Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Security Interview Questions
Questions Answers Views Company eMail

What is an easy way to configure a network to allow only a single computer to login on a particular jack?

1 7170

You are remoted in to a headless system in a remote area. You have no physical access to the hardware and you need to perform an OS installation. What do you do?

1 5157

On a Windows network, why is it easier to break into a local account than an AD account?

1 6856

 What is the difference between an HIDS and a NIDS?

1 7726

What is the CIA triangle?

1 2712

You find out that there is an active problem on your network. You can fix it, but it is out of your jurisdiction. What do you do?

1 4382

You are an employee for a tech department in a non-management position. A high-level executive demands that you break protocol and allow him to use his home laptop at work. What do you do?

1 3353

 What is the difference between a vulnerability and an exploit?

1 3099

 How would you compromise an “Office Workstation” at a hotel?

1 5700

What is worse in Firewall Detection, a false negative or a false positive? And why?

1 8743

What’s better, a red team or a blue team?

1 2870

 What’s the difference between a White Box test and a Black Box test?

2 3288

 What is the difference between Information Protection and Information Assurance?

1 2893

 How would you lock down a mobile device?

1 2591

What is the difference between closed-source and open-source? Which is better?

1 3065


Un-Answered Questions { Security }

What is the difference between a virus and a trojan?

1020


How do I hack chanop on irc?

1


What laptops hackers use?

810


What are some irc channels of interest to hackers?

1


What are the most common computer applications?

937


How do I gain root from a suid script or program?

1


 What is Exfiltration?

1863


How do I crack unix passwords?

1


How do I access the password file under unix?

1


What is a black box?

1


How do I break out of a restricted shell?

1


What is data source in computer?

984


what is the use of scul transaction in sap security in ecc server?

832


What is a trojan/worm/virus?

1


What is a spooler on a computer?

1135