Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

How To Reset A Password-protected Bios Configuration?

Answer»

While BIOS itself has been SUPERSEDED by UEFI, most systems still FOLLOW the same CONFIGURATION for how they KEEP the settings in storage. Since BIOS itself is a pre-boot system, it has its own storage mechanism for its settings and preferences. In the CLASSIC scenario, simply popping out the CMOS (complementary metal-oxide-semiconductor) battery will be enough to have the memory storing these settings lose its power supply, and as a result it will lose its settings.

While BIOS itself has been superseded by UEFI, most systems still follow the same configuration for how they keep the settings in storage. Since BIOS itself is a pre-boot system, it has its own storage mechanism for its settings and preferences. In the classic scenario, simply popping out the CMOS (complementary metal-oxide-semiconductor) battery will be enough to have the memory storing these settings lose its power supply, and as a result it will lose its settings.

2.

What's Better, A Red Team Or A Blue Team, In Penetration Testing Scenarios?

Answer»

In penetration testing scenarios, a red TEAM is trying to break in while a blue team is defending. Red Teams typically are considered the cooler of the TWO, while the Blue Team is usually the more difficult. The usual RULES apply like in any defense game: the Blue Team has to be good every time, while the Red Team only has to be good once. That's not entirely accurate given the complexities at WORK in most scenarios, but it's CLOSE enough to explain the idea.

In penetration testing scenarios, a red team is trying to break in while a blue team is defending. Red Teams typically are considered the cooler of the two, while the Blue Team is usually the more difficult. The usual rules apply like in any defense game: the Blue Team has to be good every time, while the Red Team only has to be good once. That's not entirely accurate given the complexities at work in most scenarios, but it's close enough to explain the idea.

3.

What Is The Role Of Client Access Server?

Answer»

The Client Access Server gives CONNECTIVITY to various services like

  • Microsoft Office OUTLOOK
  • Outlook Web App
  • Mobile devices
  • POP & SMTP
  • Accepts mail from DELIVERS mail to other mail HOSTS on the internet
  • Gives unified namespace, network security and authentication
  • Handles all client requests for Exchange
  • Routes requests to the correct mailbox server
  • Allows the use of layer 4 (TCP affinity) routing.

The Client Access Server gives connectivity to various services like

4.

What Is Ssl Connection And An Ssl Session?

Answer»
  • SSL or secured socket layer CONNECTION is a transient peer-to-peer communications LINK where each connection is associated with one SSL Session.
  • SSL session can be defines as association between client and SERVER generally crated by handshake protocol. There are set of PARAMETERS are defined and it MAY be share by multiple SSL connections.

5.

Why Was Proofpoint Selected?

Answer»

Proofpoint is a CLEAR leader in Gartner's Magic QUADRANT for Secure Email Gateway. Proofpoint is also a leader in Gartner's Magic Quadrant for Enterprise Information Archiving. Moreover, Proofpoint has products to match our email security PORTFOLIO (albeit more FEATURE RICH) and has products that extend to adjacent messaging areas which Intel Security does not have. Further details on the partnership will be forthcoming shortly.

Proofpoint is a clear leader in Gartner's Magic Quadrant for Secure Email Gateway. Proofpoint is also a leader in Gartner's Magic Quadrant for Enterprise Information Archiving. Moreover, Proofpoint has products to match our email security portfolio (albeit more feature rich) and has products that extend to adjacent messaging areas which Intel Security does not have. Further details on the partnership will be forthcoming shortly.

6.

What Is Soap And Wsdl?

Answer»

SOAP or SIMPLE Object Access Protocol is a XML-based protocol through which APPLICATIONS exchange INFORMATION over HTTP. XML requests are send by web SERVICES in SOAP format then a SOAP client sends a SOAP MESSAGE to the server. The server responds back again with a SOAP message along with the requested service.

SOAP or Simple Object Access Protocol is a XML-based protocol through which applications exchange information over HTTP. XML requests are send by web services in SOAP format then a SOAP client sends a SOAP message to the server. The server responds back again with a SOAP message along with the requested service.

7.

Why To Do Need To Be Concerned About Our Mail Security?

Answer»

It seems like we can't GO more than a few days anymore without hearing about a major breach, which on the surface would make it seem that more people and places are being hacked than ever before (which to be honest is TRUE). However, it also shows that DETECTION and reporting of attacks is IMPROVING per requirements of both government entities and insurance companies. As a result, the PUBLIC and security professionals are both better informed as to what they can do to help protect themselves.

It seems like we can't go more than a few days anymore without hearing about a major breach, which on the surface would make it seem that more people and places are being hacked than ever before (which to be honest is true). However, it also shows that detection and reporting of attacks is improving per requirements of both government entities and insurance companies. As a result, the public and security professionals are both better informed as to what they can do to help protect themselves.

8.

Name The Two Common Techniques Used To Protect A Password File?

Answer»

Two common TECHNIQUES to protect a password file are- hashed PASSWORDS and a SALT VALUE or password file ACCESS control.

Two common techniques to protect a password file are- hashed passwords and a salt value or password file access control.

9.

What Is The Difference Between An Hids (host Intrusion Detection System) And A Nids (network Intrusion Detection System)?

Answer»

Both acronyms are Intrusion Detection Systems, however the first is a Host Intrusion Detection System whereas the SECOND is a Network Intrusion Detection System. An HIDS runs as a background utility in the same as an anti-virus program for instance, while a Network Intrusion Detection System sniffs PACKETS as they go ACROSS the network LOOKING for things that aren't quite ordinary. Both systems have two basic variants: signature based and anomaly based.

Both acronyms are Intrusion Detection Systems, however the first is a Host Intrusion Detection System whereas the second is a Network Intrusion Detection System. An HIDS runs as a background utility in the same as an anti-virus program for instance, while a Network Intrusion Detection System sniffs packets as they go across the network looking for things that aren't quite ordinary. Both systems have two basic variants: signature based and anomaly based.

10.

What's The Difference Between Symmetric And Asymmetric Encryption?

Answer»

To boil down an extremely COMPLICATED topic into a few SHORT words, Symmetric encryption uses the same key to encrypt and decrypt, while Asymmetric uses different keys for encryption and decryption. Symmetric is usually much faster, but is difficult to implement most times due to the FACT that you would have to transfer the key over an unencrypted channel. THEREFORE many times an Asymmetric connection will be ESTABLISHED first, then send creates the Symmetric connection.

To boil down an extremely complicated topic into a few short words, Symmetric encryption uses the same key to encrypt and decrypt, while Asymmetric uses different keys for encryption and decryption. Symmetric is usually much faster, but is difficult to implement most times due to the fact that you would have to transfer the key over an unencrypted channel. Therefore many times an Asymmetric connection will be established first, then send creates the Symmetric connection.

11.

Explain "url Manipulation"?

Answer»

URL manipulation is a type of attack in which hackers manipulate the website URL to get the critical INFORMATION. The information is passed in the parameters in the query string VIA HTTP GET method between client and SERVER. Hackers can alter the information between these parameters and get the authentication on the servers and steal the critical DATA.

URL manipulation is a type of attack in which hackers manipulate the website URL to get the critical information. The information is passed in the parameters in the query string via HTTP GET method between client and server. Hackers can alter the information between these parameters and get the authentication on the servers and steal the critical data.

12.

What's The Difference Between A White Box Test And A Black Box Test?

Answer»

Information GIVEN by the person commissioning the test. A WHITE BOX test is one where the pen testing team is given as MUCH information as possible regarding the ENVIRONMENT, while a Black Box test iswell a Black Box. They don't know what's inside.

Information given by the person commissioning the test. A White Box test is one where the pen testing team is given as much information as possible regarding the environment, while a Black Box test iswell a Black Box. They don't know what's inside.

13.

Why Does Ingest Need To Cease Prior To Export Starting?

Answer»

Export is essentially a snapshot of your archive. If the contents are constantly being added to after the export BEGINS, there would need to be another differential export after the FIRST export completes in order to GET all the new email that was archived since the export began. This would BECOME a loop as new data is continually added, so the best SOLUTION is to "freeze" the contents of the archive during export. This also means that selective purge and retention purge will be suspended.

Export is essentially a snapshot of your archive. If the contents are constantly being added to after the export begins, there would need to be another differential export after the first export completes in order to get all the new email that was archived since the export began. This would become a loop as new data is continually added, so the best solution is to "freeze" the contents of the archive during export. This also means that selective purge and retention purge will be suspended.

14.

What Are The Most Important Steps You Would Recommend For Securing A New Web Server?

Answer»

Web Server Security:

  • Update/Patch the web server software
  • Minimize the server functionality disable EXTRA MODULES
  • Delete default data/scripts
  • Increase logging verboseness
  • Update Permissions/Ownership of files

Web Application Security:

Make sure Input Validation is ENFORCED WITHIN the code- Security QA TESTING.

Web Server Security:

Web Application Security:

Make sure Input Validation is enforced within the code- Security QA testing.

15.

How Do You Protect Your Home Wireless Access Point?

Answer»
  • There are a LOT of DIFFERENT ways to protect a WIRELESS ACCESS Point: using WPA2, not broadcasting the SSID, and using MAC address filtering are the most popular among them. 
  • There are many other options, but in a typical home environment, those three are the biggest.
  • By now you have seen more than a fair amount of troubles. You have got a toolkit of regularly used programs, a standard suite of protection utilities, you're comfortable with cleanups.

16.

How Will This Affect Detection Rate Performance For Either Malware Or Spam?

Answer»

No change in PERFORMANCE is expected. Intel Security will continue to provide support for the affected products to maintain the performance levels of the malware and spam protection through the 5 YEARS TRANSITION period.

No change in performance is expected. Intel Security will continue to provide support for the affected products to maintain the performance levels of the malware and spam protection through the 5 years transition period.

17.

What Is Meant By Recipient Resolution, Routing Resolution And Content Conversion For Emails?

Answer»

Recipient Resolution: The e-mail address of the recipient is resolved to decide whether the recipient has got a mailbox in the Exchange Organization or an external e-mail address

Routing Resolution: Once the information REGARDING the recipient is resolved, the ultimate destination for the mail is ROUTED, and the next HOP are determined

Content Conversion: Once the mail has reached its determined address, the SMTP is converted into readable FORMAT like HTML, rich text format or plain text .

Recipient Resolution: The e-mail address of the recipient is resolved to decide whether the recipient has got a mailbox in the Exchange Organization or an external e-mail address

Routing Resolution: Once the information regarding the recipient is resolved, the ultimate destination for the mail is routed, and the next hop are determined

Content Conversion: Once the mail has reached its determined address, the SMTP is converted into readable format like HTML, rich text format or plain text .

18.

Describe Network Intrusion Detection System?

Answer»

Network Intrusion Detection System generally known as NIDS. It is used for ANALYSIS of the passing traffic on the ENTIRE sub-net and to match with the known ATTACKS. If any loop HOLE identified then administrator RECEIVES an alert. 

Network Intrusion Detection System generally known as NIDS. It is used for analysis of the passing traffic on the entire sub-net and to match with the known attacks. If any loop hole identified then administrator receives an alert. 

19.

List The Parameters That Define An Ssl Session State?

Answer»

The PARAMETERS that define an SSL SESSION state are:

The parameters that define an SSL session state are:

20.

What Is Port Scanning?

Answer»

Ports are the point from where information goes in and out of any system. Scanning of the ports to find out any LOOP holes in the system are known as Port Scanning. There can be some WEAK points in the system to which HACKERS can attack and get the critical information. These points should be identified and PREVENTED from any misuse.

Ports are the point from where information goes in and out of any system. Scanning of the ports to find out any loop holes in the system are known as Port Scanning. There can be some weak points in the system to which hackers can attack and get the critical information. These points should be identified and prevented from any misuse.

21.

What Do You Think Of Social Networking Sites Such As Facebook And Linkedin In The Context Of Data Security?

Answer»

This is a doozy, and there are an enormous number of opinions for this QUESTION. Many THINK they are the worst thing that ever happened to the world, while others praise their existence. In the REALM of security, they can be the source of extreme data LEAKS if handled in their default configurations. It is possible to lock down permissions on social networking sites, but in some cases this isn't enough due to the fact that the backend is not sufficiently secured.

This is a doozy, and there are an enormous number of opinions for this question. Many think they are the worst thing that ever happened to the world, while others praise their existence. In the realm of security, they can be the source of extreme data leaks if handled in their default configurations. It is possible to lock down permissions on social networking sites, but in some cases this isn't enough due to the fact that the backend is not sufficiently secured.

22.

How To Judge If A Remote Server Is Running Iis Or Apache?

Answer»

Error messages often times give AWAY what the server is running, and many times if the website administrator has not set up CUSTOM error pages for every site, it can give it away as SIMPLY as just entering a known bad address. Other times, just USING telnet can be enough to SEE how it responds.

Error messages often times give away what the server is running, and many times if the website administrator has not set up custom error pages for every site, it can give it away as simply as just entering a known bad address. Other times, just using telnet can be enough to see how it responds.

23.

List The Components Used In Ssl?

Answer»

SECURE SOCKETS Layer protocol or SSL is used to make secure connection between CLIENT and computers.

Below are the COMPONENT used in SSL:

  • SSL Recorded protocol
  • Handshake protocol
  • Change Cipher Spec
  • Encryption algorithms.

Secure Sockets Layer protocol or SSL is used to make secure connection between client and computers.

Below are the component used in SSL:

24.

What Are The Types Of Cookies?

Answer»

TYPES of COOKIES are:

Session Cookies : These cookies are temporary and last in that session only.

Persistent cookies : These cookies STORED on the hard DISK drive and last TILL its expiry or manually removal of it. 

Types of Cookies are:

Session Cookies : These cookies are temporary and last in that session only.

Persistent cookies : These cookies stored on the hard disk drive and last till its expiry or manually removal of it. 

25.

Explain The Term Dag (data Availability Group)?

Answer»

DAG or Data Availability Group is a FRAMEWORK BUILD is MS Exchange 2013. It is a group of upto 16 mailbox server that hosts a set of databases and provides AUTOMATIC database level recovery due to failure of servers of databases.

DAG or Data Availability Group is a framework build is MS Exchange 2013. It is a group of upto 16 mailbox server that hosts a set of databases and provides automatic database level recovery due to failure of servers of databases.

26.

What Is Worse In Firewall Detection, A False Negative Or A False Positive?

Answer»

Far and away is a false negative. A false positive is annoying, but easily dealt with CALLING a LEGITIMATE piece of traffic BAD. A false negative however is a piece of MALICIOUS traffic being LET through without incident definitely bad.

Far and away is a false negative. A false positive is annoying, but easily dealt with calling a legitimate piece of traffic bad. A false negative however is a piece of malicious traffic being let through without incident definitely bad.

27.

What Is Iso 17799?

Answer»

ISO/IEC 17799 is originally published in UK and defines BEST practices for Information Security MANAGEMENT. It has guidelines for all ORGANIZATIONS small or BIG for Information security.

ISO/IEC 17799 is originally published in UK and defines best practices for Information Security Management. It has guidelines for all organizations small or big for Information security.

28.

Why Is It Easier To Break Into A Windows Local Account Than An Ad Account?

Answer»

Windows local accounts have a great deal of baggage tied to them, running back a LONG long way to keep compatibility for user accounts. If you are a user of passwords LONGER than 13 characters, you may have seen the message referring to this fact. However, Active Directory accounts have a great deal of security tied onto them, not the least of which is that the system actually doing the AUTHENTICATING is not the one you are USUALLY sitting at when you are a regular user. Breaking into a Windows.

Windows local accounts have a great deal of baggage tied to them, running back a long long way to keep compatibility for user accounts. If you are a user of passwords longer than 13 characters, you may have seen the message referring to this fact. However, Active Directory accounts have a great deal of security tied onto them, not the least of which is that the system actually doing the authenticating is not the one you are usually sitting at when you are a regular user. Breaking into a Windows.

29.

How Much Will The New Export Process For Data Cost?

Answer»

There is no ADDITIONAL cost to EXPORT your data, HOWEVER, you will need to keep your account ACTIVE for the duration of the export.

There is no additional cost to export your data, however, you will need to keep your account active for the duration of the export.

30.

What Is A Honeypot?

Answer»

Honeypot is fake computer SYSTEM which behaves like a real system and attracts hackers to attack on it. Honeypot is USED to find out LOOP holes in the system and to provide solution for these kinds of ATTACKS.

Honeypot is fake computer system which behaves like a real system and attracts hackers to attack on it. Honeypot is used to find out loop holes in the system and to provide solution for these kinds of attacks.

31.

Why Would You Bring In An Outside Contractor To Check The Security Issues?

Answer»

Much like getting a fresh set of eyes on a problem, sometimes you have people that don't want to see or don?t want to ADMIT to an ISSUE. Bringing in extra help as an audit can really help eliminate problems that your TEAM isn?t able to RESOLVE on their own. GRANTED they may cost a small fortune, but they are extremely good at what they do.

Much like getting a fresh set of eyes on a problem, sometimes you have people that don't want to see or don?t want to admit to an issue. Bringing in extra help as an audit can really help eliminate problems that your team isn?t able to resolve on their own. Granted they may cost a small fortune, but they are extremely good at what they do.

32.

What Is The Difference Between A Black Hat And A White Hat?

Answer»

This PARTICULAR question can lead into a major philosophical debate about freedom of information, and if something is implemented in a deliberately BROKEN way it isn't actually breaking into it, ETC etc. The one I have heard the most is the classic Jedi example same tools, different ideologies. PERSONALLY, with the people I know that have worked on both sides of the line it comes down to this the DIFFERENCE between a Black Hat and a White Hat is who is signing the check.

This particular question can lead into a major philosophical debate about freedom of information, and if something is implemented in a deliberately broken way it isn't actually breaking into it, etc etc. The one I have heard the most is the classic Jedi example same tools, different ideologies. Personally, with the people I know that have worked on both sides of the line it comes down to this the difference between a Black Hat and a White Hat is who is signing the check.