If you
say yes – then make sure you have read it because they might ask you leading
question from there.
3. Differentiate between Vulnerability, Threat and Risk and give any real life analogy?
4. How you Secure you Windows and Linux Server ?
5. What is the difference between filter and blocked ports ?
6. What ports does Ping uses ?
7. Why it is important to monitor DNS ?
8. What is the difference between MD5 , SHA1 and AES ?
9. If you have to store a password in the database how will you store it ?
10. What is a salt in Security?