Security Interview Questions
Questions Answers Views Company eMail

 Why would you want to use SSH from a Windows pc?

1 3038

What’s the difference between Symmetric and Asymmetric encryption?

1 1570

What is SSL and why is it not enough when it comes to encryption?

1 4040

 How would you find out what a POST code means?

1 1548

 What is the difference between a Black Hat and a White Hat?

1 1351

You need to reset a password-protected BIOS configuration. What do you do?

1 1261

What is XSS?

1 1236

How would you login to Active Directory from a Linux or Mac box?


 What are salted hashes?

1 1162

What do you think of social networking sites such as Facebook and LinkedIn?

1 1414

What are the three ways to authenticate a person?

1 2940

How would you judge if a remote server is running IIS or Apache?

2 3554

What is data protection in transit vs data protection at rest?

1 2004

 You see a user logging in as root to perform basic functions. Is this a problem?

1 2472

How do you protect your home Wireless Access Point?

1 1183

Un-Answered Questions { Security }

What is a ringback number?


A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?


What is a black box?


What are some irc channels of interest to hackers?


 Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?


What is a red box?


What is a hacking loop?


How do I crack vms passwords?


What is dora process in DHCP and how it works?


What's Security Tests


What is the difference between a virus and a trojan?


I run an SMB. I have 4 people in my entire company and a web-based store. I don’t have the time, patience or manpower to have a computer guy. Why should I care about exploits and computer jibberish?


What is a trojan/worm/virus?


Which payphones will a red box work on?


How do I crack unix passwords?