1


 What is footprinting in ethical hacking? What is the techniques used for footprinting?

1183


what is the use of scul transaction in sap security in ecc server?

832


How do I crack vms passwords?

1


What is the difference between a virus and a trojan?

776


Does indexing slow down computer?

795


What tools do real hackers use?

571


What is password shadowing?

1