Friday 13 July 2018

Cyber Security Interview Questions

Q: What is cybersecurity?
Cyber securities are defined as a group of processes, technologies and practices which are designed in a special way to protect computers, networks, access which are unauthorized and many more.
Q: What do you mean by Cross Site Scripting?
Cross Site Scripting generally tends to refer to an injected attack which is from the side of the client code, where, the one who is attacking has all the authorities in executive scripts which are malicious into an application of web or a website which is legitimate. Such kinds of attack are generally seen where the web application is making use of the non-encoded or non-validated inputs of the users inside the range of the output which is generated.
Q: What does Cyber security work for in a specific organization?
There are mainly three major reasons for which cyber security works: 
1. Confidentiality: Whenever information is transmitted from one place to another, a certain level of secrecy is maintained, which is known as confidentiality.
2. Integrity: This means that whenever there is a need for change in any document stored beforehand or new, it can only be done by an authorised person with proper and secure mechanism. 
3. Availability: Everything that is important should be readily available to the authorized people otherwise there will be no use of such information that is not available. 
 Q: What can you defend yourself from Cross Site Scripting attack?
Like any other injection attack, Cross Site Scripting attack can also be prevented by the use of the proper available sanitizers. Web developers have to have an eye on the gateways through which they receive information and these are the gateways which must be made as a barrier for malicious files. There are software or applications available for doing this, like the XSS Me for Firefox and domsnitch for Google Chrome. Also, the default web application firewall formula, popularly known as ModSecurity Plus will also do the job quite satisfactorily. 
Q: What do you mean by a Botnet?
A botnet is basically known to be a network or a group of computers which are affected by malware and are being constantly monitored by a server which throws the commands. The one is in control of the botnet can impact some serious damage through all those linked computers affected with malware.
Q: Strike the difference between vulnerability, a risk and a threat? 
These three terms are interlinked but they are very different from each other: 
1. Vulnerability: If your security program has a breach or weakness then different threats can further exploit the program and thus hack into your system to access data that is stored securely. 
2. Risk: If your system is not secure enough and has the chances of getting damaged or destruction along with loss of data when a threat exploits the vulnerability, it’s under huge risk. 
3. Threat: Something that is necessary for exploiting the vulnerability either knowingly or by accident in order to damage or destroy personal and official data. 
Q: How can the two factor authentication be implemented for the public facing websites?
The two factor authentication or shortly abbreviated as 2FA acts as another or an extra seal on your already protected account with a password. This two factor authentication can be implemented on public-facing websites like Microsoft, Twitter, Apple, Google and LinkedIn. For enabling such services, one can easily go to settings and then to manage security settings. Here, you will find the option of enabling two factor authentications.
Q: Being a professional, what is more important Threats or Vulnerabilities? 
]Despite the advancements in the security systems with the years, the threats and vulnerabilities have only increased with each passing day. Assessing threats is still not under the control of any high-tech security team. Although, a threat rises from vulnerability, so if we have proper control over them, we can still try and control threats. Secondly, the type of threats remains same but the vulnerabilities are what keep on changing. Thus we need to focus on building something that has a proper defence mechanism and also can track down new vulnerabilities. 
For more information visit Mindmajix

Friday 6 July 2018

Oracle Data Guard Interview Questions

If you're looking for Oracle Data Guard Interview Questions for Experienced or Freshers, you are at right place. There are lot of opportunities from many reputed companies in the world. According to research Oracle Data Guard has a market share of about 0.1%. So, You still have opportunity to move ahead in your career in Oracle Development. Mindmajix offers Advanced Oracle Data Guard Interview Questions 2018 that helps you in cracking your interview & acquire dream career as Data Management Specialist.
Q) Why do you think using Data Guard by Oracle is helpful to our work?
The benefits of using the software are many in any environment dealing with data. It ensures that the data stays protected and easily available. You get to take the load off from backups to standby operations database. The problems like gaps in the standby database are automatically detected and resolved. The guard broker allows automated role transition.
Q) Name the three top services offered by the Data Guard software?
The three top services offered by the software are:
1. Redoing the transport service
2. Applying of log service
3. Role transitional services
Q) Name the three protection modes available in the software.
The three protection modes that are available include maximum availability, protection and performance.
Q) What is the default protection mode of the software?
The default mode in the software Data Guard is Maximum performance.
Q) What are advantages offered by Maximum Performance protection mode?
The main advantage of this default mode is that the performance of the primary data is not affected while the highest possible level of protection for the data is ensured. The transactions begin to commit as soon as the redone data produced by the transactions get written on to the online log.
Q) What are the benefits of maximum protection mode?
This protection mode comes to the rescue when the primary database fails. The primary database shuts down and stops processing the transaction when this protection mode is enabled. So with this protection mode, you can be assured that there will be no data loss.
Q) How is the maximum protection mode enabled?
The redone data must get written in two places before committing the transaction- the online log and a standby database. This way the primary database can shut down but the data remains intact.
Q) What are the advantages of maximum availability protection mode?
The biggest advantage with one is that the availability of the primary database is uncompromised but the maximum possible level of protection is offered to the data. The transactions with this protection mode only commits when all the redone data needed to recover the transactions get written to a standby database and the online log.
Q) How is the protection mode changed?
The steps for changing the protection mode are as follows:
1. Go to the alter database option.
2. Set the standby database.
3. Select from the three available options of performance, availability and protection
Q) What is the number of standby databases that can be created?
It depends on what version of the software that is at your disposal. The general number ranges from nine to thirty standby databases.
Q) How would you create a physical Standby in this software?
The following easy steps can create a physical standby in the software:
  • Enabling of the forced logging
  • Creating of a password file
  • Configuration of a standby redone log
  • The archiving is enabled
  • Setting up of the parameters for initialization of the primary database
  • Configure the needful settings that support database of both the nodes.
Q) Mention the chief advantages of using Physical database standby in the software.
There is fourfold advantage to using the physical database standby.
1. The higher availability quotient
2. The high capability of balancing the load including both reporting as well as backup.
3. Protecting the data
4. Recovery of data is case of disasters
For more information visit Mindmajix