Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Security Interview Questions
Questions Answers Views Company eMail

 Why would you want to use SSH from a Windows pc?

1 6430

What’s the difference between Symmetric and Asymmetric encryption?

1 3658

What is SSL and why is it not enough when it comes to encryption?

1 6420

 How would you find out what a POST code means?

1 3919

 What is the difference between a Black Hat and a White Hat?

1 3243

You need to reset a password-protected BIOS configuration. What do you do?

1 3374

What is XSS?

1 3277

How would you login to Active Directory from a Linux or Mac box?

1727

 What are salted hashes?

1 5050

What do you think of social networking sites such as Facebook and LinkedIn?

1 3466

What are the three ways to authenticate a person?

1 5752

How would you judge if a remote server is running IIS or Apache?

2 9005

What is data protection in transit vs data protection at rest?

1 4022

 You see a user logging in as root to perform basic functions. Is this a problem?

1 5809

How do you protect your home Wireless Access Point?

1 3355


Un-Answered Questions { Security }

How do I access the password file under unix?

1


What is nis/yp?

1


What are the most common computer applications?

846


What is a table in computer?

884


1. Assume that passwords are selected from four-character combination of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second. a. Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to recover the correct password? b. Assuming feedback to the adversary flagging an error as each incorrect character is entered, what is the expected time to discover the correct password?

2100


How do I modify the irc client to hide my real username?

1


How do I gain root from a suid script or program?

1


What is the difference between a virus and a trojan?

936


What laptops hackers use?

743


 What is footprinting in ethical hacking? What is the techniques used for footprinting?

1334


A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?

4246


What is the most commonly used computer application?

876


What os do hackers use?

825


 Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?

1245


explain step by step role design process in sap security

608