Security Interview Questions
Questions Answers Views Company eMail

What are the types of computer based social engineering attacks? Explain what is Phishing?

1 2502

Explain what is Network Sniffing?

1 1932

Explain what is ARP Spoofing or ARP poisoning?

1 2370

How you can avoid or prevent ARP poisoning?

1 2235

What is Mac Flooding?

1 2511

 Explain what is DHCP Rogue Server?

1 2134

Explain what is Cross-site scripting and what are the types of Cross site scripting?

1 2198

Explain what is Burp Suite, what are the tools it consist of?

1 8458

Explain what is Pharming and Defacement?

1 3039

Explain how you can stop your website getting hacked?

2 2412

Explain what is Keylogger Trojan?

1 2000

Explain what is Enumeration?

1 2234

Explain what is NTP?

1 2182

 Explain what is MIB?

1 2267

 Mention what are the types of password cracking techniques?

1 2069


Un-Answered Questions { Security }

What laptops do hackers use?

507


What's Security Tests

75


What is a hacking loop?

1


 What is footprinting in ethical hacking? What is the techniques used for footprinting?

1072


What is a red box?

1






How do I gain root from a suid script or program?

1


What are accessories in computer?

540


What is nis/yp?

1


What laptops hackers use?

462


I’m the CEO of a Fortune 500 company. I make more in an afternoon than you make in a year. I don’t care about this stupid security stuff, it just costs time and money and slows everything down. Why should I care about this junk?

1344


What is password shadowing?

1


What are the most common computer applications?

552


what is the role in sap security?

384


 What is Exfiltration?

1422


What is meant by computer application?

546