Security Interview Questions
Questions Answers Views Company eMail

 Why would you want to use SSH from a Windows pc?

1 3127

What’s the difference between Symmetric and Asymmetric encryption?

1 1613

What is SSL and why is it not enough when it comes to encryption?

1 4109




 How would you find out what a POST code means?

1 1575

 What is the difference between a Black Hat and a White Hat?

1 1374

You need to reset a password-protected BIOS configuration. What do you do?

1 1301

What is XSS?

1 1281

How would you login to Active Directory from a Linux or Mac box?

634

 What are salted hashes?

1 1213

What do you think of social networking sites such as Facebook and LinkedIn?

1 1464

What are the three ways to authenticate a person?

1 3032

How would you judge if a remote server is running IIS or Apache?

2 3672

What is data protection in transit vs data protection at rest?

1 2062

 You see a user logging in as root to perform basic functions. Is this a problem?

1 2527

How do you protect your home Wireless Access Point?

1 1211







Un-Answered Questions { Security }

How do I access the password file under unix?

1


what is the role in sap security?

300


What are some irc channels of interest to hackers?

1


What is nis/yp?

1


What is a black box?

1






 What is Exfiltration?

773


How do I break out of a restricted shell?

1


What software do hackers use?

16


How do I gain root from a suid script or program?

1


A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?

2227


What is a trojan/worm/virus?

1


What are the 3 types of hackers?

17


I’m the CEO of a Fortune 500 company. I make more in an afternoon than you make in a year. I don’t care about this stupid security stuff, it just costs time and money and slows everything down. Why should I care about this junk?

718


what is the use of scul transaction in sap security in ecc server?

691


What is a ringback number?

1