Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Security Interview Questions
Questions Answers Views Company eMail

 Why would you want to use SSH from a Windows pc?

1 6404

What’s the difference between Symmetric and Asymmetric encryption?

1 3641

What is SSL and why is it not enough when it comes to encryption?

1 6388

 How would you find out what a POST code means?

1 3891

 What is the difference between a Black Hat and a White Hat?

1 3226

You need to reset a password-protected BIOS configuration. What do you do?

1 3352

What is XSS?

1 3258

How would you login to Active Directory from a Linux or Mac box?

1718

 What are salted hashes?

1 5030

What do you think of social networking sites such as Facebook and LinkedIn?

1 3441

What are the three ways to authenticate a person?

1 5730

How would you judge if a remote server is running IIS or Apache?

2 8965

What is data protection in transit vs data protection at rest?

1 4005

 You see a user logging in as root to perform basic functions. Is this a problem?

1 5793

How do you protect your home Wireless Access Point?

1 3340


Un-Answered Questions { Security }

Is a console a computer?

893


How do I access the password file under vms?

1


explain step by step role design process in sap security

608


 Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?

1239


What is a blue box?

1


I’m the CEO of a Fortune 500 company. I make more in an afternoon than you make in a year. I don’t care about this stupid security stuff, it just costs time and money and slows everything down. Why should I care about this junk?

1663


What is a spooler on a computer?

1003


What is a ringback number?

1


What is a hacking loop?

1


What is nis/yp?

1


What is a table in computer?

873


 What is footprinting in ethical hacking? What is the techniques used for footprinting?

1323


How do I gain root from a suid script or program?

1


What is meant by computer application?

842


1. Assume that passwords are selected from four-character combination of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second. a. Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to recover the correct password? b. Assuming feedback to the adversary flagging an error as each incorrect character is entered, what is the expected time to discover the correct password?

2091