This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What is Ransomware? |
|
Answer» Ransomware: Ransomware is a type of malware that usually encrypt all the files in a target’s computer and threatens to publish the critical data unless a ransom (money) is paid. |
|
| 2. |
WMt is SSL? |
|
Answer» The most common Cryptographic protocol is Secure Sockets Layers (SSL). SSL is a hybrid encryption protocol for securing transactions over the Internet. It is based on a public key cryptography process. |
|
| 3. |
What is proxy server? Explain its working |
|
Answer» A proxy server acts as an intermediary between the end users and a web server. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resources available from a different server. The proxy server examines the request, checks authenticity and grants the request based on that. Proxy servers typically keep the frequently visited site addresses in its cache which leads to improved response time. |
|
| 4. |
PKI means(a) Public Key Instruction(b) Public Key Infrastructure(c) Public Key Interface(d) Public Key Interrupt |
|
Answer» (b) Public Key Infrastructure |
|
| 5. |
A digital signature has ………. algorithm for encrypting and decrypting the message.(i) SHA-1(ii) SHA-2 (iii) PGP(iv) X.509(a) (i),(ii)(b) (ii), (iii)(c) (iii), (iv)(d) (i), (iv) |
|
Answer» Answer is (a) (i),(ii) |
|
| 6. |
There are …… kinds of security authentication protocols widely used in E-commerce.(a) 2 (b) 3 (c) 4 (d) 5 |
|
Answer» There are 2 kinds of security authentication protocols widely used in E-commerce. |
|
| 7. |
Suppose u, v = 10, 5 before the assignment. What are the values of u and v after the sequence of assignments?1. u : = v 2. v : = u (a) u, v = 5, 5 (b) u, v = 10, 5(c) u, v = 5, 10 (d) u, v = 10, 10 |
|
Answer» (a) u, v = 5, 5 |
|
| 8. |
Identify the typography.(a) google.com(b) facebook.com(c) goggle.com(d) gmail.com |
|
Answer» (c) goggle.com |
|
| 9. |
What is hacking? |
|
Answer» Hacking is intruding into a computer system to steal personal data without the owner’s permission or knowledge (like to steal a password). It is also gaining unauthorized access to a computer system, and altering its contents. |
|
| 10. |
The most common cryptographic protocol is ……… |
|
Answer» Secure Socket Layer |
|
| 11. |
…….. is the intermediary between the end users and a web browser.(a) Firewall (b) Proxy server (c) Cookies (d) Warez |
|
Answer» (b) Proxy server |
|
| 12. |
Which of the following properties is true after the assignment (at line 3?1. – – i + j = 0 2. i, j : = i + 1, j – 1 3. – – ? (a) i + j > 0 (b) i + j < 0 (c) i + j = 0 (d) i = j |
|
Answer» Answer is (c) i + j = 0 |
|
| 13. |
The inputs and outputs are drawn using ………. boxes.(a) rectangular(b) diamond(c) Parallelogram(d) Oval |
|
Answer» (c) Parallelogram Parallelogram |
|
| 14. |
Statements composed of other statements are known as:(a) Simple Statements(b) Compound Statements(c) Conditional(d) Control flow |
|
Answer» (b) Compound Statements |
|
| 15. |
What is a Programming Language? |
|
Answer» 1. A programming language is a notation for expressing algorithms to be executed by computers. 2. Programs must obey the grammar of the programming language exactly. Ex. C, C++, python. |
|
| 16. |
The iterative statement is commonly known as a ……(a) loop(b) Case Analysis(c) Alternative(d) Conditional |
|
Answer» The iterative statement is commonly known as a loop |
|
| 17. |
Testing the loop condition and executing the loop body once is called ……..(a) alternative(b) conditional(c) Iteration(d) Decomposition |
|
Answer» (c) Iteration |
|
| 18. |
Which one of the following notations will be executed by computers?(a) Flow chart(b) Pseudocode(c) Programming languages(d) Compiler |
|
Answer» (c) Programming languages |
|
| 19. |
Which one of the following algorithmic notation is used for communication among people?(a) Flow chart(b) Pseudo code(c) PL(d) Interpreter |
|
Answer» (b) Pseudo code |
|
| 20. |
How many different notations are there for representing algorithms?(a) 2(b) 3(c) 4(d) 5 |
|
Answer» There are 3 notations for representing algorithms. |
|
| 21. |
If C1 is false and C2 is true, the compound statement(a) S1(b) S2 (c) S3 (d) none |
|
Answer» Answer is (b) S2 |
|
| 22. |
Which one of the following statement is used to alter the normal flow of control of the program?(a) Assignments(b) Control flow(c) Compound(d) both b & c |
|
Answer» (d) both b & c |
|
| 23. |
Explain encryption technology? |
|
Answer» Encryption technology: Encryption technology is an effective information security protection. It is defined as converting a Plaintext into meaningless Ciphertext using encryption algorithm thus ensuring the confidentiality of the data. The encryption or decryption process use a key to encrypt or decrypt the data. At present, two encryption technologies are widely used. They are symmetric key encryption system and an asymmetric key encryption system. Symmetric key encryption: The Data Encryption Standard (DES) is a Symmetric key data encryption method. It was introduced in America in the year 1976, by Federal Information Processing Standard (FIPS). DES is the typical block algorithm that takes a string of bits of cleartext (plaintext) with a fixed length and, through a series of complicated operations, transforms it into another encrypted text of the same length. DES also uses a key to customize the transformation, so that, in theory, the algorithm can only be deciphered by people who know the exact key that has been used for encryption. The DES key is apparently 64 bits, but in fact the algorithm uses only 56. The other eight bits are only used to verify the parity and then it is discarded. Today, it is considered that DES is not safe for many applications, mainly because of its relatively smaller key size (56-bit). But the key length can be easily increased by multiple use of the DES, described as Triple-DES, also known as TDES, 3DES or DESede. Asymmetric or Public key encryption: Asymmetric encryption also called as RSA (RivestShamir-Adleman) algorithm. It uses public- key authentication and digital signatures. Until 1970s, there were only symmetric cryptosystems in which transmitter and receiver must have the same key. This raises the problem of key exchange andJcey management. Unlike a symmetric encryption, the communicating parties need not know other’s private- key in asymmetric encryption. Each user generates their own key pair, which consists of a private key and a public key. A public-key encryption method is a method for converting a plaintext with a public key into a ciphertext from which the plaintext can be retrieved with a private key. |
|
| 24. |
Both conditional statement and iterative statement have a condition and a statement. How do they differ? |
|
Answer» Conditional Statement:
Iterative Statement:
|
|
| 25. |
Write the algorithm specification to find minimum of 2 numbers. |
|
Answer» Minimum (a, b) – – inputs : a, b – – outputs : result = a >1 b |
|
| 26. |
If C is false just before the loop, the control flows through(a) S1 ; S3 (b) S1 ; S2 ; S3 (c) S1 ; S2 ; S2 ; S2 ; S3 (d) S1 ; S2 ; S2 ; S2 ; S3 |
|
Answer» Answer is (a) S1 ; S3 |
|
| 27. |
Which one of the following statements are executed one after the other as written in the algorithm?(a) Sequential(b) Iterative (c) Conditional(d) Decisive |
|
Answer» (a) Sequential |
|
| 28. |
How many times the loop is iterated?i : = 0while i ≠ 5i : = i + 1(a) 4 (b) 5 (c) 6 (d) 0 |
|
Answer» 5 times the loop is iterated |
|
| 29. |
If C is true, S1 is executed in both the flowcharts, but S2 is executed in(a) (1) only(b) (2) only(c) both (1) and (2)(d) neither (1) nor (2) |
|
Answer» (a) (1) only |
|
| 30. |
Write short notes on NS2? |
|
Answer» NS2 is the abbreviation of NETWORK SIMULATOR version 2. It was considered explicitly for exploration in network communication and event-driven opensource simulator in computer. |
|
| 31. |
What is trace file? |
|
Answer» A significant output of simulation is the trace files. Trace files can document every incident that happened in the simulation and are used for examination. C++ and Object-oriented Tool Command Language (OTCL) and network monitoring. |
|
| 32. |
Explain various types of E-commerce threats? |
|
Answer» (i) Information leakage: The leakage of trade secrets in E-Commerce mainly includes two aspects: (a) the content of the transaction between the vendor and customer is stolen by the third party; (b) the documents provided by the merchant to the customer or vice versa are illegally used by the another. This intercepting and stealing of online documents is called information leakage. (ii) Tampering: E-Commerce has the problem of the authenticity and integrity of business information. When hackers grasp the data transmitted on the network, it can be falsified in the middle through various technical means, and then sent to the destination, thereby destroying the authenticity and integrity of the data. (iii) Payment frauds: Payment frauds have subsets like Friendly fraud (when customer demands false reclaim or refund), Clean fraud (when a stolen credit card is used to make a purchase Triangulation fraud (fake online shops offering cheapest price and collect credit card data) etc. (iv) Malicious code threats: Within an E-Commerce site, there are multiple vulnerable areas that can serve as an intrusion point for a hacker to gain payment and user information. Using malware, Cross Site Scripting or SQL Injection, an attacker will extract the credit card information and sell the acquired data on black markets. Fraud is then committed to extract the greatest value possible through E-Commerce transactions or ATM withdrawals, etc. (v) Distributed Denial of Service (DDoS) Attacks: It is a process of taking down an E-Commerce site by sending continious overwhelming request to its server. This attack will be conducted from numerous unidentified computers using botnet. This attack will slow down and make the server inoperative. DDoS attacks is also called as network flooding. (vi) Cyber Squatting: Cybers quatting is the illegal practice of registering an Internet domain name that might be wanted by another person in an intention to sell it later for a profit. |
|
| 33. |
Write about dimensions of E-Commerce Security? |
|
Answer» The following are some of the security elements involved in E-Commerce: 1. Authenticity: conforming genuineness of data shared. 2. Availability: prevention against data delay or removal. 3. Completeness: unification of all business information. 4. Confidentiality: protecting data against unauthorized disclosure. 5. Effectiveness: effective handling of hardware, software and data. 6. Integrity: prevention of the data being unaltered or modified. 7. Non-repudiation: prevention against violation agreement after the deal. 8. Privacy: prevention of customers’ personal data being used by others. 9. Reliability: providing a reliable identification of the individuals or businesses. 10. Review ability: capability of monitoring activities to audit and track the operations. |
|
| 34. |
Write about information leakage in E-Commerce? |
|
Answer» Information leakage: The leakage of trade secrets in E-Commerce mainly includes two aspects: 1. The content of the transaction between the vendor and customer is stolen by the third party; 2. The documents provided by the merchant to the customer or vice versa are illegally used by the another. This intercepting and stealing of online documents is called information leakage. |
|
| 35. |
……… is a secure payment protocol on the Internet. |
|
Answer» 3D secure is a secure payment protocol on the Internet. |
|
| 36. |
Write a note on PGP? |
|
Answer» Pretty Good Privacy (PGP): Phil Zimmermann developed PGP in 1991. It is a decentralized encryption program that provides cryptographic privacy and authentication for data communication. PGP encryption uses a serial combination of hashing, data compression, symmetric-key cryptography and asymmetric-key cryptography and works on the concept of “web of trust”. |
|
| 37. |
Explain 3D secure payment protocols? |
|
Answer» 3-D Secure is a secure payment protocol on the Internet. It was developed by Visa to increase the level of transaction security, and it has been adapted by MasterCard. It gives a better authentication of the holder of the payment card, during purchases made on websites. The basic concept of this (XML-based) protocol is to link the financial authorization process with an online authentication system. This authentication model comprise 3 domains (hence the name 3D) which are: 1. The Acquirer Domain 2. The Issuer Domain 3. The interoperability Domain. |
|
| 38. |
Identify the correct statements.(i) Pseudo code uses natural English for statements and conditions.(ii) Pseudo code notation is formal one.(iii) There is no need to follow the rules of the Programming language grammer(iv) It must be rigorous and correct.(a) (i) (ii) (iii)(b) (ii) (iii) (iv)(c) (i) (iii) (iv) (d) (i) (ii) (iii) (iv) |
|
Answer» (c) (i) (iii) (iv) |
|
| 39. |
PGP works on the concept of ……… |
|
Answer» “Web of trust” |
|
| 40. |
The SSL standard was developed by ………..(a) Mozilla(b) google (c) Netscape(d) Internet |
|
Answer» (c) Netscape |
|
| 41. |
Where is SSL located?(i) Transport layer(ii) Application layer(iii) Session layer(iv) Physical layer(v) Presenation layer(a) (i) and (ii)(b) (ii) and (iii) (c) (iii) and (iv)(d) (iv) and (v) |
|
Answer» (a) (i) and (ii) |
|
| 42. |
SSL was renamed as TLS in the year ……..(a) 1999(b) 2000(c) 2001(d) 2002 |
|
Answer» SSL was renamed as TLS in 2001 |
|
| 43. |
How many bits are used for parity check?(a) 2(b) 4 (c) 8 (d) 16 |
|
Answer» 8 bits are used for parity check |
|
| 44. |
RSA means …….. algorithm. |
|
Answer» Rivest-Shamir-Adleman |
|
| 45. |
Write a note on certification authorities (CA)? |
|
Answer» Digital certificates are issued by recognized Certification Authorities (CA). When someone requests a digital certificate, the authority verifies the identity of the requester, and if the requester fulfills all requirements, the authority issues it. When the sender uses a certificate to sign a document digitally, receiver can trust the digital signature because he trusts that CA has done their part verifying the sender’s identity. |
|
| 46. |
PGP stands for(a) Pretty Good Privacy(b)Pretty Good Person(c) Private Good Privacy(d) Private Good Person |
|
Answer» (a) Pretty Good Privacy |
|
| 47. |
In https://, ‘s’ stands for …….(a) safe(b) secure(c) socket(d) squatting |
|
Answer» In https://, ‘s’ stands for secure |
|
| 48. |
Which refers to unauthorized intrusion into a computer or a network?(a) Cracking (b) Hacking (c) Tampering(d) DDoS |
|
Answer» Hacking to unauthorized intrusion into a computer or a network |
|
| 49. |
Match the following(i) Authencity – 1. preventing data to be altered(ii) Integrity – 2. Conforming genuineness of data shared(iii) Reliability – 3. prevention against violation agreement after deal (iv) Non Repudiation – 4. reliable identification of ‘individual’(a) (i)-2 (ii)-1 (iii)-4 (iv)-3 (b) (i)-1 (ii)-2 (iii)-3 (iv)-4 (c) (i)-4 (ii)-3 (iii)-2 (iv)-1 (d) (i)-4 (ii)-2 (iii)-1 (iv)-3 |
|
Answer» (a) (i)-2 (ii)-1 (iii)-4 (iv)-3 |
|
| 50. |
Unification of all business information is(a) Authenticity(b) Availability(c) Completeness(d) Integrity |
|
Answer» (c) Completeness |
|