Home/general interview questions/Page 8
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
What is cross-site-scripting?
Cross-site scripting (XSS) is an injection where an attacker inserts script (typically Javascript) onto a page, and it essentially functions as if the administrators had created it themselves. A hacker can have total power to change the display, tweak the browser, or even steal your session cookie aRead more
Cross-site scripting (XSS) is an injection where an attacker inserts script (typically Javascript) onto a page, and it essentially functions as if the administrators had created it themselves.
A hacker can have total power to change the display, tweak the browser, or even steal your session cookie and sign in as an administrator with XSS.
See lessWhat is 2FA?
2FA stands for “two-factor identification.” It’s the second security layer that ensures anyone attempting to log into an online account is who they claim to be. First, the user must provide their username and password. Then, they must offer another piece of information, usually a code sent through eRead more
2FA stands for “two-factor identification.” It’s the second security layer that ensures anyone attempting to log into an online account is who they claim to be. First, the user must provide their username and password.
Then, they must offer another piece of information, usually a code sent through email or another device.
See lessWhat is CSRF?
CSRF stands for cross-site request forgery attack, where a victim is tricked into carrying out the attacker's instructions. Depending on the victim's degree of permission, the attack's effect will vary. Such attacks profit from the fact that when a user's identity has been verified, a website automaRead more
CSRF stands for cross-site request forgery attack, where a victim is tricked into carrying out the attacker’s instructions. Depending on the victim’s degree of permission, the attack’s effect will vary. Such attacks profit from the fact that when a user’s identity has been verified, a website automatically trusts them.
A CSRF requires two basic steps for execution:
First, the hacker dupes the target into opening a page or clicking on a link. Typically, social engineering and fraudulent links are used to do this. Next, the victim’s browser makes an artificially convincing request to the website.
See lessWhat is a botnet?
A botnet is a collection of computers infected with malware, and controlled by an attacker to carry out some background tasks to attack a specific target. For instance, the attacker might use all of the infected computers to speed up a dictionary attack on another system.
A botnet is a collection of computers infected with malware, and controlled by an attacker to carry out some background tasks to attack a specific target. For instance, the attacker might use all of the infected computers to speed up a dictionary attack on another system.
See lessWhat is IPv6?
In the Internet Protocol Version 6 (IPv6) addressing model, a 128-bit alphanumeric string known as an IPv6 address identifies an endpoint device. An IPv6 address is really made up of eight 16-bit groups, totaling 128 bits in length. Each group has four hexadecimal digits that serve as its representaRead more
In the Internet Protocol Version 6 (IPv6) addressing model, a 128-bit alphanumeric string known as an IPv6 address identifies an endpoint device.
An IPv6 address is really made up of eight 16-bit groups, totaling 128 bits in length. Each group has four hexadecimal digits that serve as its representation, and colons are used to separate groups.
The IPv6 standard was created to connect not only an expanding number of computing devices but also an expanding number of items with embedded connections.
In a scenario of the Internet of Things (IoT), inanimate objects, living things, and people all have the ability to independently exchange data via a network without the requirement for human-to-human or human-to-computer interaction.
See lessHow is a static IP address different from a dynamic IP address?
Dynamic IP address Your ISP permits you to use a dynamic IP address on a temporary basis. A dynamic address may be assigned to another device if it is not already in use. IP addresses are assigned dynamically via DHCP or PPPoE. Static IP address Static IP addresses remain constant over time. If youRead more
Dynamic IP address
Your ISP permits you to use a dynamic IP address on a temporary basis. A dynamic address may be assigned to another device if it is not already in use. IP addresses are assigned dynamically via DHCP or PPPoE.
Static IP address
Static IP addresses remain constant over time. If you have a web server, FTP server, or other internet resources requiring a set address that shouldn’t change, you can obtain a static IP address. An manually configured static IP address is required.
See lessWhat is an IP address?
An IP address is a specific identifier for a computer or device connected to the internet or a local network. "Internet Protocol" (abbreviated as IP) is a set of guidelines that control the format of data supplied across a local or public network. A series of digits separated by dots forms an IP addRead more
An IP address is a specific identifier for a computer or device connected to the internet or a local network. “Internet Protocol” (abbreviated as IP) is a set of guidelines that control the format of data supplied across a local or public network. A series of digits separated by dots forms an IP address. Each IP address block is shown as a four-digit permutation, such as 192.158.1.38.
The range of possible values for any integer in the set is 0 to 255. The entire IP addressing range is therefore 0.0.0.0 to 255.255.255.255. Each device is given an IP address by the Internet Assigned Numbers Authority (IANA), a division of the Internet Corporation for Assigned Names and Numbers (ICANN).
See lessWhat are ports?
Ports are an abstraction that allows programs to communicate via different protocols. We use them with transportation layer protocols like TCP, UDP, and SMTP. Different services are given a port number. For instance, HTTP uses TCP and UDP port 80. A pair of systems opens many sockets using the sameRead more
Ports are an abstraction that allows programs to communicate via different protocols. We use them with transportation layer protocols like TCP, UDP, and SMTP.
Different services are given a port number. For instance, HTTP uses TCP and UDP port 80. A pair of systems opens many sockets using the same transport protocol by employing port numbers.
See lessWhat is SSH?
SSH (Secure Shell) is the less complex and expensive network connection that hardware-based VPN solutions offer. With SSH, we may access a variety of TCP/IP apps remotely and securely through a secure tunnel and benefit from secure command-shell and file transfer functionality. It offers additionalRead more
SSH (Secure Shell) is the less complex and expensive network connection that hardware-based VPN solutions offer.
With SSH, we may access a variety of TCP/IP apps remotely and securely through a secure tunnel and benefit from secure command-shell and file transfer functionality. It offers additional advantages like pre-encryption compression, which may significantly reduce data encryption computational costs, and host authentication and data encryption & integrity.
See lessWhat distinguishes encryption from decryption?
Encryption converts plain text into ciphertext, while decryption converts ciphertext into plain text.
Encryption converts plain text into ciphertext, while decryption converts ciphertext into plain text.
See less