|
INTERVIEW QUESTIONS
MAIL MANAGEMENT SOFTWARE
MAILPROTECTOR
DETAILS
Question: What is the difference between a Vulnerability and an Exploit?
Answer: A lot of people would say that they are the same thing, and in a sense they would be right. However, one is a potential problem while the other is an active problem. Think of it like this: You have a shed with a broken lock where it won’t latch properly. In some areas such as major cities, that would be a major problem that needs to be resolved immediately, while in others like rural areas its more of a nuisance that can be fixed when you get around to it. In both scenarios it would be a vulnerability, while the major cities shed would be an example of an exploit – there are people in the area, actively exploiting a known problem.
|
|
|
Category |
Mailprotector Interview Questions & Answers -
Exam Mode /
Learning Mode
|
Rating |
(0.2) By 9563 users |
Added on |
8/8/2016 |
Views |
69180 |
Rate it! |
|
|
Question:
What is the difference between a Vulnerability and an Exploit?
Answer:
A lot of people would say that they are the same thing, and in a sense they would be right. However, one is a potential problem while the other is an active problem. Think of it like this: You have a shed with a broken lock where it won’t latch properly. In some areas such as major cities, that would be a major problem that needs to be resolved immediately, while in others like rural areas its more of a nuisance that can be fixed when you get around to it. In both scenarios it would be a vulnerability, while the major cities shed would be an example of an exploit – there are people in the area, actively exploiting a known problem. Source: CoolInterview.com
If you have the better answer, then send it to us. We will display your answer after the approval.
Rules to Post Answers in CoolInterview.com:-
- There should not be any Spelling Mistakes.
- There should not be any Gramatical Errors.
- Answers must not contain any bad words.
- Answers should not be the repeat of same answer, already approved.
- Answer should be complete in itself.
|
|
Related Questions |
View Answer |
|
What is the difference between an HIDS (Host Intrusion Detection System) and a NIDS (Network Intrusion Detection System)?
|
View Answer
|
|
What is the CIA triangle?
|
View Answer
|
|
why is it easier to break into a Windows local account than an AD account?
|
View Answer
|
|
What is an easy way to configure a network to allow only a single computer to login on a particular jack?
|
View Answer
|
|
How do you protect your home Wireless Access Point?
|
View Answer
|
|
What is data protection in transit vs data protection at rest?
|
View Answer
|
|
How to judge if a remote server is running IIS or Apache?
|
View Answer
|
|
What are the three ways to authenticate a person?
|
View Answer
|
|
What do you think of social networking sites such as Facebook and LinkedIn in the context of data Security?
|
View Answer
|
|
How to reset a password-protected BIOS configuration?
|
View Answer
|
|
What is the difference between a Black Hat and a White Hat?
|
View Answer
|
|
How would you find out what a POST code means?
|
View Answer
|
|
What is SSL and why is it not enough when it comes to encryption?
|
View Answer
|
|
What?s the difference between Symmetric and Asymmetric encryption?
|
View Answer
|
|
Why would you want to use SSH from a Windows pc?
|
View Answer
|
|
Why to do need to be concerned about our Mail Security?
|
View Answer
|
Please Note: We keep on updating better answers to this site. In case you are looking for Jobs, Pls Click Here Vyoms.com - Best Freshers & Experienced Jobs Website.
View All Mailprotector Interview Questions & Answers - Exam Mode /
Learning Mode
|