Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


 How would you compromise an “Office Workstation” at a hotel?



 How would you compromise an “Office Workstation” at a hotel?..

Answer / chaitanya

Considering how infected these typically are, I wouldn’t touch one with a 10ft pole. That being said, a USB keylogger is easy to fit into the back of these systems without much notice while an autorun program would be able to run quickly and quietly leaving behind software to do the dirty work. In essence, it’s open season on exploits in this type of environment.

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More Computer Security Interview Questions

What is the most commonly used computer application?

0 Answers  


 What is the difference between an HIDS and a NIDS?

1 Answers  


 How would you compromise an “Office Workstation” at a hotel?

1 Answers  


A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?

0 Answers  


 What are salted hashes?

1 Answers  


What is database in a computer?

0 Answers  


What is the difference between closed-source and open-source? Which is better?

1 Answers  


What is a driver in computer?

0 Answers  


 What is Exfiltration?

0 Answers  


What is the CIA triangle?

1 Answers  


 What is the Chain of Custody?

1 Answers  


How would you judge if a remote server is running IIS or Apache?

2 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)