Security Interview Questions
Questions Answers Views Company eMail

What are the types of computer based social engineering attacks? Explain what is Phishing?

1 2499

Explain what is Network Sniffing?

1 1930

Explain what is ARP Spoofing or ARP poisoning?

1 2367

How you can avoid or prevent ARP poisoning?

1 2233

What is Mac Flooding?

1 2511

 Explain what is DHCP Rogue Server?

1 2133

Explain what is Cross-site scripting and what are the types of Cross site scripting?

1 2195

Explain what is Burp Suite, what are the tools it consist of?

1 8458

Explain what is Pharming and Defacement?

1 3035

Explain how you can stop your website getting hacked?

2 2410

Explain what is Keylogger Trojan?

1 1999

Explain what is Enumeration?

1 2234

Explain what is NTP?

1 2180

 Explain what is MIB?

1 2265

 Mention what are the types of password cracking techniques?

1 2069


Un-Answered Questions { Security }

I’m the CEO of a Fortune 500 company. I make more in an afternoon than you make in a year. I don’t care about this stupid security stuff, it just costs time and money and slows everything down. Why should I care about this junk?

1340


How do I hack chanop on irc?

1


What is database in a computer?

602


I run an SMB. I have 4 people in my entire company and a web-based store. I don’t have the time, patience or manpower to have a computer guy. Why should I care about exploits and computer jibberish?

1682


How do I access the password file under vms?

1






What is a table in computer?

546


What software do hackers use?

448


What are the 3 types of hackers?

482


 What is footprinting in ethical hacking? What is the techniques used for footprinting?

1072


What is a spooler on a computer?

562


What is a trojan/worm/virus?

1


What is a hacking loop?

1


How do I build a red box?

1


what is the use of scul transaction in sap security in ecc server?

830


What are the most common computer applications?

552