Security Interview Questions
- 0of 0 votes
AnswersWhat are some ways to crack a cryptohash? Is your method efficient, or are there better ways?
- ootah November 14, 2013 in United States| Report Duplicate | Flag | PURGE
Citrix System Inc Software Engineer / Developer Security - 0of 0 votes
AnswersHow security is provided to each tab in google chrome? if there are multiple tabs open in Chrome, then how respective request goes in respective tab? (meaning the request of different tabs do not get mixed, how?)
- kaustubh deshmukh September 18, 2012 in India| Report Duplicate | Flag | PURGE
Symantec Associate Security - 0of 0 votes
AnswersWhy is it important to add a salt to a user's password before storing its digest?
- gigo April 05, 2012 in India| Report Duplicate | Flag | PURGE
RSA Software Engineer / Developer Security - 0of 0 votes
AnswersExplain what stack overflow and heap overflow are, and how they impact security.
- s3 October 31, 2009| Report Duplicate | Flag | PURGE
Qualcomm Product Security Engineer Security - 0of 0 votes
AnswersImagine a system where gas service to homes is controlled by a server of a service provider. How would you create a secure protocol for transfer of msgs. between this server and the apparatus at every home?
- s3 October 31, 2009
Assumption - The apparatus is secure and couldn't be hacked.| Report Duplicate | Flag | PURGE
Qualcomm Product Security Engineer Security - 0of 0 votes
AnswersWho are virus writers? Why do they write viruses?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Security - 0of 0 votes
AnswersIf you were designing new anti-virus technology, what would you implement?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Ideas Security - 0of 0 votes
AnswersHow can a virtual OS can be compromised?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Security - 0of 0 votes
AnswersWhat sort of test setup would you require for understanding a virus?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Security - 0of 0 votes
AnswersWhat are the characteristics that you look for in an anti-virus engine?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Security - 0of 0 votes
AnswersCan Linux be compromised? How secure is Linux? How would you compromise a *NIX system?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Linux Kernel Security - 0of 0 votes
AnswersWhat are the characteristics that you look for in an anti-virus engine?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Security - 0of 0 votes
AnswersCan Linux be compromised? How secure is Linux? How would you compromise a *NIX system?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Security - 0of 0 votes
AnswersDescribe your experiences using different anti-virus technologies.
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Security - 0of 0 votes
AnswersPlease explain the Windows PE executable standard and how a virus infects it.
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Security