Guest User

Untitled

a guest
Jul 18th, 2018
93
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.22 KB | None | 0 0
  1. Who do you look up to within the field of Information Security? Why?
  2. Where do you get your security news from?
  3. If you had to both encrypt and compress data during transmission, which would you do first, and why?
  4. What’s the difference between symmetric and public-key cryptography?
  5. In public-key Cryptography you have a public and a private key, and you often perform both encryption and signing functions. Which key is used for which function?
  6. What kind of network do you have at home?
  7. What are the advantages offered by bug bounty programs over normal testing practices?
  8. What are your first three steps when securing a linux server?
  9. What are your first three steps when securing a windows server?
  10. Who’s more dangerous to an organization, insiders or outsiders?
  11. Why is DNS monitoring important?
  12. What port does ping work over? 
  13. Do you prefer filtered ports or closed ports on your firewall?
  14. How exactly does traceroute/tracert work at the protocol level?
  15. What are Linux’s strengths and weaknesses vs. Windows?
  16. Cryptographically speaking, what is the main method of building a shared secret over a public medium?
  17. What’s the difference between diffie-hellman and RSA?
  18. What kind of attack is a standard diffie-hellman exchange vulnerable to?
Add Comment
Please, Sign In to add comment