Security Interview Questions
Questions Answers Views Company eMail

Define the term “DMZ” as it pertains to network security, and name three different common network devices that are typically found there?

1 2085

Will Norton Mobile Security slow down my smartphone’s performance?

1 2321

What are the System Requirements for Norton Mobile Security?

1 1557

How do users get exposed to mobile threats?

1 1632

What if I buy a new phone – will my subscription transfer?

1 1516

How many devices can I protect?

1 1771

What happens if I exceed the device limit? Can I get permission to add more devices if I exceed my limit?

1 1644

Which browsers does the Web Protection feature of Norton Mobile Security support?

1 1699

 Explain what is Ethical Hacking?

1 2007

List out some of the common tools used by Ethical hackers?

1 2081

 What are the types of ethical hackers?

1 2627

 What is footprinting in ethical hacking? What is the techniques used for footprinting?

1073

Explain what is Brute Force Hack?

1 1814

 Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?

960

Explain what is SQL injection?

1 2254


Un-Answered Questions { Security }

what is the role in sap security?

384


What laptops hackers use?

462


1. Assume that passwords are selected from four-character combination of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second. a. Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to recover the correct password? b. Assuming feedback to the adversary flagging an error as each incorrect character is entered, what is the expected time to discover the correct password?

1675


How do I crack vms passwords?

1


What is the difference between a virus and a trojan?

617






explain step by step role design process in sap security

600


Which payphones will a red box work on?

1


What is a black box?

1


How do I gain root from a suid script or program?

1


What is the most commonly used computer application?

540


Do blue boxes still work?

1


How would you login to Active Directory from a Linux or Mac box?

1304


What is password shadowing?

1


What is a table in computer?

546


What is meant by computer application?

546