Follow Our FB Page << >> for Daily Laughter. We Post Funny, Viral, Comedy Videos, Memes, Vines...

Security Interview Questions
Questions Answers Views Company eMail

 Why would you want to use SSH from a Windows pc?

1 5130

What’s the difference between Symmetric and Asymmetric encryption?

1 2635

What is SSL and why is it not enough when it comes to encryption?

1 5319

 How would you find out what a POST code means?

1 2765

 What is the difference between a Black Hat and a White Hat?

1 2294

You need to reset a password-protected BIOS configuration. What do you do?

1 2299

What is XSS?

1 2260

How would you login to Active Directory from a Linux or Mac box?


 What are salted hashes?

1 3641

What do you think of social networking sites such as Facebook and LinkedIn?

1 2498

What are the three ways to authenticate a person?

1 4604

How would you judge if a remote server is running IIS or Apache?

2 7003

What is data protection in transit vs data protection at rest?

1 3056

 You see a user logging in as root to perform basic functions. Is this a problem?

1 4396

How do you protect your home Wireless Access Point?

1 2286

Un-Answered Questions { Security }

What are some irc channels of interest to hackers?


What is meant by computer application?


How do I fake posts to usenet?


A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?


How do I break out of a restricted shell?


Who is the best hacker in the world?


What is a red box?


What is a ringback number?


What is a table in computer?


What software do hackers use?


What is a black box?


What's Security Tests


What tools do real hackers use?


What is nis/yp?


I run an SMB. I have 4 people in my entire company and a web-based store. I don’t have the time, patience or manpower to have a computer guy. Why should I care about exploits and computer jibberish?