Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Security Interview Questions
Questions Answers Views Company eMail

What is an easy way to configure a network to allow only a single computer to login on a particular jack?

1 7105

You are remoted in to a headless system in a remote area. You have no physical access to the hardware and you need to perform an OS installation. What do you do?

1 5069

On a Windows network, why is it easier to break into a local account than an AD account?

1 6788

 What is the difference between an HIDS and a NIDS?

1 7618

What is the CIA triangle?

1 2645

You find out that there is an active problem on your network. You can fix it, but it is out of your jurisdiction. What do you do?

1 4308

You are an employee for a tech department in a non-management position. A high-level executive demands that you break protocol and allow him to use his home laptop at work. What do you do?

1 3256

 What is the difference between a vulnerability and an exploit?

1 2998

 How would you compromise an “Office Workstation” at a hotel?

1 5627

What is worse in Firewall Detection, a false negative or a false positive? And why?

1 8668

What’s better, a red team or a blue team?

1 2785

 What’s the difference between a White Box test and a Black Box test?

2 3192

 What is the difference between Information Protection and Information Assurance?

1 2822

 How would you lock down a mobile device?

1 2531

What is the difference between closed-source and open-source? Which is better?

1 2984


Un-Answered Questions { Security }

Do blue boxes still work?

1


What is password shadowing?

1


Which payphones will a red box work on?

1


Who is the best hacker in the world?

911


What is a trojan/worm/virus?

1


A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?

4284


How do I gain root from a suid script or program?

1


How do I modify the irc client to hide my real username?

1


Is a console a computer?

960


What is a ringback number?

1


What is a driver in computer?

907


What are some irc channels of interest to hackers?

1


What are the most common computer applications?

892


 What is footprinting in ethical hacking? What is the techniques used for footprinting?

1371


What tools do real hackers use?

811