This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Write short notes on:1. Spam 2. Fraud 3. Cyber stalking 4. Spoofing 5. Virus 6. Worms |
|
Answer» 1. Spam : Distribute unwanted e – mail to a large number of internet users. 2. Fraud : Manipulating data, for example changing the banking records to transfer money to an unauthorized account. 3. Cyber stalking : Harassing through online. 4. Spoofing : It is a malicious practice in which communication is send from unknown source disguised as a source known to the receiver. 5. Virus : A virus is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file. One of the most common virus is Trojan. 6. Worms : Worms are self – repeating and do not require a computer program to attach themselves. Worms continually look for vulnerabilities and report back to the author of the worm when weaknesses are discovered. |
|
| 2. |
Explain public key encryption and asymetric encryption in digital certificate. |
|
Answer» Public key encryption is also called Asymmetric encryption. It uses the concept of a key value pair, a different key is used for the encryption and decryption process. One of the keys is typically known as the private key and the other is known as the public key. The private key is kept secret by the owner and the public key is either shared amongst authorized recipients or made available to the public at large. The data encrypted with the recipient’s public key can only be decrypted with the corresponding private key. A digital certificate in a client – server model of communication is one of the example of Asymmetric Encryption. A certificate is a package of information that identifies a user and a server. It contains information such as an organization’s name, the organization that issued the certificate, the users’ email address and country, and user’s public key. When a server and a client require a secure encrypted communication, they send a query over . the network to the other party, which sends back a copy of the certificate. The other party’s public key can be extracted from the certificate. A certificate can also be used to uniquely identify the holder. |
|
| 3. |
What is the use of Network Software? |
|
Answer» To Control, Analysis the Server, System, protocol, Network, Traffic flow and reports about ups and downs of network parts. |
|
| 4. |
Explain NRCFOSS? |
|
Answer» NRCFOSS: National Resource Centre for Free and Open Source Software an Institution of Government of India. To help in development of FOSS in India. |
|
| 5. |
Write a short note on cracking? |
|
Answer» Cracking is where someone edits a program source so that the code can be exploited or modified. A cracker (also called a black hat or dark side hacker) is a malicious or criminal hacker. “Cracking” meAnswer:trying to get into computer systems in order to steal, corrupt, or illegitimately view data. |
|
| 6. |
Write short note on Open NMS? |
|
Answer» There are two types in this Meridian and Horizon. Meridian: When we need stability and long term support choose Meridian which is best for Enterprises as well as businesses. Horizon: Horizon used where innovation occurs frequently. It is Best for IT-ecosystem, new technologies monitoring. |
|
| 7. |
In Open NMS, data Gathering is by using …… and ........... |
|
Answer» In Open NMS, data Gathering is by using SNMP and JMX |
|
| 8. |
LGPL stands for ………… |
|
Answer» Lesser General Public License |
|
| 9. |
How many freedoms or conditions are defined by Richard Stallman for free software foundation?(a) 2(b) 4 (c) 6 (d) 8 |
|
Answer» 4 freedoms or conditions are defined by Richard Stallman for free software foundation |
|
| 10. |
Differentiate Spyware and Ransomware. |
|
Answer» Spyware: Spyware can be installed on the computer automatically when the attachments are open, by clicking on links or by downloading infected software. Ransomware: Ransomware is a type of malicious program that demands payment after launching a cyber-attack on a computer system. This type of malware has become increasingly popular among criminals and costs the organizations millions each year. |
|
| 11. |
Write a short note on cracking. |
|
Answer» Cracking is where someone edits a program source so that the code can be exploited or modified. “Cracking” means trying to get into computer systems in order to steal, corrupt, or illegitimately view data. |
|
| 12. |
e – commerce means …….(a) electronic commerce(b) electronic data exchange(c) electric data exchange(d) electronic commercialization |
|
Answer» (a) electronic commerce |
|
| 13. |
Which of the following is not a network simulation software?(a) Ns2(b) OPNET(c) SSFNet(d) C++ |
|
Answer» OPNET is not a network simulation software |
|
| 14. |
What is the other name for Asymmetric key encryption?(a) Symmetric(b) DES (c) Public(d) Private |
|
Answer» Public is the other name for Asymmetric key encryption |
|
| 15. |
Find the correct statement about symmetric key encryption.(a) plain text and cipher text are of same size(b) The size of cipher text is always greater than plain text |
|
Answer» (a) plain text and cipher text are of same size |
|
| 16. |
A ……. method is used for converting a plain text with a public key into a cipher text. |
|
Answer» public-key encryption |
|
| 17. |
Which one of the following tracks a user visiting a website?(a) spyware(b) cookies (c) worms(d) Trojans |
|
Answer» cookies tracks a user visiting a website |
|
| 18. |
What are the various crimes happening using computer? |
|
Answer» Crime: 1. Crime Function 2. Cyber stalking 3. Malware 4. Harvesting 5. Identity theft 6. Intellectual property theft 7. Salami slicing Function: 1. Hacking, threats, and blackmailing towards a business or a person. 2. Harassing through online. 3. Malicious programs that can perform a variety of functions including stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring user’s computer activity without their permission. 4. A person or program collects login and password information from a legitimate user to illegally gain access to others’ account(s). 5. It is a crime where the criminals impersonate individuals, usually for financial gain. 6. Stealing practical or conceptual information developed by another person or company. 7. Stealing tiny amounts of money from each transaction. |
|
| 19. |
A computer network security that monitors and controls incoming and outgoing traffic is ……….(a) cookies (b) virus (c) firewall (d) worms |
|
Answer» A computer network security that monitors and controls incoming and outgoing traffic is firewall. |
|
| 20. |
How many outgoing arrows are needed for rectangular boxes in flow chart?(a) 0(b) 1(c) 2(d) 3 |
|
Answer» 1 arrows are needed for rectangular boxes in flow chart |
|
| 21. |
The symbol used for representing the box to be executed next is ……..(a) ⇒ (b) ⇓ (c) ↓ (d) ++ |
|
Answer» The symbol used for representing the box to be executed next is ↓ |
|
| 22. |
If the source code of a software is freely accessible by the public, then it is known as(a) freeware(b) Firmware(c) Open source(d) Public source |
|
Answer» (c) Open source |
|
| 23. |
Which of the following can document every incident that happened in the simulation and are used for examination?(a) Net Exam(b) Network hardware(c) Trace file(d) Net document |
|
Answer» (c) Trace file |
|
| 24. |
Which of the following is a software program that replicates the functioning of a computer network?(a) Network software(b) Network simulation(c) Network testing(d) Network calculator |
|
Answer» (b) Network simulation |
|
| 25. |
What is a Cookie? |
|
Answer» A cookie is a small piece of data sent from a website and stored on the user’s computer memory (Hard drive) by the user’s web browser while the user is browsing internet. |
|
| 26. |
Find the statement which is not true?(a) Different keys are used for encryption and decryption(b) Speed of encryption is Fast(c) Speed of decryption is Slow(d) The number of key used grows linearly |
|
Answer» (b) Speed of encryption is Fast |
|
| 27. |
Public key encryption is devised by(i) Whitfield Diffie(ii) Mastin E. Heilman(iii) Robert John(a) (i) (b) (ii), (iii) (c) (i), (iii) (d) (i),(ii) |
|
Answer» Answer is (d) (i),(ii) |
|
| 28. |
Which is a hybrid encryption protocol for securing transactions over the Internet?(a) DSL(b) SSL(c) IP(d) HTTP |
|
Answer» Answer is (b) SSL |
|
| 29. |
Which One of the following is the decentralised encryption program?(a) PGP(b) X.509(c) MGP(d) X.511 |
|
Answer» PGP is the decentralised encryption program |
|
| 30. |
The number of key used grows lineraly with the number of users in …… |
|
Answer» asymmetric key Encryption |
|
| 31. |
What is DES? |
|
Answer» The Data Encryption Standard (DES) is a Symmetric key data encryption method. DES is the typical block algorithm that takes a string of bits of cleartext (plaintext) with a fixed length and, through a series of complicated operations, transforms it into another encrypted text of the same length. |
|
| 32. |
Which of the following is not a malicious program on computer systems?(a) worms(b) Trojans(c) spyware(d) cookies |
|
Answer» cookies is not a malicious program on computer systems |
|
| 33. |
Which of the following deals with procedures, practices and values?(a) piracy(b) programs(c) virus(d) computer ethics |
|
Answer» (d) computer ethics |
|
| 34. |
The flow of control is represented in the flowchart by …………(a) arrow(b) dot(c) box(d) plus |
|
Answer» The flow of control is represented in the flowchart by arrow |
|
| 35. |
What is a control flow statement. Classify it. |
|
Answer» Control flow statements are compound statements. They are used to alter the control flow of the process depending on the state of the process. They are classified as: 1. Sequential 2. Alternative 3. Iterative |
|
| 36. |
What is a Flow – chart? |
|
Answer» Flow chart is a diagrammatic notation for representing algorithms. A flow chart is a collection of boxes containing statements and conditions which are connected by arrows showing the order in which the boxes are to be executed. |
|
| 37. |
A ………. statement is composed of a sequence of statements.(a) iterative(b) conditional(c) sequential(d) alternative |
|
Answer» (c) sequential |
|
| 38. |
The triangle is right – angled, if ……….(a) C = a – b (b) C2 = a2 + b2 (c) C2 = (a + b)2(d) C2 = a2 – b2 |
|
Answer» (b) C2 = a2 + b2 |
|
| 39. |
Commercial programs made available to the public illegally are known as ……….(a) freeware(b) warez(c) free software (d) software |
|
Answer» Commercial programs made available to the public illegally are known as warez |
|
| 40. |
A collection of boxes containing statements and conditions connected by arrow are …..(a) compiler(b) Flow chart(c) Pseudo code(d) Algorithm |
|
Answer» (b) Flow chart |
|
| 41. |
A ……. is contained in a rectangular box with a single outgoing arrow, which points to the box to be executed next.(a) statement(b) composition(c) notation(d) condition |
|
Answer» (a) statement |
|
| 42. |
Define Hacking? |
|
Answer» Hacking refers to unauthorized intrusion into a computer or a network. That is to say breaking security to gain access to a website illegally and intercept confidential information. |
|
| 43. |
What is meant by MITM? |
|
Answer» Man – in – the – middle attack (MITM; also Janus attack) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. |
|
| 44. |
A condition is contained in a diamond shaped box with ……… outgoing arrows.(a) 2(b) 3(c) 4(d) 5 |
|
Answer» A condition is contained in a diamond shaped box with 2 outgoing arrows. |
|
| 45. |
Which one of the following are self – repeating and do not require a computer program to attach themselves?(a) viruses(b) worms(c) spyware(d) Trojans |
|
Answer» Answer is (b) worms |
|
| 46. |
Mention any 2 reasons as to why the websites use cookies? |
|
Answer» 1. To collect demographic information about who has visited the Web site. 2. It helps to personalize the user’s experience on the Website. |
|
| 47. |
Differentiate digital signatures and digital certificates? |
|
Answer» Digital signature: 1. A digital signature is a mechanism that is used to verify that a particular digital document, message or transaction is authentic. 2. Digital signatures are used to verify the trustworthiness of the data being sent 3. Digital signature is to ensure that a data remain secure from the point it was issued and it was not modified by a third party. 4. It provides authentication, non-repudiation and integrity 5. A digital signature is created using a Digital Signature Standard (DSS). It uses a SHA- 1 or SHA-2 algorithm for encrypting and decrypting the message. 6. The document is encrypted at the sending end and decrypted at the receiving end using asymmetric keys. Digital certificate: 1. A digital certificate is a computer file which officially approves the relation between the holder of the certificate and a particular public key. 2. Digital certificates are used to verify the trustworthiness of the sender. 3. Digital certificate binds a digital signature to an entity 4. It provides authentication and security. 5. A digital certificate works on the principles , of public key cryptography standards (PKCS). It creates certificate in the X.509 or PGP format. 6. A digital certificate consist of certificate’s owner name and public key, expiration date, a Certificate Authority ‘s name , a Certificate Authority’s digital signature. |
|
| 48. |
List some common digital certificate systems? |
|
Answer» Common digital certificate systems are X.509 and PGR 1. Pretty Good Privacy (PGP): 2. The X.509 |
|
| 49. |
Which is an example of network simulator?(a) simulator(b) TCL(c) Ns2(d) C++ |
|
Answer» Ns2 is an example of network simulator. |
|
| 50. |
Match the following(i) objects (network) – 1. Output of simulation (ii) State of the network – 2. links(iii) events – 3. node placement(iv) Trace files – 4. link failures(a) (i)-2 (ii)-3 (iii)-4 (iv)-1(b) (i)-1 (ii)-2 (iii)-3 (iv)-4(c) (i)-4 (ii)-3 (iii)-1 (iv)-2(d) (i)-4 (ii)-2 (iii)-1 (iv)-3 |
|
Answer» (a) (i)-2 (ii)-3 (iii)-4 (iv)-1 |
|