Security Interview Questions
Questions Answers Views Company eMail

 Why would you want to use SSH from a Windows pc?

1 5442

What’s the difference between Symmetric and Asymmetric encryption?

1 2902

What is SSL and why is it not enough when it comes to encryption?

1 5598

 How would you find out what a POST code means?

1 3094

 What is the difference between a Black Hat and a White Hat?

1 2536

You need to reset a password-protected BIOS configuration. What do you do?

1 2571

What is XSS?

1 2527

How would you login to Active Directory from a Linux or Mac box?

1304

 What are salted hashes?

1 4207

What do you think of social networking sites such as Facebook and LinkedIn?

1 2757

What are the three ways to authenticate a person?

1 4907

How would you judge if a remote server is running IIS or Apache?

2 7855

What is data protection in transit vs data protection at rest?

1 3322

 You see a user logging in as root to perform basic functions. Is this a problem?

1 4996

How do you protect your home Wireless Access Point?

1 2570


Un-Answered Questions { Security }

What is the most commonly used computer application?

540


What is a trojan/worm/virus?

1


What are some irc channels of interest to hackers?

1


Is a console a computer?

556


what is the use of scul transaction in sap security in ecc server?

830






What is a blue box?

1


What is a black box?

1


How would you login to Active Directory from a Linux or Mac box?

1304


What is nis/yp?

1


What laptops hackers use?

462


What is database in a computer?

603


What is data source in computer?

558


What is meant by computer application?

546


What is a table in computer?

546


 What is Exfiltration?

1422