InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 451. |
Explain Proxy Arp? |
|
Answer» It is USING a ROUTER to answer ARP requests. This will be done when the originating host BELIEVES that a destination is LOCAL, when in fact is lies beyond router. It is using a router to answer ARP requests. This will be done when the originating host believes that a destination is local, when in fact is lies beyond router. |
|
| 452. |
What Is Link Manager Protocol? |
|
Answer» The link manager PROTOCOL is responsible for link set-up between Bluetooth devices. This INCLUDES setting up of SECURITY functions like authentication and encryption by generating, exchanging and checking of link and encryption keys and the control and negotiation of baseband packet sizes. Furthermore it controls the power modes and DUTY cycles of the Bluetooth radio device, and the CONNECTION states of a Bluetooth unit in a piconet. The link manager protocol is responsible for link set-up between Bluetooth devices. This includes setting up of security functions like authentication and encryption by generating, exchanging and checking of link and encryption keys and the control and negotiation of baseband packet sizes. Furthermore it controls the power modes and duty cycles of the Bluetooth radio device, and the connection states of a Bluetooth unit in a piconet. |
|
| 453. |
What Is Service Discovery Protocol? |
|
Answer» Discovery SERVICES are CRUCIAL part of the Bluetooth framework. These services provide the basis for all the USAGE models. Using SDP, device information, services and the characteristics of the services can be queried and after that, a connection between two or more Bluetooth DEVICES can be ESTABLISHED. SDP is defined in the Service Discovery Protocol specification. Discovery services are crucial part of the Bluetooth framework. These services provide the basis for all the usage models. Using SDP, device information, services and the characteristics of the services can be queried and after that, a connection between two or more Bluetooth devices can be established. SDP is defined in the Service Discovery Protocol specification. |
|
| 454. |
Do You Know About Obex Protocol? |
|
Answer» IrOBEX (shortly OBEX) is a session protocol developed by the INFRARED Data Association (IrDA) to exchange objects in a simple and spontaneous manner. OBEX, which provides the same BASIC functionality as HTTP but in a much lighter fashion, uses a client-server model and is independent of the transport mechanism and transport API, provided it REALIZES a reliable transport base. Along with the protocol itself, the "grammar" for OBEX conversations between devices, OBEX also provides a model for representing objects and operations. In ADDITION, the OBEX protocol defines a folder-listing object, which is used to browse the contents of folders on remote device. In the first phase, RFCOMM is used as sole transport layer for OBEX. IrOBEX (shortly OBEX) is a session protocol developed by the Infrared Data Association (IrDA) to exchange objects in a simple and spontaneous manner. OBEX, which provides the same basic functionality as HTTP but in a much lighter fashion, uses a client-server model and is independent of the transport mechanism and transport API, provided it realizes a reliable transport base. Along with the protocol itself, the "grammar" for OBEX conversations between devices, OBEX also provides a model for representing objects and operations. In addition, the OBEX protocol defines a folder-listing object, which is used to browse the contents of folders on remote device. In the first phase, RFCOMM is used as sole transport layer for OBEX. |
|
| 455. |
How Is Bluetooth Used? |
|
Answer» Bluetooth can be used to wirelessly SYNCHRONIZE and transfer DATA among devices. Bluetooth can be thought of as a cable replacement technology. Typical uses include automatically synchronizing contact and calendar information among desktop, notebook and palmtop computers without connecting CABLES. Bluetooth can also be used to access a network or the Internet with a notebook computer by connecting wirelessly to a cellular phone. Bluetooth can be used to wirelessly synchronize and transfer data among devices. Bluetooth can be thought of as a cable replacement technology. Typical uses include automatically synchronizing contact and calendar information among desktop, notebook and palmtop computers without connecting cables. Bluetooth can also be used to access a network or the Internet with a notebook computer by connecting wirelessly to a cellular phone. |
|
| 456. |
What Is The Future Direction Of The Bluetooth Standard? |
|
Answer» At this time, we anticipate the Bluetooth SIG to evolve the Bluetooth technology to PROVIDE greater bandwidth and distances, thus increasing the potential platforms and applications USED in the EMERGING personal area networking MARKETPLACE. At this time, we anticipate the Bluetooth SIG to evolve the Bluetooth technology to provide greater bandwidth and distances, thus increasing the potential platforms and applications used in the emerging personal area networking marketplace. |
|
| 457. |
How Secure Is A Bluetooth Network? |
|
Answer» Bluetooth is extremely secure in that it EMPLOYS several layers of data encryption and user authentication measures. Bluetooth devices use a combination of the PERSONAL Identification NUMBER (PIN) and a Bluetooth address to identify other Bluetooth devices. Data encryption (i.e., 128-bit) can be used to further ENHANCE the degree of Bluetooth security. The transmission scheme (FHSS) provides another level of security in itself. Instead of transmitting over one frequency within the 2.4 GHz band, Bluetooth radios use a fast frequency-hopping spread spectrum (FHSS) technique, allowing only synchronized receivers to ACCESS the transmitted data. Bluetooth is extremely secure in that it employs several layers of data encryption and user authentication measures. Bluetooth devices use a combination of the Personal Identification Number (PIN) and a Bluetooth address to identify other Bluetooth devices. Data encryption (i.e., 128-bit) can be used to further enhance the degree of Bluetooth security. The transmission scheme (FHSS) provides another level of security in itself. Instead of transmitting over one frequency within the 2.4 GHz band, Bluetooth radios use a fast frequency-hopping spread spectrum (FHSS) technique, allowing only synchronized receivers to access the transmitted data. |
|
| 458. |
What Is Frequency-hopping Spread Spectrum (fhss)? |
|
Answer» FREQUENCY-Hopping Spread-Spectrum (FHSS) is a spread spectrum modulation scheme that uses a narrowband carrier that changes frequency in a pattern known to both transmitter and receiver. Properly SYNCHRONIZED, they maintain a single logical channel. To an unintended receiver, FHSS appears as short-duration impulse noise. More simply, the data is broken down into packets and transmitted to the receiver of other devices over numerous "hop frequencies" (79 total) in a pseudo random pattern. Only transmitters and receivers that are synchronized on the same hop frequency pattern will have ACCESS to the transmitted data. The transmitter switches hop frequencies 1,600 times per second to assure a high DEGREE of data security. Frequency-Hopping Spread-Spectrum (FHSS) is a spread spectrum modulation scheme that uses a narrowband carrier that changes frequency in a pattern known to both transmitter and receiver. Properly synchronized, they maintain a single logical channel. To an unintended receiver, FHSS appears as short-duration impulse noise. More simply, the data is broken down into packets and transmitted to the receiver of other devices over numerous "hop frequencies" (79 total) in a pseudo random pattern. Only transmitters and receivers that are synchronized on the same hop frequency pattern will have access to the transmitted data. The transmitter switches hop frequencies 1,600 times per second to assure a high degree of data security. |
|
| 459. |
What Is The Strength Of The Signal Transmitted By Powerful Cell Phones? |
|
Answer» The powerful CELL phones can transmit a SIGNAL of 3 WATTS. The powerful cell phones can transmit a signal of 3 watts. |
|
| 460. |
What Is The Frequency Range Used For Bluetooth In Japan? |
|
Answer» 2472 to 2497 MHz is the FREQUENCY range USED for Bluetooth in Japan. 2472 to 2497 MHz is the frequency range used for Bluetooth in Japan. |
|
| 461. |
Which Method Is Used For Data Transfer? |
|
Answer» Asynchronous Connectionless (ACL) is DATA TRANSFER METHOD in BLUETOOTH Asynchronous Connectionless (ACL) is Data transfer method in Bluetooth |
|
| 462. |
What Is The Total Number Of Masters And Slaves In A Piconet? |
|
Answer» 1 Master and 7 Slaves. |
|
| 463. |
How Many Sco Links Are There In A Piconet? |
|
Answer» In a PICONET, there can be up to THREE SCO LINKS of 64,000 bits per SECOND each. In a piconet, there can be up to three SCO links of 64,000 bits per second each. |
|
| 464. |
Which Bluetooth Version Uses Adaptive Frequency Hopping? Why? |
|
Answer» In Version 1.2 Adaptive frequency hopping method is used, which IMPROVES RESISTANCE to radio INTERFERENCE, and provides higher TRANSMISSION speed. In Version 1.2 Adaptive frequency hopping method is used, which improves resistance to radio interference, and provides higher transmission speed. |
|
| 465. |
What Are The Other (competing Or Not) Wireless Technologies? |
|
Answer» Wi-Fi, IRDA, EDGE, UWB (ULTRA WIDE Band). Wi-Fi, IrDa, EDGE, UWB (Ultra Wide Band). |
|
| 466. |
What Is A Bluetooth Dongle? |
|
Answer» A device that HANGS outside of a computer, or phone to PROVIDE BLUETOOTH connection. A device that hangs outside of a computer, or phone to provide Bluetooth connection. |
|
| 467. |
How Does Bluetooth Use Frequency Hopping For Security? |
|
Answer» BLUETOOTH picks a random FREQUENCY out of 79 and then hops around the range about 1600 times PER second. Bluetooth picks a random frequency out of 79 and then hops around the range about 1600 times per second. |
|
| 468. |
Which Company Originally Conceived And Developed Bluetooth? |
|
Answer» Ericsson. Ericsson. |
|
| 469. |
List Some Technology Characteristic Of Bluetooth? |
|
Answer» OMNI directional, ADAPTIVE output power to minimize interference, Support Synchronous & asynchronous services, FAST Frequency HOPPING to avoid interference, Short data packets to maximize capacity during interface. Omni directional, Adaptive output power to minimize interference, Support Synchronous & asynchronous services, Fast Frequency Hopping to avoid interference, Short data packets to maximize capacity during interface. |
|
| 470. |
What Is The Frequency Range Used For Bluetooth In Europe And United States? |
|
Answer» 2402 MHZ to 2480 MHz are the frequency RANGES USED in USA and Europe. 2402 MHz to 2480 MHz are the frequency ranges used in USA and Europe. |
|
| 471. |
Which Method Is Primarily Used For Voice Transfer? |
|
Answer» SYNCHRONOUS CONNECTION Oriented (SCO) is a method primarily used for VOICE transfer. Synchronous Connection Oriented (SCO) is a method primarily used for Voice transfer. |
|
| 472. |
What Is Fec In Bluetooth? |
|
Answer» Forward ERROR Correction is a method by which BLUETOOTH increases its noise immunity. FEC is a method that enables a RECEIVER to not only detect, but also correct errors in a TRANSMISSION. Forward Error Correction is a method by which Bluetooth increases its noise immunity. FEC is a method that enables a receiver to not only detect, but also correct errors in a transmission. |
|
| 473. |
What Is Piconet? |
|
Answer» A COLLECTION of DEVICES connected through BLUETOOTH technology in an ad HOC FASHION. A collection of devices connected through Bluetooth technology in an ad hoc fashion. |
|
| 474. |
What Is Airport? |
|
Answer» AIRPORT is a wireless COMMUNICATIONS system, like Bluetooth. It is based on the IEEE 802.11 recommendation. It also uses 2.4 GHz frequency band, but its range is about 45 meters and it BOASTS a transmission SPEED of 11 Mbit/second. It is developed by Lucent Technologies. Airport is a wireless communications system, like Bluetooth. It is based on the IEEE 802.11 recommendation. It also uses 2.4 GHz frequency band, but its range is about 45 meters and it boasts a transmission speed of 11 Mbit/second. It is developed by Lucent Technologies. |
|
| 475. |
Bluetooth Signals Do Not Interfere With Our Pcs Or Cordless Phones Or Portables. Why? |
|
Answer» BLUETOOTH uses low-power signals, it plays AROUND in 2.45 GHz range, while most of CONSUMER devices would be using 900 MHZ. Bluetooth uses low-power signals, it plays around in 2.45 GHz range, while most of consumer devices would be using 900 MHz. |
|
| 476. |
Which Technology Is Used In Bluetooth For Avoiding Interference? |
|
Answer» FREQUENCY HOPPING is the TECHNOLOGY USED in BLUETOOTH. Frequency hopping is the technology used in Bluetooth. |
|
| 477. |
Do Bluetooth Devices Need Line Of Sight To Connect To One Another? |
|
Answer» No. No. |
|
| 478. |
Under What Frequency Range Does Bluetooth Work? |
|
Answer» 2.45 GHZ is the FREQUENCY RANGE. 2.45 GHz is the frequency range. |
|
| 479. |
What Is Fcc And How Does It Relate To Bluetooth? |
|
Answer» FCC is Federal Communication Commission, which issues licenses to the stations for SPECIFIC frequencies. It also decides who is ABLE to use which FREQUENCY for what PURPOSE. Since Bluetooth is USING unlicensed spectrum, FCC has no direct involvement with Bluetooth FCC is Federal Communication Commission, which issues licenses to the stations for specific frequencies. It also decides who is able to use which frequency for what purpose. Since Bluetooth is using unlicensed spectrum, FCC has no direct involvement with Bluetooth |
|
| 480. |
Is It Possible To Connect Multiple Bluetooth Hubs? |
|
Answer» No, only ONE HUB can be used at a time with a computer. USB or Serial DEVICES can be ADDED. No, only one hub can be used at a time with a computer. USB or Serial devices can be added. |
|
| 481. |
Why Can Bluetooth Equipment Integrate Easily In Tcp/ip Network? |
|
Answer» Because BLUETOOTH USES wireless LAN STANDARDS IEEE for data transmission. Because Bluetooth uses wireless LAN standards IEEE for data transmission. |
|
| 482. |
Give A Generic Description Of Bluetooth? |
|
Answer» Bluetooth is a low-cost, short-range (RF) LINKS between MOBILE PCS, mobile phones and other portable devices. Bluetooth can transmit through SOLID, non-metal objects. Bluetooth is a low-cost, short-range (RF) links between mobile PCs, mobile phones and other portable devices. Bluetooth can transmit through solid, non-metal objects. |
|
| 483. |
Why Is Bluetooth Called A Cable Replacement Technology? |
|
Answer» Bluetooth technology allows the creation of Personal AREA NETWORKS without CABLES or wires that are usual in HOME networks. Bluetooth technology allows the creation of Personal Area Networks without cables or wires that are usual in home networks. |
|
| 484. |
Finally, Who Is A Hacker? |
|
Answer» A HACKER is a person who breaks into computers usually by GAINING access to administrative controls. He uses to access the user id and password WITHOUT taking the permission. As a RESULT of this ARTICLE, you will definitely going to show best performance in the interview. A hacker is a person who breaks into computers usually by gaining access to administrative controls. He uses to access the user id and password without taking the permission. As a result of this article, you will definitely going to show best performance in the interview. |
|
| 485. |
What Is A Smart Card Or Chip Card Or Integrated Circuit Card (icc)? |
|
Answer» A SMART Card or Chip Card or Integrated CIRCUIT Card (ICC) is any pocket-sized card with embedded integrated circuits which can process data. This implies that it can receive input which is PROCESSED by the WAY of the ICC applications and delivered as an OUTPUT. A Smart Card or Chip Card or Integrated Circuit Card (ICC) is any pocket-sized card with embedded integrated circuits which can process data. This implies that it can receive input which is processed by the way of the ICC applications and delivered as an output. |
|
| 486. |
What Is A Password? |
|
Answer» A password is a secret word or string of CHARACTERS that is used for authentication to PROVE identity or gain access to a RESOURCE. The password MUST be kept secret from those not allowed access. A password is a secret word or string of characters that is used for authentication to prove identity or gain access to a resource. The password must be kept secret from those not allowed access. |
|
| 487. |
What A Security Mean In Your Sense? |
|
Answer» A security is a fungible, NEGOTIABLE instrument representing financial value. SECURITIES are generally sorted out into debt securities such as BANKNOTES, bonds and DEBENTURES and equity securities. For example: common stocks and derivative contracts such as forwards, futures, options and swaps. A security is a fungible, negotiable instrument representing financial value. Securities are generally sorted out into debt securities such as banknotes, bonds and debentures and equity securities. For example: common stocks and derivative contracts such as forwards, futures, options and swaps. |
|
| 488. |
What Is The Sense Of A Fingerprint? |
|
Answer» A fingerprint is an impression of the friction ridges on all parts of the finger. A friction ridge is a raised PORTION of the epidermis on the palmer (palm) or digits i.e. fingers and toes or plantar or sole skin, consisting of one or more connected ridge units of friction ridge skin. This is also KNOWN as Epidermal Ridges which is ORIGINATED by the underlying interface between the DERMAL papillae of the dermis and the interpapillary (RETE) pegs of the epidermis. A fingerprint is an impression of the friction ridges on all parts of the finger. A friction ridge is a raised portion of the epidermis on the palmer (palm) or digits i.e. fingers and toes or plantar or sole skin, consisting of one or more connected ridge units of friction ridge skin. This is also known as Epidermal Ridges which is originated by the underlying interface between the dermal papillae of the dermis and the interpapillary (rete) pegs of the epidermis. |
|
| 489. |
Define The Meaning Of An Authentication? |
|
Answer» Well sir, an Authentication factor is a piece of information and process used to authenticate or VERIFY the IDENTITY of a person or other entity requesting access under security constraints. In other word, it is a process of PROVING the identity of a computer or computer user. For users, it generally INVOLVES a user name and password. Computers usually PASS a code that identifies that they are part of a network. Well sir, an Authentication factor is a piece of information and process used to authenticate or verify the identity of a person or other entity requesting access under security constraints. In other word, it is a process of proving the identity of a computer or computer user. For users, it generally involves a user name and password. Computers usually pass a code that identifies that they are part of a network. |
|
| 490. |
Security Life Cycle? |
|
Answer» It can be phrased in many ways: what comes first – vulnerability or threat? How do you design a system with some options given? The candidate NEEDS to answer these questions using his/her own experience and OPINIONS. The objective is how best the candidate can explain what you asked. These are just some of the network security interview questions that are meant to GIVE you an idea of how a security interview goes. If you wish to share your experience or wish to add anything, PLEASE feel free to share using comments box. It can be phrased in many ways: what comes first – vulnerability or threat? How do you design a system with some options given? The candidate needs to answer these questions using his/her own experience and opinions. The objective is how best the candidate can explain what you asked. These are just some of the network security interview questions that are meant to give you an idea of how a security interview goes. If you wish to share your experience or wish to add anything, please feel free to share using comments box. |
|
| 491. |
Name The Port Used By Ping? |
|
Answer» Always remember that PING does not use any port. As PING is based upon LAYER 3 protocol, it NEVER uses any computer port. A simple VARIATION of the question could be: Does PING use UDP? Or Does PING use TCP? Again remember that UDP and TCP are layer 4 protocols and PING has NOTHING to do with them. Always remember that PING does not use any port. As PING is based upon layer 3 protocol, it never uses any computer port. A simple variation of the question could be: Does PING use UDP? Or Does PING use TCP? Again remember that UDP and TCP are layer 4 protocols and PING has nothing to do with them. |
|
| 492. |
What Is Cross Site Request Forgery And How To Defend Against It? |
|
Answer» The question can also be in two parts, in which case, candidates WITHOUT knowledge of CSRF would get lost. If asked combined, candidates can guess that cross site request FORGERY is something that relates to malicious scripting with phishing INTENTIONS. The question may also be framed as "what is cross site request". In this case, candidates cannot even guess that it is something malicious as the word 'forgery' is not there. The question can also be in two parts, in which case, candidates without knowledge of CSRF would get lost. If asked combined, candidates can guess that cross site request forgery is something that relates to malicious scripting with phishing intentions. The question may also be framed as "what is cross site request". In this case, candidates cannot even guess that it is something malicious as the word 'forgery' is not there. |
|
| 493. |
What Type Of Network Do You Use At Home? |
|
Answer» Again, this QUESTION is EMPLOYED to ASSESS the skills and networking background of CANDIDATES. "I don't have a network at home but I have handled NETWORKS at so and so places" is better than saying "sorry, I don't have a network at home". The latter would send out a signal that the candidate never had exposure to networks. Again, this question is employed to assess the skills and networking background of candidates. "I don't have a network at home but I have handled networks at so and so places" is better than saying "sorry, I don't have a network at home". The latter would send out a signal that the candidate never had exposure to networks. |
|
| 494. |
In Context Of Public Key Encryption, If You Are Using Both Signature And Encryption Features, What Key Will You Use For Encryption And Which One Will You Use For Signing? |
|
Answer» Answer is simple. One would always sign USING their key so the PUBLIC key is used for encryption. Most of the CANDIDATES tend to name public key for both signing and encryption. They MISS out the point that public key encryption also includes a private key. Answer is simple. One would always sign using their key so the public key is used for encryption. Most of the candidates tend to name public key for both signing and encryption. They miss out the point that public key encryption also includes a private key. |
|
| 495. |
How Does The Http Handle State? |
|
Answer» The answer is that HTTP cannot HANDLE STATES. HOWEVER, there is a hack. It employs use of cookies to handle the STATE. The answer is that HTTP cannot handle states. However, there is a hack. It employs use of cookies to handle the state. |
|
| 496. |
What Is Cross Site Scripting? |
|
Answer» Though the answer is STRAIGHTFORWARD, most candidates are unaware of the term. One of the most important security issues, cross scripting refers to PHISHING attempts by a website that employs a java SCRIPT that leads to deploying a MALWARE without the KNOWLEDGE of user. Though the answer is straightforward, most candidates are unaware of the term. One of the most important security issues, cross scripting refers to phishing attempts by a website that employs a java script that leads to deploying a malware without the knowledge of user. |
|
| 497. |
What Factors Would You Consider Before Deploying A Web Intrusion Detection System? |
|
Answer» An open question, the INTERVIEWER is trying to ASSESS the knowledge of candidate in different fields associated with web intrusion. These include: SSL; HTTP PROTOCOL; logging; alert mechanism; and SIGNATURE update POLICIES. An open question, the interviewer is trying to assess the knowledge of candidate in different fields associated with web intrusion. These include: SSL; HTTP protocol; logging; alert mechanism; and signature update policies. |
|
| 498. |
If You Need To Encrypt And Compress Data For Transmission, How Would You Achieve It? |
|
Answer» The candidate may start EXPLAINING what is data encryption, how s/he would encrypt the data and then compress it for transmission. However, the actual ANSWER would be to EXPLAIN how to compress and then talk about encryption. ENCRYPTING compressed data OFTEN leads to loss of data. The candidate may start explaining what is data encryption, how s/he would encrypt the data and then compress it for transmission. However, the actual answer would be to explain how to compress and then talk about encryption. Encrypting compressed data often leads to loss of data. |
|
| 499. |
Where Do You Get Updates On Security? |
|
Answer» This type of question is meant to see the INTEREST of the candidate in keeping ABREAST in the field of network security. If the candidate puts up a blank face, it is time to call next candidate. One can specify "news alerts" or any website(s) s/he checks out for LATEST information about security. This type of question is meant to see the interest of the candidate in keeping abreast in the field of network security. If the candidate puts up a blank face, it is time to call next candidate. One can specify "news alerts" or any website(s) s/he checks out for latest information about security. |
|
| 500. |
How Do I Convert A Numeric Ip Address Like 192.18.97.39 Into A Hostname Like Java.sun.com? |
|
Answer» STRING HOSTNAME = InetAddress.getByName("192.18.97.39").getHostName(). String hostname = InetAddress.getByName("192.18.97.39").getHostName(). |
|