320 likes | 332 Views
This PPT on cybersecurity interview questions part 3 will focus on operating systems and applications questions. Here, you will be acquainted with various questions related to operating systems, sniffing tools, Linux, and many more. So, let's get started!<br><br>Start learning today's most in-demand skills for FREE. Visit us at https://www.simplilearn.com/skillup-f... Choose over 300 in-demand skills and get access to 1000 hours of video content for FREE in various technologies like Data Science, Cybersecurity, Project Management & Leadership, Digital Marketing, and much more. <br><br>Start learning today's most in-demand skills for FREE. Visit us at https://www.simplilearn.com/skillup-f... <br>Choose over 300 in-demand skills and get access to 1000 hours of video content for FREE in various technologies like Data Science, Cybersecurity, Project Management & Leadership, Digital Marketing, and much more. <br><br>Post Graduate Program in Cyber Security:<br>This Post Graduate Program in Cyber Security is designed to equip you with the skills required to become an expert in the rapidly growing field of Cyber Security. This cyber security course aims to help you stay abreast all the latest trends in cyber security as well. This Post Graduate Program in Cyber Security will help you learn comprehensive approaches to protecting your infrastructure and securing your data, including risk analysis and mitigation, cloud-based security, and compliance. You will receive foundational to advanced security skills through industry-leading certification courses that are part of the program.<br><br>Key Features:<br>u2705 Simplilearn Post Graduate Certificate<br>u2705 Masterclasses from MIT Faculty<br>u2705 Featuring Modules from MIT SCC and EC-Council<br>u2705 150 hours of Applied Learning<br>u2705 Get noticed by the top hiring companies<br>u2705 EC-Council learning kit<br>u2705 Industry case studies in cyber security<br>u2705 MIT SCC Professional Learning Community<br>u2705 Capstone project in 3 domains<br>u2705 25 hands-on projects<br><br>Learn more at: http://bit.ly/37Cf1SK
E N D
21 What is virtual memory? • Virtual memory is a storage allocation method in which secondary memory (Hard disk) is used as the primary memory (RAM) 4 GB from hard disk is used as RAM 4 GB RAM 1 TB hard disk
22 What are the different scheduling algorithms? First come first serve (FCFS) The process which requests the CPU first, gets the CPU allocation first
22 What are the different scheduling algorithms? First come first serve (FCFS) Shortest job first The process with the shortest execution time should be selected for execution next
22 What are the different scheduling algorithms? First come first serve (FCFS) Priority scheduling Shortest job first The scheduler selects the tasks to work as per the priority
22 What are the different scheduling algorithms? First come first serve (FCFS) Priority scheduling Shortest job first Multiple level queues Processes are assigned to a queue based on a specific property like the process priority, size of the memory, etc.
22 What are the different scheduling algorithms? First come first serve (FCFS) Priority scheduling Shortest job first Multiple level queues Shortest remaining time The process will be allocated to the task, which is closest to its completion
22 What are the different scheduling algorithms? First come first serve (FCFS) Priority scheduling Shortest job first Multiple level queues Shortest remaining time Round Robin Each process that comes in turn, gets an equal share of time
23 What are the steps involved in hacking a server or network? Cover tracks Maintain access 03 05 04 02 Gain access Scanning This phase has all the steps to gather evidence and information on the targets you want to attack 01 Reconnaissance
23 What are the steps involved in hacking a server or network? Cover tracks Maintain access 03 05 04 02 Gain access Take the information you gathered in recon and actively apply tools and techniques to collect more in-depth information on targets Scanning 01 Reconnaissance
23 What are the steps involved in hacking a server or network? Cover tracks Maintain access 03 05 04 02 In this phase, accurate attacks are leveled against the targets enumerated in the second phase Gain access Scanning 01 Reconnaissance
23 What are the steps involved in hacking a server or network? Cover tracks In this phase, hackers ensure that they have a way back into the compromised system Maintain access 03 05 04 02 Gain access Scanning 01 Reconnaissance
23 What are the steps involved in hacking a server or network? Cover tracks Attackers try to conceal their success and avoid detection by security professionals Maintain access 03 05 04 02 Gain access Scanning 01 Reconnaissance
24 What are various sniffing tools? Wireshark is used to analyze the network in detail TCPDUMP analyzes the packets getting which are transmitted MSN Sniifer 2 is first chat sniffing tool This tool is perfect for man in the middle attack Dsniff is a password and network analyzing tool EtherApe displays network activity graphically
25 What is an operating system? • Operating system is a software program that provides a platform for computer hardware to communicate and operate with the computer software • For input and output functions, operating system acts as intermediate between program and computer hardware • Some examples of operating system are Windows, Unix, Android, Linux, etc.
26 What is the difference between micro kernel and macro kernel?
27 What are the different types of operating systems? The computer operator places the jobs coming from input devices into batches Batched OS Real-time OS Distributed OS Multi programmed OS Time sharing OS
27 What are the different types of operating systems? Batched OS Real-time OS Distributed OS Many computers are interconnected with communication networks Multi programmed OS Time sharing OS
27 What are the different types of operating systems? Batched OS Real-time OS Distributed OS Time sharing OS minimizes the response time Multi programmed OS Time sharing OS
27 What are the different types of operating systems? Batched OS Real-time OS Distributed OS The operating system uses CPU scheduling to separate jobs Multi programmed OS Time sharing OS
27 What are the different types of operating systems? Batched OS • Operating system gives maximum time to critical operations Real-time OS Distributed OS Multi programmed OS Time sharing OS
What is the difference between logical address space and physical address space? 28
What is the difference between logical address space and physical address space? 28 Relocation register Logical address Physical address 346 14346 CPU 14000 MMU Memory Diagram representing logical and physical address
29 Which shells are used in Linux? Bourne again shell is default for Linux distributions bash ksh csh zsh fish Korn shell is a high-level programming shell which supports associative arrays and built-in operations C shell does spelling corrections and job control Z shell provides unique features like filename generation, start up files, etc. Friendly interactive shell which provides features like auto-suggestions, configurations, etc.
30 What are the process states in Linux? Ready Zombie Running Completed or Terminated Blocked or wait
30 What are the process states in Linux? In this state, the process is created and is ready to run Ready Zombie Running Completed or Terminated Blocked or wait
30 What are the process states in Linux? Ready Zombie Here, the process is being executed Running Completed or Terminated Blocked or wait
30 What are the process states in Linux? Ready Zombie Running Completed or Terminated In this state, the process is waiting for input from the user Blocked or wait
30 What are the process states in Linux? Ready Zombie Running Here, either the process completed execution or was terminated by the OS Completed or Terminated Blocked or wait
30 What are the process states in Linux? Ready In this state, the process is terminated but the process table still holds the information Zombie Running Completed or Terminated Blocked or wait
Join us to learn more! simplilearn.com UNITED STATES Simplilearn Solutions Pvt. Limited 201 Spear Street, Suite 1100 San Francisco, CA 94105 Phone: (415) 741-3319 INDIA Simplilearn Solutions Pvt. Limited #53/1C, 24th Main, 2nd Sector HSR Layout, Bangalore 560102 Phone: +91 8069999471 UNITED STATES Simplilearn Solutions Pvt. Limited 801 Corporate Center Drive, Suite 138 Raleigh, NC 27607 Phone: (919) 205-5565