Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


 What is the difference between a Black Hat and a White Hat?



 What is the difference between a Black Hat and a White Hat?..

Answer / chaitanya

This particular question can lead into a major philosophical debate about freedom of information, and if something is implemented in a deliberately broken way it isn’t actually breaking into it, etc etc. The one I’ve heard the most is the classic Jedi example – same tools, different ideologies. Personally, with the people I know that have worked on both sides of the line it comes down to this – the difference between a Black Hat and a White Hat .

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More Computer Security Interview Questions

You are an employee for a tech department in a non-management position. A high-level executive demands that you break protocol and allow him to use his home laptop at work. What do you do?

1 Answers  


How would you judge if a remote server is running IIS or Apache?

2 Answers  


What’s better, a red team or a blue team?

1 Answers  


What are the three ways to authenticate a person?

1 Answers  


What do you think of social networking sites such as Facebook and LinkedIn?

1 Answers  


What is the difference between closed-source and open-source? Which is better?

1 Answers  


What is the Three-way handshake? How can it be used to create a DOS attack?

1 Answers  


How would you login to Active Directory from a Linux or Mac box?

0 Answers  


What is the CIA triangle?

1 Answers  


Why are internal threats oftentimes more successful than external threats?

1 Answers  


 What is the difference between a vulnerability and an exploit?

1 Answers  


How would you permanently remove the threat of data falling into the wrong hands?

1 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)