Security Interview Questions
Questions Answers Views Company eMail

Who is the most dangerous hacker?

481

What laptops hackers use?

462

Who is the best hacker in the world?

506

What laptops do hackers use?

507

What tools do real hackers use?

449

What are the 3 types of hackers?

482

What os do hackers use?

488

How do hackers hack passwords?

436

What software do hackers use?

448

What is a driver in computer?

536

What is a table in computer?

545

What is data source in computer?

554

What is database in a computer?

602

Does indexing slow down computer?

574

Is a console a computer?

553


Un-Answered Questions { Security }

1. Assume that passwords are selected from four-character combination of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second. a. Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to recover the correct password? b. Assuming feedback to the adversary flagging an error as each incorrect character is entered, what is the expected time to discover the correct password?

1672


 What is Exfiltration?

1418


What is a ringback number?

1


Who is the most dangerous hacker?

481


What is a spooler on a computer?

560






What tools do real hackers use?

449


what is the role in sap security?

384


What is nis/yp?

1


What are the 3 types of hackers?

482


What is dora process in DHCP and how it works?

2438


What is data source in computer?

554


How do I gain root from a suid script or program?

1


What laptops do hackers use?

507


How do I crack vms passwords?

1


How do I access the password file under vms?

1