Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

What Is Satan?

Answer»

SATAN stands for Security ANALYSIS Tool for Auditing Networks. It SEARCHES for all TYPES of configuration errors that might be used to BREAK into the system.

SATAN stands for Security Analysis Tool for Auditing Networks. It searches for all types of configuration errors that might be used to break into the system.

2.

What Is Sniffer?

Answer»

A sniffer is a device or program that looks for RAW DATA on the NETWORK.

A sniffer is a device or program that looks for raw data on the network.

3.

What Is Ncsa?

Answer»

NCSA is an independent ORGANIZATION that CERTIFIES ANTIVIRUS programs.

NCSA is an independent organization that certifies antivirus programs.

4.

Who Is Isp?

Answer»

ISP is an organization that MAINTAINS gateways to Internet and RENTS access to CUSTOMERS on service basis.

ISP is an organization that maintains gateways to Internet and rents access to customers on service basis.

5.

What Is Message Application Program Interface (mapi)?

Answer»

MAPI is a PROGRAM interface by MICROSOFT that sends e-mail with an attached document from Widows APPLICATION.

MAPI is a program interface by Microsoft that sends e-mail with an attached document from Widows application.

6.

What Is Pretty Good Privacy?

Answer»

PRETTY Good Privacy is used to PROTECT e-mail messages through encryption PROGRAMS. It is used for SIGNING, encrypting, and decrypting e-mails to increase the security of e-mail communications.

Pretty Good Privacy is used to protect e-mail messages through encryption programs. It is used for signing, encrypting, and decrypting e-mails to increase the security of e-mail communications.

7.

What Is Public Key?

Answer»

A PUBLIC key is a code or PASSWORD that is DISTRIBUTED to ENCRYPT the message. It is AVAILABLE from public key servers.

A public key is a code or password that is distributed to encrypt the message. It is available from public key servers.

8.

What Is Private Key?

Answer»

A private key is a code or password that is never TRANSMITTED over network. It is stored in ENCRYPTED FORM on USER's SYSTEM only.

A private key is a code or password that is never transmitted over network. It is stored in encrypted form on user's system only.

9.

What Is Secure E-mail?

Answer»

Secure e-mail is an ENCODED e-mail message that can be READ only by the INTENDED recipient.

Secure e-mail is an encoded e-mail message that can be read only by the intended recipient.

10.

What Is Auto Responder?

Answer»

Auto responder is an e-mail filtering program designed to DISTRIBUTE prewritten REPLY automatically as SOON as the e-mail from a sender is RECEIVED.

Auto responder is an e-mail filtering program designed to distribute prewritten reply automatically as soon as the e-mail from a sender is received.

11.

How Can You Avoid Spam And Junk E-mails?

Answer»

You can avoid JUNK or spam e-mail by requesting removal of your e-mail ID and name from the MAILING list, reporting the OFFENDER to an Internet service provider (ISP), and using e-mail filter PROGRAM.

You can avoid junk or spam e-mail by requesting removal of your e-mail ID and name from the mailing list, reporting the offender to an Internet service provider (ISP), and using e-mail filter program.

12.

What Is Junk E-mail?

Answer»

JUNK e-mail is an UNSOLICITED and UNWANTED e-mail.

Junk e-mail is an unsolicited and unwanted e-mail.

13.

What Is Spamming?

Answer»

Spamming is an ACT of sending out an e-mail or NEWS MESSAGE to MULTIPLE e-mail addresses simultaneously.

Spamming is an act of sending out an e-mail or news message to multiple e-mail addresses simultaneously.

14.

What Is Security Policy?

Answer»

Security POLICY is a combination of rules and PROCEDURES designed to MANAGE the security of information throughout an organization. The MAIN aim is to phase out the VULNERABILITY to viruses, hackers, and snoopers.

Security policy is a combination of rules and procedures designed to manage the security of information throughout an organization. The main aim is to phase out the vulnerability to viruses, hackers, and snoopers.

15.

What Is Zoo?

Answer»

Zoo is a LIST of VIRUSES detected OUTSIDE the laboratory ENVIRONMENT.

Zoo is a list of viruses detected outside the laboratory environment.

16.

What Is Wildlist?

Answer»

WildList is a list of all VIRUSES maintained by National COMPUTER SECURITY Association (NCSA) laboratory.

WildList is a list of all viruses maintained by National Computer Security Association (NCSA) laboratory.

17.

What Is Antivirus?

Answer»

The programs that DETECT the VIRUS by SCANNING the files are called antivirus; for EXAMPLE, NORTON Antivirus, McAfee, and Quick Heal.

The programs that detect the virus by scanning the files are called antivirus; for example, Norton Antivirus, McAfee, and Quick Heal.

18.

What Is Virus?

Answer»

Virus is a self PROPAGATING malicious EXECUTABLE code which gets COPIED from one MACHINE to ANOTHER with other executable programs.

Virus is a self propagating malicious executable code which gets copied from one machine to another with other executable programs.

19.

What Is Trojan Horse?

Answer»

Trojan horse EMBEDS a piece of CODE in another code. It is used by CRACKERS to GAIN the root access to the computer.

Trojan horse embeds a piece of code in another code. It is used by crackers to gain the root access to the computer.

20.

What Is Chap?

Answer»

CHAP stands for CHALLENGE Handshake Authentication PROTOCOL. It is a PROGRAM that verifies a user's clear-text PASSWORD.

CHAP stands for Challenge Handshake Authentication Protocol. It is a program that verifies a user's clear-text password.

21.

What Is Pap?

Answer»

PAP STANDS for Password AUTHENTICATION Protocol. It is a PROGRAM that authenticates a user's encrypted password.

PAP stands for Password Authentication Protocol. It is a program that authenticates a user's encrypted password.

22.

What Is Cookie?

Answer»

Cookie is a SMALL piece of information that a Web SERVER can store with a Web BROWSER and later read BACK from that browser.

Cookie is a small piece of information that a Web server can store with a Web browser and later read back from that browser.

23.

How Does A Web Server Get The Digital Certificate From A Certifying Authority?

Answer»

A WEB server generates a key pair and SENDS the PUBLIC key to a certifying authority. The certifying authority then validates the server and sends the certificate BACK by e-mail.

A Web server generates a key pair and sends the public key to a certifying authority. The certifying authority then validates the server and sends the certificate back by e-mail.

24.

What Is Ssl Stands For?

Answer»

SSL STANDS for Secure Socket LAYER and USES HTTPS (port 443). It uses cryptography for encryption, authentication, and message integrity.

SSL stands for Secure Socket Layer and uses HTTPS (port 443). It uses cryptography for encryption, authentication, and message integrity.

25.

What Is Message Digest?

Answer»

Message digest is a checksum, which is a fingerprint of a DOCUMENT USED to verify the INTEGRITY of the document. Message Digest algorithm 5 (MD5) is widely used for calculating the message digest.

Message digest is a checksum, which is a fingerprint of a document used to verify the integrity of the document. Message Digest algorithm 5 (MD5) is widely used for calculating the message digest.

26.

What Is Digital Certificate?

Answer»

A certificate ISSUED by a THIRD trusted party CALLED CERTIFYING authority that contains the name of party A and its public key.

A certificate issued by a third trusted party called certifying authority that contains the name of party A and its public key.

27.

What Is Digital Signature?

Answer»

Digital SIGNATURE is an application of public KEY cryptography used to authenticate the SENDER of the MESSAGE.

Digital signature is an application of public key cryptography used to authenticate the sender of the message.

28.

What Is Cryptography?

Answer»

CRYPTOGRAPHY is an ART of secret writing. It protects data from theft or alteration and can also be used for USER AUTHENTICATION. There are three types of cryptographic SCHEMES: secret key or symmetric cryptography, public-key or asymmetric cryptography, and hash functions.

Cryptography is an art of secret writing. It protects data from theft or alteration and can also be used for user authentication. There are three types of cryptographic schemes: secret key or symmetric cryptography, public-key or asymmetric cryptography, and hash functions.

29.

What Is Socket?

Answer»

Socket is an interface to TRANSMISSION Control Protocol/Internet Protocol (TCP/IP) USED by programs. It is an endpoint of TCP CONNECTION.

Socket is an interface to Transmission Control Protocol/Internet Protocol (TCP/IP) used by programs. It is an endpoint of TCP connection.

30.

What Is The Function Of Firewall?

Answer»

A FIREWALL prevents UNAUTHORIZED TRAFFIC in and out of the network by forcing all traffic to pass through the firewall.

A firewall prevents unauthorized traffic in and out of the network by forcing all traffic to pass through the firewall.

31.

What Are The Five Ingredients Of Conventional Encryption Scheme?

Answer»

The five INGREDIENTS of the conventional encryption scheme are Plaintext, Encryption ALGORITHM, Secret KEY, Cipher TEXT, and DECRYPTION algorithm.

The five ingredients of the conventional encryption scheme are Plaintext, Encryption algorithm, Secret key, Cipher text, and Decryption algorithm.

32.

What Is Denial Of Service Attack?

Answer»

The denial of service attack PREVENTS or prohibits the NORMAL use or MANAGEMENT of the COMMUNICATION FACILITY.

The denial of service attack prevents or prohibits the normal use or management of the communication facility.

33.

What Is Active Attack?

Answer»

An active attack is ONE in which the INTENTION of an attacker is to modify or temper the confidential information. It can be in the form of MASQUERADING (pretending to be a different ENTITY), MODIFICATION of message, or denial of service.

An active attack is one in which the intention of an attacker is to modify or temper the confidential information. It can be in the form of masquerading (pretending to be a different entity), modification of message, or denial of service.

34.

What Is Passive Attack?

Answer»

A PASSIVE attack is ONE in which the intention of an attacker is to obtain CONFIDENTIAL information of another person or ORGANIZATION. It can be in the form of eavesdropping or monitoring of the information.

A passive attack is one in which the intention of an attacker is to obtain confidential information of another person or organization. It can be in the form of eavesdropping or monitoring of the information.

35.

What Are Different Categories Of Attack?

Answer»

The ATTACK can be categorized as FOLLOWS:

The attack can be categorized as follows:

36.

What Is Security Service?

Answer»

A security service is a service that INCREASES the security of data PROCESSING system and CONFIDENTIAL information of a person or ORGANIZATION.

A security service is a service that increases the security of data processing system and confidential information of a person or organization.

37.

What Is A Security Threat?

Answer»

SECURITY threat is a deliberate ATTEMPT or an accidental access to private information of a PERSON or ORGANIZATION by another person or organization.

Security threat is a deliberate attempt or an accidental access to private information of a person or organization by another person or organization.

38.

What Eia/tia Standard Interface Are Used For Serial Cable With Cisco Routers?

Answer»

EIA/TIA-232, EIA/TIA-449, and EIA/TIA-530 are the EIA/TIA standard interface USED for SERIAL cable with CISCO ROUTERS.

EIA/TIA-232, EIA/TIA-449, and EIA/TIA-530 are the EIA/TIA standard interface used for serial cable with Cisco routers.

39.

What Is Spid?

Answer»

SPID stands for SERVICE Profile Identifier, and is an ISDN PHONE number, which is USED in SIGNALLING.

SPID stands for Service Profile Identifier, and is an ISDN phone number, which is used in signalling.

40.

On Which Channel Ldap Is Used On Isdn?

Answer»

LDAP is USED on the ISDN D-channel. It DELIVERS SIGNALS to local ISDN switch.

LDAP is used on the ISDN D-channel. It delivers signals to local ISDN switch.

41.

What Is Clock Source?

Answer»

A CLOCK source is a device to which other DEVICES when CONNECTED, adjust their transmission speed USING synchronous links.

A clock source is a device to which other devices when connected, adjust their transmission speed using synchronous links.

42.

What Is The Use Of Data Service Unit/channel Service Unit (dsu/csu)?

Answer»

DSU/CSU is used as an INTERFACE to the TELEPHONE company to ATTACH the routers as CLOCK source.

DSU/CSU is used as an interface to the telephone company to attach the routers as clock source.

43.

What Is Multilink Point-to-point Protocol (mlpp)?

Answer»

MLPP is used to TREAT multiple B-channels as single LINK. It FRAGMENTS packets and balances the traffic by sending DIFFERENT fragments on multiple links.

MLPP is used to treat multiple B-channels as single link. It fragments packets and balances the traffic by sending different fragments on multiple links.

44.

What Do Isdn, Bri, Pri Stands For?

Answer»
  • ISDN stands for Integrated Service Digital Network
  • BRI stands for Basic RATE Interface
  • PRI stands for PRIMARY Rate Interface.

45.

Define The Term Pap And Chap.

Answer»

PAP STANDS for Password Authentication Protocol and sends password as simple Text. CHAP stands for Channel Handshake Authentication Protocol and USES MD5 HASHING to PROTECT the password contents.

PAP stands for Password Authentication Protocol and sends password as simple Text. CHAP stands for Channel Handshake Authentication Protocol and uses MD5 hashing to protect the password contents.

46.

Which Data Link Protocols Are Valid On Isdn B-channel?

Answer»

High-level Data LINK Control (HDLC), PPP, and Link ACCESS Procedure BALANCED (LAPB) are VALID on ISDN B-channel.

High-level Data Link Control (HDLC), PPP, and Link Access Procedure Balanced (LAPB) are valid on ISDN B-channel.

47.

How Many B-channels And D-channels Are Available In Bri, Pri(t1), And Pri(e1)?

Answer»
  • In BRI, two B-channels and ONE D-channel are available.
  • In PRI (Tl), 23 B-channels and one D-channel are available.
  • In PRI (El), 30 B-channels and one D-channel are available.

48.

What Is Two-wire Circuit?

Answer»

Lines with two-wires have ONE twisted-pair wire. The pair is USED to SEND signals in one direction at a TIME; THEREFORE, making it half-duplex.

Lines with two-wires have one twisted-pair wire. The pair is used to send signals in one direction at a time; therefore, making it half-duplex.

49.

What Is Four-wire Circuit?

Answer»

A line with four-wires have two twisted-pair wires. Each pair is USED to SEND signals in ONE direction; THEREFORE, MAKING it full-duplex.

A line with four-wires have two twisted-pair wires. Each pair is used to send signals in one direction; therefore, making it full-duplex.

50.

What Is E1?

Answer»

E1 is a line from TELECOMMUNICATION Company with a data TRANSMISSION rate of 2.048 Mbps. This is USED in most locations outside North America, Japan, and Korea.

E1 is a line from Telecommunication Company with a data transmission rate of 2.048 Mbps. This is used in most locations outside North America, Japan, and Korea.