What is the difference between closed-source and open-source? Which is better?



What is the difference between closed-source and open-source? Which is better?..

Answer / chaitanya

Closed-source is a typical commercially developed program. You receive an executable file which runs and does its job without the ability to look far under the hood. Open-source however provides the source code to be able to inspect everything it does, as well as be able to make changes yourself and recompile the code. Both have arguments for and against them, most have to do with audits and accountability. Closed-source advocates claim that open-source causes issues because everybody can see exactly how it works and exploit weaknesses in the program. Open-source counter saying that because closed-source programs don’t provide ways to fully check them out, its difficult to find and troubleshoot issues in the programs beyond a certain level.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Computer Security Interview Questions

What is the CIA triangle?

1 Answers  


 What is the Chain of Custody?

1 Answers  


You find out that there is an active problem on your network. You can fix it, but it is out of your jurisdiction. What do you do?

1 Answers  


I run an SMB. I have 4 people in my entire company and a web-based store. I don’t have the time, patience or manpower to have a computer guy. Why should I care about exploits and computer jibberish?

0 Answers  


What is XSS?

1 Answers  






What are the most common computer applications?

0 Answers  


 What is the difference between Information Protection and Information Assurance?

1 Answers  


 How would you lock down a mobile device?

1 Answers  


 Why is deleted data not truly gone when you delete it?

1 Answers  


A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?

0 Answers  


You are an employee for a tech department in a non-management position. A high-level executive demands that you break protocol and allow him to use his home laptop at work. What do you do?

1 Answers  


What is the most commonly used computer application?

0 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)