<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Comodo India Interview Questions and Answers - Wikitechy</title>
	<atom:link href="https://www.wikitechy.com/interview-questions/tag/comodo-india-interview-questions-and-answers/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.wikitechy.com/interview-questions/tag/comodo-india-interview-questions-and-answers/</link>
	<description>Interview Questions</description>
	<lastBuildDate>Thu, 05 May 2022 09:11:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.wikitechy.com/interview-questions/wp-content/uploads/2025/10/cropped-wikitechy-icon-32x32.png</url>
	<title>Comodo India Interview Questions and Answers - Wikitechy</title>
	<link>https://www.wikitechy.com/interview-questions/tag/comodo-india-interview-questions-and-answers/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What is Comodo Antivirus ?</title>
		<link>https://www.wikitechy.com/interview-questions/ethical-hacking/what-is-comodo-antivirus/</link>
					<comments>https://www.wikitechy.com/interview-questions/ethical-hacking/what-is-comodo-antivirus/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Mon, 19 Jul 2021 10:58:47 +0000</pubDate>
				<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Ample Technologies interview questions and answers]]></category>
		<category><![CDATA[anti virus]]></category>
		<category><![CDATA[Applied Materials interview questions and answers]]></category>
		<category><![CDATA[Brillio Technologies Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[CGI Group Inc interview questions and answers]]></category>
		<category><![CDATA[comodo]]></category>
		<category><![CDATA[comodo antivirus]]></category>
		<category><![CDATA[comodo antivirus for linux]]></category>
		<category><![CDATA[comodo antivirus for pcis comodo antivirus good]]></category>
		<category><![CDATA[comodo antivirus offline installer]]></category>
		<category><![CDATA[comodo antivirus price]]></category>
		<category><![CDATA[comodo antivirus review]]></category>
		<category><![CDATA[comodo antivirus windows]]></category>
		<category><![CDATA[comodo cloud antivirus]]></category>
		<category><![CDATA[comodo download]]></category>
		<category><![CDATA[comodo firewall]]></category>
		<category><![CDATA[comodo free]]></category>
		<category><![CDATA[comodo free firewall]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[comodo internet security]]></category>
		<category><![CDATA[comodo internet security 11]]></category>
		<category><![CDATA[comodo internet security free]]></category>
		<category><![CDATA[comodo internet security premium 11]]></category>
		<category><![CDATA[comodo internet security pro 10 crack]]></category>
		<category><![CDATA[comodo internet securityis comodo antivirus safe]]></category>
		<category><![CDATA[comodos]]></category>
		<category><![CDATA[CTS interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Deloitte interview questions and answers]]></category>
		<category><![CDATA[DHFL Pramerica Life Insurance Company Ltd interview questions and answers]]></category>
		<category><![CDATA[eInfochips interview questions and answers]]></category>
		<category><![CDATA[Ernst and Young Services Pvt. Ltd interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[Intas Pharmaceuticals Ltd interview questions and answers]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[Persistent Systems interview questions and answers]]></category>
		<category><![CDATA[QuisLex Legal Services Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Societe Generale Global Solution Center interview questions and answers]]></category>
		<category><![CDATA[Syntel interview questions and answers]]></category>
		<category><![CDATA[TUV SUD South Asia Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtusa Consulting Services Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Wipro interview questions and answers]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=1048</guid>

					<description><![CDATA[Answer : Comodo Antivirus is the only antivirus solution...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-comodo-antivirus" class="color-pink" style="text-align: justify;">What is Comodo Antivirus ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Comodo Antivirus is the only <a href="https://www.wikitechy.com/technology/top-10-best-antivirus-apps-for-android-smartphones/" target="_blank" rel="noopener">antivirus</a> solution that provides protection against all new viruses.It optimizes system performance.</li>
<li>Comodo Antivirus allows only safe applications to run.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block" src="https://cdn.wikitechy.com/interview-questions/ethical-hacking/what-is-comodo-antivirus.png" alt="What is Comodo Antivirus" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="advantages" class="color-purple">Advantages</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Comodo antivirus provides on-access protection from viruses and other <a href="https://www.wikitechy.com/technology/4-scariest-types-malware/" target="_blank" rel="noopener">malware</a>.</li>
<li>Virus definitions are regularly updated, in the background.</li>
<li>Works with Windows (10, 8, 7, Vista, XP).</li>
<li>Includes a &#8220;Game Mode&#8221; (silent detection).</li>
<li>64-bit versions are also available.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="disadvantages" class="color-purple">Disadvantages</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Several other programs and system settings are included that you may want to disable.</li>
<li>There is no use of business only we can use at home.</li>
<li>Very large setup file (170 MB) that may take a while to download.</li>
<li>Initial updates may take a while to complete.</li>
</ul>
</div>
</div>
<div class="read-also" style="text-align: justify;"></div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="features-of-comodo-antivirus" class="color-green">Features of Comodo Antivirus</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">Proactive antivirus engine that automatically detects and eliminates viruses, worms, and other malware.</li>
<li style="text-align: justify;">Powerful on-demand.</li>
<li style="text-align: justify;">Powerful on-access.</li>
<li style="text-align: justify;">Perfect scheduling scan capabilities.</li>
<li style="text-align: justify;">Easily drag and drop items onto the home screen to run an instant virus scan.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/ethical-hacking/what-is-comodo-antivirus/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is port and port number ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-port-and-port-number/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-port-and-port-number/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 20:14:19 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[computer ports]]></category>
		<category><![CDATA[computer ports list]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how to find port number in windows 7 using cmd]]></category>
		<category><![CDATA[how to find someones port with their ip]]></category>
		<category><![CDATA[how to get ip address and port number from url]]></category>
		<category><![CDATA[how to port number]]></category>
		<category><![CDATA[https port]]></category>
		<category><![CDATA[https port number]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[network port]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[port]]></category>
		<category><![CDATA[port list]]></category>
		<category><![CDATA[port number]]></category>
		<category><![CDATA[port number classification]]></category>
		<category><![CDATA[port number list]]></category>
		<category><![CDATA[port number table]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[tcp port]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[types of ports in networking]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[web portal]]></category>
		<category><![CDATA[well known port numbers]]></category>
		<category><![CDATA[what is my port id]]></category>
		<category><![CDATA[what is my port number]]></category>
		<category><![CDATA[what is my port number mac]]></category>
		<category><![CDATA[what is port]]></category>
		<category><![CDATA[what is port address in computer network]]></category>
		<category><![CDATA[what is port in computer]]></category>
		<category><![CDATA[what is port in computer network]]></category>
		<category><![CDATA[what is port number]]></category>
		<category><![CDATA[whats in port]]></category>
		<category><![CDATA[why do we need port numbers in networking]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=787</guid>

					<description><![CDATA[Answer : One of the circuit connection point on a front end processor...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-port-and-port-number" class="color-pink">What is port and port number ?</h2>
<ul>
<li>One of the circuit connection point on a front end processor or local intelligence control is called port.</li>
<li>In computer networks, the term <a href="https://www.wikitechy.com/tutorials/linux/how-to-open-read-and-write-from-serial-port-in-c" target="_blank" rel="noopener">port</a> can refer either physical or virtual connection point.</li>
</ul>
<p><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-4313" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ports.png" alt="" width="960" height="827" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ports.png 960w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ports-300x258.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ports-768x662.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ports-390x336.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ports-820x706.png 820w" sizes="(max-width: 960px) 100vw, 960px" /></p>
</div>
</div>
<div class="TextHeading">
<div class="hddn">
<h2 id="characteristics-of-ports" class="color-green">Characteristics of Ports</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<p>A port has the following characteristics −</p>
<ul>
<li>External devices are connected to a computer using cables and ports.</li>
<li>Ports are slots on the motherboard into which a cable of external device is plugged in.</li>
<li>Examples of external devices attached via ports are the mouse, keyboard, monitor, microphone, speakers, etc.</li>
</ul>
</div>
</div>
<div class="ImageContent">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-port.jpg" alt="What is port" /></div>
</div>
<div class="TextHeading">
<div class="hddn">
<h2 id="port-number" class="color-green">Port Number</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li>A port number is the logical address of each application or process that uses a network or the Internet to communicate.</li>
<li>A port number uniquely identifies a network-based application on a computer.</li>
<li>Each application/program is allocated a 16-bit integer port number.</li>
<li>This number is assigned automatically by the <a href="https://www.wikitechy.com/technology/27-handy-chrome-os-commands-run-crosh/" target="_blank" rel="noopener">OS</a>, manually by the user or is set as a default for some popular applications.</li>
</ul>
</div>
</div>
<div class="ImageContent">
<div class="hddn"><img decoding="async" class="img-responsive center-block" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-port-number.png" alt=" What is port number" /></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-port-and-port-number/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is MAC Address and How to get mac address in my computer ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-mac-address-and-how-to-get-mac-address-in-my-computer/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-mac-address-and-how-to-get-mac-address-in-my-computer/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 20:11:35 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[find device by mac address]]></category>
		<category><![CDATA[find device details from mac address]]></category>
		<category><![CDATA[find device name by mac address]]></category>
		<category><![CDATA[find mac]]></category>
		<category><![CDATA[find my iphone on mac]]></category>
		<category><![CDATA[find my mac]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how to find ip address on mac]]></category>
		<category><![CDATA[how to find mac address]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[ipconfig mac]]></category>
		<category><![CDATA[mac address]]></category>
		<category><![CDATA[mac address finder]]></category>
		<category><![CDATA[mac address lookup]]></category>
		<category><![CDATA[mac address search]]></category>
		<category><![CDATA[mac address to ip]]></category>
		<category><![CDATA[mac id]]></category>
		<category><![CDATA[mac identifier]]></category>
		<category><![CDATA[mac ip]]></category>
		<category><![CDATA[mac lookup]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[my mac address]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what is mac address]]></category>
		<category><![CDATA[wifi mac address]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=786</guid>

					<description><![CDATA[Answer : A Media Access Control (MAC) address is a 48-bit address stored...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-protocol" class="color-pink" style="text-align: justify;">What is Protocol ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li><a href="https://www.wikitechy.com/final-year-project/dotnet/server-hacking/what-is-protocol" target="_blank" rel="noopener">Protocol</a> is a <b>special set of rules</b> for communication data.</li>
<li>Network protocol = Rules and conventions/conditions for communication between network devices.</li>
<li><b>Network protocols</b> defines the mechanism of devices to identify and establish the connections between each other + formatting rules that specify how data is packaged into messages sent and received.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/tutorials/ethical-hacking/mac-address-lookup.png" alt=" MAC Address Lookup" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="what-is-mac-address" class="color-purple">What is MAC Address ?</h2>
<p><img decoding="async" class="alignnone size-full wp-image-4315 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/mac.png" alt="" width="790" height="502" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/mac.png 790w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/mac-300x191.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/mac-768x488.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/mac-390x248.png 390w" sizes="(max-width: 790px) 100vw, 790px" /></p>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>A <b>Media Access Control (MAC) address is a 48-bit address</b> stored in the network Interface card.</li>
<li>It is used for <b>communication between two hosts</b> in an Ethernet environment.</li>
<li>It is nothing but a hardware /physical address of a computer.</li>
<li>A MAC address is supposed to be globally unique and this will not be duplicated.</li>
<li>The 48 bit contains &#8211; First 24 bits ( <b>User ID -&gt; Card Buyer ID</b> ) + second 24 bits (<b>card manufacturer</b>)</li>
<li>The address is written in the form of <b>12</b> hexadecimal digits. For example, consider the following MAC address:
<ul>
<li><b>D8-D3-85-EB-12-E3</b></li>
</ul>
</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/tutorials/ethical-hacking/mac-address-search.png" alt=" MAC Address Search" /></div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Every hexadecimal character represents 4 bits, so the first six hexadecimal characters represent the vendor (in this case, Hewlett Packard).</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="levels-of-addressing" class="color-red">Levels Of Addressing</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li><a href="https://www.wikitechy.com/interview-questions/networking/what-is-an-addressing-scheme/" target="_blank" rel="noopener">Four levels of addresses</a> are used in an internet employing the <b>TCP/IP protocols</b>:
<ul>
<li>Physical Addresses</li>
<li>Logical Addresses</li>
<li>Port Addresses</li>
<li>Specific Addresses</li>
</ul>
</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="to-get-mac-address" class="color-green">To get MAC address</h2>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="option-1" class="color-pink">Option 1 :</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Click the <b>Network Icon</b> on Taskbar</li>
<li>Click the connected network and <b>click the properties</b> which are shown in the figure</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/tutorials/ethical-hacking/find-my-mac.png" alt=" Find my MAC" /></div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>The network setting window open and shows the mac address.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/tutorials/ethical-hacking/mac-address-finder.png" alt=" MAC Address Finder" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="option-2" class="color-pink">Option 2 :</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Open command prompt and type <code>getmac</code> to get the mac address</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/tutorials/ethical-hacking/my-mac-address.png" alt=" My MAC Address" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="option-3" class="color-pink">Option 3 :</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Navigate to <b>Control Panel &gt; Network and Internet &gt; Network Connections</b></li>
<li>Right click the connection and <b>click status</b> within the dropdown</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/tutorials/ethical-hacking/how-to-find-mac-address.png" alt=" How to find MAC Address" /></div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Click <b>Details</b> buttons in the status window</li>
<li>Then the Network Details windows open and shows the MAC address(Physical address)</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/tutorials/ethical-hacking/mac-identifier.png" alt=" MAC Identifier" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="option-4" class="color-pink">Option 4 :</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Open command prompt and type <a href="https://www.wikitechy.com/technology/use-ipconfig-windows-command-line-utility/" target="_blank" rel="noopener">ipconfig /all</a> (have a gap between g and /).</li>
</ul>
</div>
</div>
<div class="ImageContent">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/tutorials/ethical-hacking/ipconfig-mac.png" alt=" ipconfig MAC" /></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-mac-address-and-how-to-get-mac-address-in-my-computer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Spoofing ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-spoofing/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-spoofing/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 20:10:24 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[account spoofing]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[differentiate between spoofing]]></category>
		<category><![CDATA[dns spoofing]]></category>
		<category><![CDATA[email spoofing]]></category>
		<category><![CDATA[email spoofing tool]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[gps spoof]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how to detect ip spoofing]]></category>
		<category><![CDATA[how to stop email spoofing]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[ip spoofing]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[measuresarp spoofing]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[network spoofer]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[phishing and pharming with respect to the internetdns spoofing vs phishing]]></category>
		<category><![CDATA[phishing and spoofing attacks definition]]></category>
		<category><![CDATA[phishing and spoofing cases]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[spoof app]]></category>
		<category><![CDATA[spoof call]]></category>
		<category><![CDATA[spoof caller id]]></category>
		<category><![CDATA[spoof email address]]></category>
		<category><![CDATA[spoof meaning]]></category>
		<category><![CDATA[spoofee]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[spoofing attack]]></category>
		<category><![CDATA[spoofing attack counter]]></category>
		<category><![CDATA[spoofing email]]></category>
		<category><![CDATA[spoofing example]]></category>
		<category><![CDATA[spoofing is an example of deception]]></category>
		<category><![CDATA[spoofing meaning]]></category>
		<category><![CDATA[spoofing meaning in networking]]></category>
		<category><![CDATA[spoofing vs phishing]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[types of spoofing]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what is email spoofing]]></category>
		<category><![CDATA[what is spoofing]]></category>
		<category><![CDATA[what is spoofing attack]]></category>
		<category><![CDATA[what is spoofing email]]></category>
		<category><![CDATA[what is spoofing in computer]]></category>
		<category><![CDATA[what is the difference between phishing spamming spoofing and sniffing]]></category>
		<category><![CDATA[which of the following is an example of spoofing]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=785</guid>

					<description><![CDATA[Answer : Spoofing is that the act of disguising a communication...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-spoofing" class="color-pink" style="text-align: justify;">What is Spoofing ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Spoofing is that the act of disguising a communication from an unknown resource as being from a well-known, trusted resource.</li>
<li>Spoofing will apply to emails, <a href="https://www.wikitechy.com/technology/top-20-android-apps-used-hackers-hacking/" target="_blank" rel="noopener">phone</a> calls, and websites, or will be a lot of technical, like a pc spoofing an IP address, Address Resolution Protocol (ARP), or Domain name System (DNS) server.</li>
<li>Spoofing will be used to gain access to a target’s personal information, describe malware through infected links or attachments, bypass <a href="https://www.wikitechy.com/tutorials/javascript/how-does-access-control-allow-origin-header-work" target="_blank" rel="noopener">network access controls</a>, or distribute traffic to conduct a denial-of-service attack.</li>
<li>Spoofing is usually the means a vulgar actor gains access so as to execute a bigger cyber attack like a complicated persistent threat or a man-in-the-middle attack.</li>
<li>Successful attacks on organizations will cause infected pc systems and networks, data breaches, and/or loss of revenue-all vulnerable to have an effect on the organization’s public reputation.</li>
<li>Additionally, spoofing that ends up in the rerouting of web traffic will overwhelm networks or lead customers/clients to malicious sites aimed at stealing info or distributing malware.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-spoofing.png" alt="What is spoofing" /></div>
</div>
<div class="text-center row" style="text-align: justify;">
<div class="col-sm-12">
<div id="bsa-zone_1590522538159-8_123456"></div>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="email-spoofing" class="color-green">Email spoofing</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Email spoofing is that the fake of an email header so the message seems to have originated from somebody or somewhere apart from the particular source.</li>
<li>Email spoofing may be a plan of action utilized in phishing and <a href="https://www.wikitechy.com/interview-questions/networking/what-is-spam/">spam</a> campaigns because people are more likely to open an email after they assume it&#8217;s been sent by a legitimate source.</li>
<li>The goal of email spoofing is to need recipients to open, and probably even answer, a solicitation.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/email-spoofing.png" alt="Email Spoofing" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="ip-spoofing" class="color-green">IP Spoofing</h2>
<p><img decoding="async" class="alignnone size-full wp-image-4317 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-spoofing.webp" alt="" width="1456" height="663" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-spoofing.webp 1456w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-spoofing-300x137.webp 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-spoofing-1024x466.webp 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-spoofing-768x350.webp 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-spoofing-390x178.webp 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-spoofing-820x373.webp 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-spoofing-1180x537.webp 1180w" sizes="(max-width: 1456px) 100vw, 1456px" /></p>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li><a href="https://www.wikitechy.com/tutorials/ethical-hacking/computer-hacking-tutorial/ip-spoofing" target="_blank" rel="noopener">IP (Internet Protocol)</a> forms the third layer of the ISO model. It is the network protocol which is used for the transmission of messages over the internet. Every email message sent has details in the message header of the IP address of the sender (source address). Hackers and scammers alter the header details to mask their true identity by editing the source address. The emails then look to have been transmitted by a trusted source. There are two types of IP spoofing.
<ul>
<li>Man in the Middle Attacks</li>
<li>Denial of Service (DoS) Attacks</li>
</ul>
</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4318" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip.png" alt="" width="1138" height="489" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip.png 1138w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-300x129.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-1024x440.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-768x330.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-390x168.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-820x352.png 820w" sizes="(max-width: 1138px) 100vw, 1138px" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="caller-id-spoofing" class="color-green">Caller ID Spoofing</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Caller ID spoofing is when a caller with intent fakes the information transmitted to your caller ID display to disguise their identity.</li>
<li>Spoofing is often used as part of an attempt to trick someone into giving away valuable personal information so it can be used in fraudulent activity or sold illegally, but also can be used legitimately, for example, to display the toll-free number for a business.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="arp-spoofing" class="color-green">ARP Spoofing</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>ARP poison routing (APR) or ARP cache poisoning, a method of attacking an Ethernet LAN by updating the target computer&#8217;s.</li>
<li>ARP cache with both a fake ARP request and reply packets in an effort to change the Layer 2 Ethernet MAC address (i.e., the address of the network card) to one that the attacker can monitor.</li>
<li>Because the ARP replies have been fake, the target computer sends frames that were meant for the original destination to the attacker&#8217;s computer first so the frames can be read.</li>
<li>A successful APR attempt is invisible to the user.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/arp-spoofing.png" alt="ARP Spoofing" /></div>
</div>
<div style="text-align: justify;">
<div id="bsa-zone_1590522394795-6_123456"></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="dns-server-spoofing" class="color-green">DNS Server Spoofing</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li><a href="https://www.wikitechy.com/interview-questions/networking/what-is-dns-and-dns-port-number" target="_blank" rel="noopener">DNS</a> (Domain Name System) servers resolve URLs and email addresses to corresponding IP addresses.</li>
<li>DNS spoofing allows attackers to distract traffic to a different IP address, leading victims to sites that extent malware.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/dns-spoofing.png" alt="DNS Spoofing" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="website-spoofing" class="color-green">Website Spoofing</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">Website spoofing means when a website is designed to copycat an existing site known and/or trusted by the user.</li>
<li style="text-align: justify;">Attackers use these sites to gain login and other personal information from users.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-spoofing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is IP ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-ip/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-ip/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 20:05:57 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[4 addresswhat can you learn from an ip address]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[advanced ip scanner]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[check ip]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how to change ip address]]></category>
		<category><![CDATA[how to find someone using their ip address]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[if someone has my ip address what can they doidentify ip address owner]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[ip address]]></category>
		<category><![CDATA[ip address classes]]></category>
		<category><![CDATA[ip address example]]></category>
		<category><![CDATA[ip address format]]></category>
		<category><![CDATA[ip address location]]></category>
		<category><![CDATA[ip address lookup]]></category>
		<category><![CDATA[ip address tracker]]></category>
		<category><![CDATA[ip adress]]></category>
		<category><![CDATA[ip location]]></category>
		<category><![CDATA[ip lookup]]></category>
		<category><![CDATA[ip tracker]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[mi ip]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[my ip address location]]></category>
		<category><![CDATA[my ip location]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[public ip address range]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[track ip address exact location]]></category>
		<category><![CDATA[types of ip address]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what does an ip address tell you]]></category>
		<category><![CDATA[what is ip]]></category>
		<category><![CDATA[what is ip address]]></category>
		<category><![CDATA[what is ipv4 address]]></category>
		<category><![CDATA[what is my ipv]]></category>
		<category><![CDATA[what is my local ip address]]></category>
		<category><![CDATA[who is ip]]></category>
		<category><![CDATA[whois ip]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=784</guid>

					<description><![CDATA[Answer : IP stands for Internet Protocol which is the communications protocol...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-ip" class="color-pink">What is IP ?</h2>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4320 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-addressing.png" alt="" width="1411" height="674" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-addressing.png 1411w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-addressing-300x143.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-addressing-1024x489.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-addressing-768x367.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-addressing-390x186.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-addressing-820x392.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-addressing-1180x564.png 1180w" sizes="(max-width: 1411px) 100vw, 1411px" /></p>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li>IP stands for <a href="https://www.wikitechy.com/interview-questions/networking/what-is-the-difference-between-static-and-dynamic-ip/" target="_blank" rel="noopener">Internet Protocol</a> which is the communications protocol of digital message formats and rules for exchanging messages between computers across a single network or a series of interconnected networks, using the Internet Protocol Suite (often referred to as <a href="https://www.wikitechy.com/interview-questions/networking/what-is-an-addressing-scheme/" target="_blank" rel="noopener">TCP/IP</a></li>
<li>Internet Protocol is connectionless and unreliable protocol. It ensures no guarantee of successfully transmission of data.</li>
<li>Messages are exchanged as datagrams, also known as data packets or just packets.</li>
<li>IP consisting of four abstraction <a href="https://www.wikitechy.com/interview-questions/networking/what-are-the-layers-of-osi/" target="_blank" rel="noopener">layers</a> : link layer (lowest), Internet layer, transport layer and application layer (highest).</li>
</ul>
</div>
</div>
<div class="read-also"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-ip.jpg" alt=" What is IP Address" /></div>
<h3 id="basics-of-ip-address-in-networking">Basics of IP Address in Networking</h3>
<div></div>
<div><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4321" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address.png" alt="" width="1528" height="872" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address.png 1528w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-300x171.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-1024x584.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-768x438.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-390x223.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-820x468.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-1180x673.png 1180w" sizes="(max-width: 1528px) 100vw, 1528px" /></div>
<div></div>
<h3 id="ip-address-range-table">IP Address Range Table</h3>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4322" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-range-table.png" alt="" width="1933" height="745" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-range-table.png 1933w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-range-table-300x116.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-range-table-1024x395.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-range-table-768x296.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-range-table-1536x592.png 1536w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-range-table-390x150.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-range-table-820x316.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-range-table-1180x455.png 1180w" sizes="(max-width: 1933px) 100vw, 1933px" /></p>
<div class="ImageContent"></div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-ip/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is DNS and DNS port number ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-dns-and-dns-port-number/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-dns-and-dns-port-number/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 20:02:50 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allow Both TCP and UDP Port 53 to Your DNS Servers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[dn sport]]></category>
		<category><![CDATA[dns example]]></category>
		<category><![CDATA[dns port]]></category>
		<category><![CDATA[dns port 53]]></category>
		<category><![CDATA[dns port number]]></category>
		<category><![CDATA[dns protocol]]></category>
		<category><![CDATA[dns protocol port]]></category>
		<category><![CDATA[dns query]]></category>
		<category><![CDATA[DNS query types and how to use DNS in performance troubleshooting]]></category>
		<category><![CDATA[dns server]]></category>
		<category><![CDATA[DNS servers and firewall settings]]></category>
		<category><![CDATA[dns tcp or udp]]></category>
		<category><![CDATA[dns tcp port]]></category>
		<category><![CDATA[dns types]]></category>
		<category><![CDATA[dns udp port]]></category>
		<category><![CDATA[Domain Name System]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[How DNS Query Works]]></category>
		<category><![CDATA[How do I configure my firewall for DNS]]></category>
		<category><![CDATA[http port]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[port 23]]></category>
		<category><![CDATA[port 53]]></category>
		<category><![CDATA[port 53 domain]]></category>
		<category><![CDATA[port 53 vulnerabilities]]></category>
		<category><![CDATA[port number]]></category>
		<category><![CDATA[port number table]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Specifying Port Settings for DNS]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[tcp port number]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[What is a DNS Query]]></category>
		<category><![CDATA[what is dns and how it works]]></category>
		<category><![CDATA[What Is DNS Server Or Protocol Port Number]]></category>
		<category><![CDATA[what is port 53 used for]]></category>
		<category><![CDATA[Why DNS Works On Both TCP and UDP]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=783</guid>

					<description><![CDATA[Answer : The Domain Name System (DNS) is the phonebook of the Internet...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-dns-and-dns-port-number" class="color-pink">What is DNS and DNS port number ?</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li>The <a href="https://www.wikitechy.com/technology/power-dns-authoritative-recursor-dns-server/" target="_blank" rel="noopener">Domain Name System (DNS)</a> is the phonebook of the Internet. Humans access information online through domain names, like wikitechy.com. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to <a href="https://www.wikitechy.com/tutorials/linux/how-to-get-the-ip-address-of-the-machine-in-linux" target="_blank" rel="noopener">IP addresses</a> so browsers can load Internet resources.</li>
<li>Each device connected to the Internet has a unique IP address which other machines use to find the device. <a href="https://www.wikitechy.com/technology/flush-dns-cache-linux/" target="_blank" rel="noopener">DNS servers</a> eliminate the need for humans to memorize IP addresses such as 192.168.1.1 (in IPv4), or more complex newer alphanumeric IP addresses such as 2400:cb00:2048:1::c629:d7a2 (in IPv6).</li>
<li>The DNS uses TCP Port 53 for zone transfers, for maintaining coherence between the DNS database and the server.</li>
</ul>
</div>
</div>
<div class="text-center row">
<div class="col-sm-12">
<div id="bsa-zone_1590522538159-8_123456"></div>
</div>
</div>
<div class="ImageContent">
<div class="hddn"><img decoding="async" class="img-responsive center-block" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-dns.png" alt=" What is DNS" /></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-dns-and-dns-port-number/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is DND ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-dnd/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-dnd/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:39:55 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[activate dnd]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[dnd]]></category>
		<category><![CDATA[dnd activation]]></category>
		<category><![CDATA[dnd complaint]]></category>
		<category><![CDATA[dnd meaning]]></category>
		<category><![CDATA[dnd meaning phone]]></category>
		<category><![CDATA[dnd mode]]></category>
		<category><![CDATA[dnd number]]></category>
		<category><![CDATA[dnd service deactivation]]></category>
		<category><![CDATA[dnd sms format]]></category>
		<category><![CDATA[dnd statu]]></category>
		<category><![CDATA[do not]]></category>
		<category><![CDATA[do not disturb]]></category>
		<category><![CDATA[do not disturb alarm]]></category>
		<category><![CDATA[do not disturb iphone]]></category>
		<category><![CDATA[do not disturb iphone text messages]]></category>
		<category><![CDATA[do not disturb mode]]></category>
		<category><![CDATA[do not disturb number]]></category>
		<category><![CDATA[do not disturbde]]></category>
		<category><![CDATA[does do not disturb block alarms]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how to activate dnd]]></category>
		<category><![CDATA[how to deactivate dnd service]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[start dnd]]></category>
		<category><![CDATA[strai dnd]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what does do not disturb do]]></category>
		<category><![CDATA[what does do not disturb do on iphone]]></category>
		<category><![CDATA[what is dnd in mobile]]></category>
		<category><![CDATA[what is dnd mean]]></category>
		<category><![CDATA[what is dnd mode]]></category>
		<category><![CDATA[what is do not disturb]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=781</guid>

					<description><![CDATA[Answer : DND means Do Not Disturb...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-dnd" class="color-pink" style="text-align: justify;">What is DND ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li><a href="https://www.wikitechy.com/technology/how-to-block-unknown-callers-in-iphone-natively/" target="_blank" rel="noopener">DND</a> means Do Not Disturb.This is an initiative by TRAI (Telecom Regulatory Authority of India) to save consumers from unsolicited calls/SMS.</li>
<li>Register with the service provider’s Do No Disturb registry to avoid receiving unwanted telemarketing calls and messages.</li>
<li>In turn the service provider register your number at the National Do Not Call (NDNC) registry within 45 days.</li>
<li>Telemarketers have to verify the calling number list in the NDNC registry before making a call.</li>
<li>So rest assured, the telemarketers will not trouble you else they will be fined for calling you.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="features-of-dnd" class="color-green">Features of DND</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">It allows phone users to disable audible ringing for incoming calls.</li>
<li style="text-align: justify;">When DND is enabled, incoming calls do not ring on the phone, however there is visual alerting and the call information displays, and a call can be answered if desired.</li>
<li style="text-align: justify;">When a phone calls in the DND state, the message “Ring out DND” displays on the calling phone that indicate the target phone is in the DND state.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-dnd/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is DHCP ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-dhcp/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-dhcp/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:36:27 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[dhcp]]></category>
		<category><![CDATA[dhcp basics]]></category>
		<category><![CDATA[dhcp configuration]]></category>
		<category><![CDATA[dhcp configuration packet tracer]]></category>
		<category><![CDATA[dhcp configuration steps]]></category>
		<category><![CDATA[dhcp connecting]]></category>
		<category><![CDATA[dhcp definition]]></category>
		<category><![CDATA[dhcp full form]]></category>
		<category><![CDATA[dhcp in networking]]></category>
		<category><![CDATA[dhcp meaning]]></category>
		<category><![CDATA[dhcp port]]></category>
		<category><![CDATA[dhcp process steps]]></category>
		<category><![CDATA[dhcp protocol]]></category>
		<category><![CDATA[dhcp server]]></category>
		<category><![CDATA[dhcp stands for]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how dhcp works cisco]]></category>
		<category><![CDATA[how dhcp works diagram]]></category>
		<category><![CDATA[how dhcp works dora]]></category>
		<category><![CDATA[how to enable dhcp]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[purpose of dhcp]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what does dhcp stand for]]></category>
		<category><![CDATA[what is dhc]]></category>
		<category><![CDATA[what is dhcp]]></category>
		<category><![CDATA[what is dhcp and how it works]]></category>
		<category><![CDATA[what is dhcp client]]></category>
		<category><![CDATA[what is dhcp concept]]></category>
		<category><![CDATA[what is dhcp in networking]]></category>
		<category><![CDATA[what is dhcp server]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=779</guid>

					<description><![CDATA[Answer : DHCP (Dynamic Host Configuration Protocol) is a protocol...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-dhcp" class="color-pink" style="text-align: justify;">What is DHCP ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>DHCP (Dynamic Host Configuration Protocol) is a protocol used to provide quick, automatic, and central management for the distribution of IP addresses within a network.</li>
<li>DHCP is also used to configure the proper subnet mask, default gateway, and DNS server information on the device.</li>
<li>DHCP allows hosts to obtain required TCP/IP configuration information from a DHCP server.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-dhcp.png" alt="What is DHCP" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="how-dhcp-works" class="color-blue">How DHCP Works</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">A DHCP server is used to concern single IP address and automatically configure other network information.</li>
<li style="text-align: justify;">Maximum the home and small businesses, the router acts as the <b>DHCP server</b>. In large networks, a single computer might act as the DHCP server.</li>
<li style="text-align: justify;">A device (the client) requests an <a href="https://www.wikitechy.com/errors-and-fixes/android/obtaining-ip-address-error-in-android" target="_blank" rel="noopener">IP address</a> from a router (the host), after which the host assigns an available IP address to allow the client to communicate on the network.</li>
<li style="text-align: justify;">Once a device is turned on and connected to a network that has a DHCP server, it will send a request to the server, called a <b>DHCPDISCOVER</b> request.</li>
<li style="text-align: justify;">After the <b>DISCOVER</b> packet reaches the DHCP server, the server goes to hold on to an <a href="https://www.wikitechy.com/tutorials/linux/how-to-get-the-ip-address-of-the-machine-in-linux" target="_blank" rel="noopener">IP address</a> that the device can use, and then offers the client the address with a <b>DHCPOFFER</b> packet.</li>
<li style="text-align: justify;">Once the offer has been made for the chosen IP address, the device responds to the DHCP server with a <b>DHCPREQUEST</b> packet to accept it, after which the server sends an ACK that&#8217;s used to confirm that the device has that specific IP address and to define the amount of time that the device can use the address before getting a new one.</li>
<li style="text-align: justify;">If the server decides that the device cannot have the IP address, it will send a <b>ACK</b>.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-dhcp/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Cyber Security ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-cyber-security/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-cyber-security/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:32:15 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[cyber defense]]></category>
		<category><![CDATA[cyber safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security attacks]]></category>
		<category><![CDATA[cyber security concepts]]></category>
		<category><![CDATA[cyber security definition]]></category>
		<category><![CDATA[cyber security definitions]]></category>
		<category><![CDATA[cyber security examples]]></category>
		<category><![CDATA[cyber security information]]></category>
		<category><![CDATA[cyber security risks]]></category>
		<category><![CDATA[cyber security threats]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cybersecurity definition]]></category>
		<category><![CDATA[define cyber]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[future of cybersecurity]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[information and cyber security]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[introduction cyber security]]></category>
		<category><![CDATA[introduction to cyber security]]></category>
		<category><![CDATA[list of types of cyber attacks]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[types of cyber security]]></category>
		<category><![CDATA[types of cyber security attacks]]></category>
		<category><![CDATA[types of cyber security threats]]></category>
		<category><![CDATA[types of cyber warfare]]></category>
		<category><![CDATA[types of security attacks]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what is cyber crime]]></category>
		<category><![CDATA[what is cyber security]]></category>
		<category><![CDATA[what is cyber security all about]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=776</guid>

					<description><![CDATA[Answer : Cyber security or information technology security refers to a set of techniques...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-cyber-security" class="color-pink" style="text-align: justify;">What is Cyber Security ?</h2>
<ul style="text-align: justify;">
<li>Cyber security or information technology security refers to a set of techniques used to protect the integrity of <a href="https://www.wikitechy.com/tutorials/java/java-networking" target="_blank" rel="noopener">networks</a>, programs and data from attack, damage or unauthorized access that are aimed for exploitation.</li>
<li>In a computing context, security comprises cybersecurity and physical security both are used by enterprises to protect against unauthorized access to data centers and other computerized systems.</li>
<li>Information security, which is designed to maintain the confidentiality, integrity and availability of data, is a subset of cybersecurity. <a href="https://texaport.co.uk/it-support-aberdeen/">texaport.co.uk</a></li>
</ul>
</div>
</div>
<div class="text-center row" style="text-align: justify;"></div>
<h2 id="elements-of-cybersecurity" class="color-purple" style="text-align: justify;">Elements of cybersecurity</h2>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Ensuring cybersecurity requires the coordination of efforts throughout an information system, which includes:
<ul>
<li><a href="https://www.wikitechy.com/technology/protect-wi-fi-network-hackers/" target="_blank" rel="noopener">Network security</a></li>
<li><a href="https://forums.wikitechy.com/answer/re-how-would-you-ensure-security-over-web-in-your-application/" target="_blank" rel="noopener">Application security</a></li>
<li>Endpoint security</li>
<li><a href="https://www.wikitechy.com/interview-questions/power-bi/what-is-the-level-of-data-security-provided-by-power-bi/" target="_blank" rel="noopener">Data security</a></li>
<li>Identity management</li>
<li>Database and infrastructure security</li>
<li><a href="https://www.wikitechy.com/cloud-computing/cloud-infrastructure-as-a-service/" target="_blank" rel="noopener">Cloud </a>security</li>
<li>Mobile security</li>
<li>Disaster recovery/business continuity planning</li>
<li>End-user education</li>
</ul>
</li>
<li>The most difficult challenge in cyber security is the ever-evolving nature of security risks themselves.</li>
<li>The traditional approach has been to focus resources on crucial system components and protect against the biggest known threats, which meant leaving components undefended and not protecting systems against less dangerous risks.</li>
<li>Today, this approach is insufficient, as the threats advance and change more quickly than organizations can keep up with. As a result, advisory organizations promote more proactive and adaptive approaches to cyber security.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/information-risk-management.png" alt="Information Risk Management" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="cyberthreats" class="color-purple">Cyberthreats</h2>
</div>
</div>
<p style="text-align: justify;">The core functionality of cybersecurity involves protecting information and systems from major cyberthreats. These cyberthreats take many forms :</p>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li><b>Ransomware</b> is a type of malware that involves an attacker locking the victim&#8217;s computer system files &#8212; typically through encryption &#8212; and demanding a payment to decrypt and unlock them.</li>
<li><b>Malware</b> is any file or program used to harm a computer user, such as worms, computer viruses, Trojan horses and spyware.</li>
<li><b>Social engineering </b>is an attack that relies on human interaction to trick users into breaking security procedures in order to gain sensitive information that is typically protected.</li>
<li><b>Phishing</b> is a form of fraud where fraudulent emails are sent that resemble emails from reputable sources; however, the intention of these emails is to steal sensitive data, such as credit card or login information.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="cyberterrorism" class="color-purple">Cyberterrorism</h2>
<ul>
<li>cyberterrorism is the disruptive use of information technology by terrorist groups to further their ideological or political agenda.</li>
<li>It takes the form of attacks on networks, computer systems and telecommunication infrastructures.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="cyberwarfare" class="color-purple">Cyberwarfare</h2>
<ul>
<li>Cyberwarfare involves nation-states using information technology to penetrate another nation’s networks to cause damage or disruption.</li>
<li>In the U.S. and many other nations, cyberwarfare has been acknowledged as the fifth domain of warfare (following land, sea, air and space).</li>
<li>Cyberwarfare attacks are primarily executed by hackers who are well-trained in exploiting the intricacies of computer networks, and operate under the auspices and support of nation-states.</li>
<li>Rather than “shutting down” a target’s key networks, a cyberwarfare attack may intrude into networks to compromise valuable data, degrade communications, impair such infrastructural services as transportation and medical services, or interrupt commerce.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="cyberespionage" class="color-purple">Cyberespionage</h2>
</div>
</div>
<ul>
<li style="text-align: justify;">Cyberespionage is the practice of using information technology to obtain secret information without permission from its owners or holders.</li>
<li style="text-align: justify;">Cyberespionage is most often used to gain strategic, economic, political or military advantage, and is conducted using cracking techniques and malware.</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-cyber-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is whitelist ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-whitelist/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-whitelist/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:28:32 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[application whitelisting]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[best application whitelisting software]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[check if ip is whitelisted]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[gmail whitelist]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how to whitelist a blacklisted ip address]]></category>
		<category><![CDATA[how to whitelist an email]]></category>
		<category><![CDATA[how to whitelist ip addresses windows]]></category>
		<category><![CDATA[how to whitelist my domain]]></category>
		<category><![CDATA[how to whitelist public ip address]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[ip whitelist check]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what does whitelist mean]]></category>
		<category><![CDATA[what is whitelist]]></category>
		<category><![CDATA[what is whitelist email]]></category>
		<category><![CDATA[white lies]]></category>
		<category><![CDATA[whitelist]]></category>
		<category><![CDATA[whitelist definition]]></category>
		<category><![CDATA[whitelist email]]></category>
		<category><![CDATA[whitelist email meaning]]></category>
		<category><![CDATA[whitelist ip]]></category>
		<category><![CDATA[whitelist ip address]]></category>
		<category><![CDATA[whitelist ip address meaning]]></category>
		<category><![CDATA[whitelist meaning]]></category>
		<category><![CDATA[whitelist url]]></category>
		<category><![CDATA[whitelist vs blacklist]]></category>
		<category><![CDATA[whitelisting ip]]></category>
		<category><![CDATA[whitelisting software]]></category>
		<category><![CDATA[whitelisting websites]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=774</guid>

					<description><![CDATA[Answer : A whitelist is a list of e-mail addresses or domain names...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-whitelist" class="color-pink" style="text-align: justify;">What is whitelist ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>A <a href="https://www.wikitechy.com/technology/whitelisting-in-modsecurity/" target="_blank" rel="noopener">whitelist</a> is a list of e-mail addresses or domain names from which an e-mail blocking program will allow messages to be received.</li>
<li>The list can be gradually compiled over a period of time, and can be edited whenever the user wants.</li>
<li>When a whitelist is used, all entities are denied access, except those included in the whitelist.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-whitelist.jpg" alt="What is Whitelist" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="examples-of-different-whitelist-applications" class="color-green">Examples of different whitelist applications</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">A network administrator may be configure a firewall with a whitelist that allows only specific IP addresses to access the network.</li>
<li style="text-align: justify;">A protected directory within a website uses whitelist for the purpose of provide limit access to certain IP addresses.</li>
<li style="text-align: justify;">Some <a href="https://www.wikitechy.com/view-article/send-email-in-php" target="_blank" rel="noopener">e-mail system</a> users use whitelist for receiving only accept messages from the e-mail addresses.</li>
<li style="text-align: justify;">Programmers can use whitelists within a program to ensure only certain objects are modified.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-whitelist/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is firewall ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-firewall/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-firewall/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:21:08 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[comodo firewall]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[firewall definition]]></category>
		<category><![CDATA[firewall device]]></category>
		<category><![CDATA[firewall examples]]></category>
		<category><![CDATA[firewall protection]]></category>
		<category><![CDATA[firewall security]]></category>
		<category><![CDATA[firewall software]]></category>
		<category><![CDATA[firewalls]]></category>
		<category><![CDATA[firewalls types]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how does a firewall work]]></category>
		<category><![CDATA[how does a hardware firewall work]]></category>
		<category><![CDATA[how firewall works]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[managed firewall]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[microsoft firewall]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[network firewall]]></category>
		<category><![CDATA[network firewall security]]></category>
		<category><![CDATA[network firewall software]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[software firewall definition]]></category>
		<category><![CDATA[stateful firewall]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[types of firewall]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[virtual firewall]]></category>
		<category><![CDATA[what is a firewall on a computer]]></category>
		<category><![CDATA[what is firewall]]></category>
		<category><![CDATA[what is firewall in networking]]></category>
		<category><![CDATA[windows firewall]]></category>
		<category><![CDATA[working of firewall with diagram]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=770</guid>

					<description><![CDATA[Answer : A firewall is a piece of hardware or software...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-firewall" class="color-pink" style="text-align: justify;">What is firewall ?</h2>
<ul style="text-align: justify;">
<li>A <a href="https://www.wikitechy.com/technology/how-to-get-firewall-access-on-android-without-root/" target="_blank" rel="noopener">firewall</a> is a piece of hardware or software that helps prevent malware and malicious attacks from entering a computer or a network of computers through the <a href="https://www.wikitechy.com/technology/free-internet-tricks-2017/" target="_blank" rel="noopener">Internet</a>.</li>
<li>Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet.</li>
<li>A firewall can be hardware,software or both.</li>
</ul>
</div>
</div>
<div class="text-center row" style="text-align: justify;"></div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="hardware-firewalls" class="color-green">Hardware firewalls</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Hardware firewalls are systems that are independent of the computers they protect that filter the Internet as information passes into a computer.</li>
<li>Most broadband Internet routers have their own firewall built in.</li>
<li>In general, hardware firewalls work by examining the data that flows in from the Internet and verifying whether that information is safe.</li>
<li>The ZyXEL ZyWALL, which is a Unified Security Gateway with a firewall and other security features.</li>
<li><b>Cost:</b> $100 to ~$500</li>
<li>NAT, DCHP, Email Notification.</li>
<li>Easier for computers to locally share folders/Printers.</li>
<li>Additional function available &amp; can protect other devices.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/hardware-firewalls.png" alt="zyxel firewall" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="software-firewalls" class="color-green">Software firewalls</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Software firewalls are designed to protect a computer by blocking certain programs from sending and receiving information from a local network or the Internet.</li>
<li>The Windows Firewall, an example of a firewall software program included with Microsoft Windows.</li>
<li><b>Cost:</b> Free to $30 per computer.</li>
<li>Each machine need to be configured.</li>
<li>Firewall may be interfere with local network sharing.</li>
</ul>
</div>
</div>
<div class="ImageContent">
<div class="hddn" style="text-align: justify;"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/software-firewalls.png" alt="Software firewall" /></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-firewall/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What are the layers of OSI ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-are-the-layers-of-osi/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-are-the-layers-of-osi/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:17:02 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[7 layers of networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[application layer]]></category>
		<category><![CDATA[application layer functions]]></category>
		<category><![CDATA[application layer osi model]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[internet layer]]></category>
		<category><![CDATA[layer 2 network]]></category>
		<category><![CDATA[layer 3 network]]></category>
		<category><![CDATA[layer 7]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[network layer]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[osi]]></category>
		<category><![CDATA[osi application layer]]></category>
		<category><![CDATA[osi layer protocols and functions]]></category>
		<category><![CDATA[osi layers]]></category>
		<category><![CDATA[osi layers functions each layer]]></category>
		<category><![CDATA[osi layers with examples]]></category>
		<category><![CDATA[osi model]]></category>
		<category><![CDATA[osi model explained]]></category>
		<category><![CDATA[osi model explained in simple terms]]></category>
		<category><![CDATA[osi model explained with example]]></category>
		<category><![CDATA[osi model for beginners]]></category>
		<category><![CDATA[osi model for dummies]]></category>
		<category><![CDATA[osi model layers]]></category>
		<category><![CDATA[osi model layers and its functions]]></category>
		<category><![CDATA[osi model layers explanation]]></category>
		<category><![CDATA[osi model protocols]]></category>
		<category><![CDATA[osi network layer]]></category>
		<category><![CDATA[osi presentation layer]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[physical layer]]></category>
		<category><![CDATA[physical layer in osi model]]></category>
		<category><![CDATA[physical layer protocols]]></category>
		<category><![CDATA[protocols used in each layer of osi model]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[seven layers of osi model]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=768</guid>

					<description><![CDATA[Answer : There are seven Layers in Open Systems Interconnection Model...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-are-the-layers-of-osi" class="color-pink" style="text-align: justify;">What are the layers of OSI ?</h2>
</div>
</div>
<p style="text-align: justify;">There are seven Layers in Open Systems Interconnection Model.They are:</p>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/what-are-the-layers-of-osi.png" alt="What are the layers of OSI" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-1-the-physical-layer" class="color-blue">Layer 1 : The Physical layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>This layer conveys the bit stream across the <a href="https://www.wikitechy.com/errors-and-fixes/windows/network-connection-issues-in-windows" target="_blank" rel="noopener">network</a> either electrically, mechanically or through radio waves.</li>
<li>The physical layer covers a variety of devices and mediums, among them cabling, connectors, receivers, transceivers and repeaters.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-2-the-data-link-layer" class="color-blue">Layer 2 : The Data-link layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>This layer sets up links across the physical network, putting packets into network frames.</li>
<li>This layer has two sub-layers: the logical link control layer and the media access control layer (MAC). <a href="https://www.wikitechy.com/tutorials/ethical-hacking/computer-hacking-tutorial/what-is-mac-address-and-how-to-get-mac-address-in-my-computer" target="_blank" rel="noopener">MAC layer</a> types include Ethernet and 802.11 wireless specifications.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-3-the-network-layer" class="color-blue">Layer 3 : The Network layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>This layer handles addressing and routing the data &#8212; sending it in the right direction to the right destination on outgoing transmissions and receiving incoming transmissions at the packet level. IP is the network layer for the internet.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-4-the-transport-layer" class="color-blue">Layer 4 : The Transport layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>This layer manages packetization of data, then the delivery of the packets, including checking for errors in the data once it arrives.</li>
<li>On the internet, <a href="https://www.wikitechy.com/tutorials/linux/how-to-increase-the-maximum-number-of-tcp-ip-connections-in-linux" target="_blank" rel="noopener">TCP</a> and UDP provide these services for most applications as well.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-5-the-session-layer" class="color-blue">Layer 5 : The Session layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>This layer sets up, coordinates and terminates conversations. Its services include authentication and reconnection after an interruption. On the internet, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) provide these services for most applications.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-6-the-presentation-layer" class="color-blue">Layer 6 : The Presentation layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>This layer is usually part of an operating system (OS) and converts incoming and outgoing data from one presentation form to another.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-7-the-application-layer" class="color-blue">Layer 7 : The Application layer</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">This is the layer at which communication partners are identified ,network capacity is assessed and where the data or application is presented in a visual form.</li>
<li style="text-align: justify;">This layer is not the application itself, it is the set of services an application should be able to make use of directly, although some applications may perform application-layer functions.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-are-the-layers-of-osi/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is the difference between static and dynamic IP ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-the-difference-between-static-and-dynamic-ip/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-the-difference-between-static-and-dynamic-ip/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:12:49 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[advantages of dynamic ip addressbenefits of static ip from isp]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[benefits of static ip address vs dynamic]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[difference between static and dynamic]]></category>
		<category><![CDATA[difference between static and dynamic ip]]></category>
		<category><![CDATA[difference between static and dynamic ip address]]></category>
		<category><![CDATA[difference between static and dynamic mapping]]></category>
		<category><![CDATA[difference between static ip and dynamic ip]]></category>
		<category><![CDATA[dynamic ip address definition]]></category>
		<category><![CDATA[dynamic ip address example]]></category>
		<category><![CDATA[dynamic ip router]]></category>
		<category><![CDATA[dynamic vs static]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[global static ip address]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how to get a dynamic ip]]></category>
		<category><![CDATA[how to get a static ip address]]></category>
		<category><![CDATA[how to get a static public ip addres]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[is my ip address static or dynamic]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[my static ip address]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[show to get a static external ip]]></category>
		<category><![CDATA[static and dynamic]]></category>
		<category><![CDATA[static and dynamic ip]]></category>
		<category><![CDATA[static and dynamic ip address]]></category>
		<category><![CDATA[static dynamic]]></category>
		<category><![CDATA[static ip address definition]]></category>
		<category><![CDATA[static ip address example]]></category>
		<category><![CDATA[static ip advantages]]></category>
		<category><![CDATA[static v dynamic]]></category>
		<category><![CDATA[static vs dynamic]]></category>
		<category><![CDATA[static vs dynamic ip]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[types of ip]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what is static and dynamic]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=766</guid>

					<description><![CDATA[Answer : Static IP configured by the ISP...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-the-difference-between-static-and-dynamic-ip" class="color-pink" style="text-align: justify;">What is the difference between static and dynamic IP ?</h2>
<table class="table-bordered table-striped table table-responsive">
<tbody>
<tr>
<th>Static IP</th>
<th>Dynamic IP</th>
</tr>
<tr>
<td class="text-leftalign">Static IP configured by the <a href="https://www.wikitechy.com/interview-questions/networking/what-is-isp/" target="_blank" rel="noopener">ISP</a><br />
(Internet Service Provider)</td>
<td class="text-leftalign">Dynamic IP configured using <a href="https://www.wikitechy.com/interview-questions/networking/what-is-dhcp/" target="_blank" rel="noopener">DHCP</a><br />
(Dynamic Host Configuration Protocol) .</td>
</tr>
<tr>
<td class="text-leftalign">The static IP is fixed which means it could<br />
not be changed until the user wants to change it.</td>
<td class="text-leftalign">Dynamic IP changes each time when a user connects to a network.</td>
</tr>
<tr>
<td class="text-leftalign">The associated risk of <a href="https://www.wikitechy.com/final-year-project/dotnet/server-hacking/what-is-website" target="_blank" rel="noopener">website hacking</a> is large<br />
in static IP because it is always constant.</td>
<td class="text-leftalign">There is low risk regarding dynamic IP.</td>
</tr>
<tr>
<td class="text-leftalign">When the device is configured with static IP address,<br />
it can be tracked.</td>
<td class="text-leftalign">In case of dynamic <a href="https://forums.wikitechy.com/question/how-do-i-get-user-ip-address-in-django/" target="_blank" rel="noopener">IP address</a> the tracking of the device is difficult as the IP address is always changing.</td>
</tr>
<tr>
<td class="text-leftalign">Expensive than dynamic IP</td>
<td class="text-leftalign">Cheaper than static IP</td>
</tr>
<tr>
<td class="text-leftalign">Use <a href="https://www.wikitechy.com/interview-questions/networking/what-is-dns-and-dns-port-number/" target="_blank" rel="noopener">DNS</a> to map domain name to IP address,<br />
and use domain name to address<br />
the static IP address.</td>
<td class="text-leftalign">Use Dynamic DNS for dynamic IP address, but it&#8217;s not as clean as the static IP address.</td>
</tr>
<tr>
<td class="text-leftalign">No need of additional hardware or special configuration<br />
required in Single computers.</td>
<td class="text-leftalign">No need of additional hardware or special configuration required in Single computers.</td>
</tr>
<tr>
<td class="text-leftalign">Multiple computers requires a Switch or Hub.<br />
No special configuration required.</td>
<td class="text-leftalign">Multiple computers requires a <a href="https://www.wikitechy.com/technology/pro-hack-binatone-router-wifi-password/" target="_blank" rel="noopener">Router</a>.special configuration may be required.</td>
</tr>
</tbody>
</table>
</div>
</div>
<div class="text-center row" style="text-align: justify;">
<div class="col-sm-12">
<div id="bsa-zone_1590522538159-8_123456"></div>
</div>
</div>
<div class="ImageContent">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-the-difference-between-static-and-dynamic-ip-address.png" alt="What is the difference between static and dynamic IP" /></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-the-difference-between-static-and-dynamic-ip/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to detect phishing ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/how-to-detect-phishing/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/how-to-detect-phishing/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:08:14 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[7 ways to spot phishing email]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how can you identify a phishing email]]></category>
		<category><![CDATA[how to detect phishing attacks]]></category>
		<category><![CDATA[how to identify a spam email]]></category>
		<category><![CDATA[how to prevent phishing]]></category>
		<category><![CDATA[how to prevent phishing and spoofing]]></category>
		<category><![CDATA[how to prevent spam mail]]></category>
		<category><![CDATA[how to prevent spear phishing]]></category>
		<category><![CDATA[how to protect against phishing]]></category>
		<category><![CDATA[how to recognize spam email]]></category>
		<category><![CDATA[how to stop phishing emails]]></category>
		<category><![CDATA[how to stop phishing emails in gmail]]></category>
		<category><![CDATA[how to stop phishing emails outlook]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[identify a phishing attack]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing attack]]></category>
		<category><![CDATA[phishing attempt]]></category>
		<category><![CDATA[phishing definition]]></category>
		<category><![CDATA[phishing email]]></category>
		<category><![CDATA[phishing email checker]]></category>
		<category><![CDATA[phishing email examples]]></category>
		<category><![CDATA[phishing mail]]></category>
		<category><![CDATA[phishing meaning]]></category>
		<category><![CDATA[phishing prevention best practices]]></category>
		<category><![CDATA[phishing scams]]></category>
		<category><![CDATA[phishing warning sign]]></category>
		<category><![CDATA[pishing]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[show to prevent phishing]]></category>
		<category><![CDATA[show to protect yourself against phishing threat]]></category>
		<category><![CDATA[spear phishing]]></category>
		<category><![CDATA[spear phishing examples]]></category>
		<category><![CDATA[spotting spam emails]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what does phishing mean]]></category>
		<category><![CDATA[what is phishing]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=764</guid>

					<description><![CDATA[Answer : There are 5 ways to detect a phishing...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="how-to-detect-phishing" class="color-pink" style="text-align: justify;">How to detect phishing ?</h2>
</div>
</div>
<p style="text-align: justify;">There are 5 ways to detect a phishing.They are</p>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ol>
<li style="list-style-type: none;">
<ol>
<li><b>The email is sent from a public email address</b> &#8211; The sender’s <a href="https://www.wikitechy.com/tutorials/linux/how-to-send-a-file-as-an-email-attachment-using-linux-command-line" target="_blank" rel="noopener">email</a> address, as this can help identify if the person is truly who they claim to be. Frequently, the criminal will use a public <a href="https://www.wikitechy.com/tutorials/javascript/valid-email-address-in-javascript" target="_blank" rel="noopener">email address</a> such as gmail.com. If your bank or team mate is going to email you, it will come from a company email account with the company name in the <a href="https://www.wikitechy.com/angularjs/directives/angularjs-input-email" target="_blank" rel="noopener">email</a> address.</li>
<li><b>Strange attachments</b> &#8211; If you receive an unexpected <a href="https://forums.wikitechy.com/question/using-the-facebook-graph-api-how-to-get-users-email/" target="_blank" rel="noopener">email</a> or an email from someone you don’t know asking you to open an attachment, do not open it. These attachments can contain malware that can damage your computer and capture your personal data.</li>
<li><b>The creation of a sense of urgency</b> &#8211; Phishing <a href="https://www.wikitechy.com/php/php-email-verification-script-for-downloading-e-book" target="_blank" rel="noopener">emails</a> often ask recipients to verify personal information, such as bank details or a password. They can create a sense of urgency by warning that your account has experienced doubtful activity or imagining to be someone you know who is in urgent need of financial help.These are massive warning signs. If you are ever unsure, contact the company or person using the contact details you already have for them or that are on their genuine website. Never use any contact details or click any links provided in the email.How to detect phishing ? &#8211; The email is sent from a public email address.Look at the sender’s email address, as this can help identify if the person is truly who they claim to be. Often, the criminal will use a public email address such as gmail.com.</li>
</ol>
</li>
</ol>
<ol>
<li><b>Links to unrecognised sites or URLs that misspell a familiar domain name</b> &#8211; Phishing emails may ask you to click a link within the email. By hovering your mouse over the link or address, you can see the linked site’s true URL. These URLs can be slightly misspelled or completely different to what you are expecting, so always double check before you click.</li>
<li><b>Poor spelling and grammar</b> &#8211; You can often detect a phishing email by the way it is written. The writing style might be different to that usually used by the sender and it might contain spelling mistakes and poor grammar.</li>
</ol>
</div>
</div>
<p style="text-align: justify;">One of the reasons behind the large increase in phishing attacks is the lack of basic knowledge about them. People are fundamental to cyber security, so it is vital that they can detect security threats and know how to respond.A cyber health check will help you identify your weakest security areas and recommend appropriate measures to mitigate your risks. This includes an online staff questionnaire, whose results will be analysed to gauge their cyber security awareness.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/how-to-detect-phishing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Spam ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-spam/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-spam/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:04:02 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[best spam messages]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[craigslist spam email examples]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[define spam]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[example spam email for testing]]></category>
		<category><![CDATA[examples of common spam emails]]></category>
		<category><![CDATA[examples of computer spam]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how to avoid spam and virus]]></category>
		<category><![CDATA[how to block spam]]></category>
		<category><![CDATA[how to eliminate spam email]]></category>
		<category><![CDATA[how to get rid of spam mail]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[is this email address spam]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[report spam meaning]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[spam attack]]></category>
		<category><![CDATA[spam computer]]></category>
		<category><![CDATA[spam email address example]]></category>
		<category><![CDATA[spam email list]]></category>
		<category><![CDATA[spam email meaning]]></category>
		<category><![CDATA[spam mail meaning]]></category>
		<category><![CDATA[spam messages example]]></category>
		<category><![CDATA[spam virus]]></category>
		<category><![CDATA[spam virus definition]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[types of spam email]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what is spam]]></category>
		<category><![CDATA[what is spam email]]></category>
		<category><![CDATA[what is spam in computer]]></category>
		<category><![CDATA[what is spam mail]]></category>
		<category><![CDATA[what is spam mail in gmail]]></category>
		<category><![CDATA[what is the purpose of spam emails]]></category>
		<category><![CDATA[whats in spam]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=762</guid>

					<description><![CDATA[Answer : Spam is garbage mail or garbage newsgroup postings...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-spam" class="color-pink" style="text-align: justify;">What is Spam ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Spam is garbage mail or garbage newsgroup postings and also the spam is defined as unsolicited email.</li>
<li>However, if a long-lost person finds your email address and sends you a message, this could hardly be called spam, even though it is unsolicited.</li>
<li>Real spam is generally email advertising for some product sent to a mailing list or newsgroup.</li>
<li>Unsolicited commercial email messages sent in bulk, often to a purchased (or stolen) mailing list that contained your address.</li>
<li>Counterfeit messages from reliable senders that attempt to trick you into supplying your personal information.</li>
<li>Misleading messages from people you know whose email accounts have been <a href="https://www.wikitechy.com/tutorials/ethical-hacking/" target="_blank" rel="noopener">hacked</a>.</li>
<li>Not all spam is illegal, but some of it is.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="types-of-spam-email" class="color-green">Types of spam email</h2>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="phishing-fraud-email" class="color-blue">Phishing Fraud Email</h2>
<ul>
<li><a href="https://www.wikitechy.com/technology/best-tips-prevent-secure-phishing-attacks/" target="_blank" rel="noopener">Phishing spam</a> is sent to trick recipients into visiting a website and provide financial information such as a credit card number or other sensitive data.</li>
<li>This spam is cleverly disguised and at first glance actually appear to be from the institution that they are masking.</li>
<li>This type of spam is fraudulent, mis-representative and potentially damaging to the recipient.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn">
<h2 id="example-update-your-account">Example: Update Your Account</h2>
<p><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/web-mail-slide.png" alt=" Phishing Fraud Email " /></p>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="emotional-scam-email" class="color-blue">Emotional Scam Email</h2>
</div>
</div>
<ul style="text-align: justify;">
<li>This type of spam attempts to trick email recipients by playing on their emotions.</li>
<li>This is done primarily in two ways; either by raising the hopes of the recipient with suggestions of monetary winnings (i.e. lottery or International Money Transfer <a href="https://www.wikitechy.com/technology/find-whether-pc-infected-phone-scam/" target="_blank" rel="noopener">scams</a>) or by playing on their sentimental nature (illness, romance, etc.).</li>
</ul>
<h2 id="a-good-example-of-this-is-the-microsoft-global-email-lottery-spam" style="text-align: justify;">A good example of this is the Microsoft Global Email Lottery Spam.</h2>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/emotional-scam.gif" alt=" Emotional Scam Email" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="virus-and-malware-email" class="color-blue">Virus and Malware Email</h2>
</div>
</div>
<ul style="text-align: justify;">
<li>This type of <a href="https://www.wikitechy.com/technology/what-is-an-email-alias-and-how-to-set-it-up-on-gmail-and-outlook/" target="_blank" rel="noopener">email</a> spam will include an attachment or a link to a file that will trigger some virus of <a href="https://www.wikitechy.com/technology/how-to-protect-android-device-against-malware/" target="_blank" rel="noopener">malware</a> to install to the recipients computer when the attachment is opened or the link visited.</li>
<li>Sometimes they are sent automatically from one computer to others using scripts in the <a href="https://www.wikitechy.com/tutorials/ethical-hacking/how-virus-works" target="_blank" rel="noopener">virus</a> that cause the recipient computer to forward it on to other people in their address book without the recipient’s knowledge.</li>
<li>Because these emails appear to be coming from someone that you know, they make recipients vulnerable.</li>
<li>The objective of virus spam is to spread computer viruses across networks via email.</li>
</ul>
<h2 id="example-virus-attachement-email" style="text-align: justify;">Example: Virus attachement email</h2>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/virus-and-malware-email.jpg" alt="Virus and Malware Email" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="viagra-replica-watch-stock-and-weight-loss-email" class="color-blue">Viagra, Replica Watch, Stock and Weight Loss Email</h2>
<ul>
<li>Viagra, Replica Watch, Stock and Weight Loss Email spam is very common. Most of us are inundated with emails encouraging us to purchase prescription medications, replica watches or stock of some kind.</li>
<li>This type of spam doesn’t pretend to be anything but an unsolicited attempt to get people to click &#8211; and people do (one in every 12,500,000 spam messages that are sent!) &#8211; that’s why we keep getting it.</li>
<li>This spam burdens computer resources and networks. As a result, it costs companies and individuals time, productivity and money for anti-spam technology required to reduce it.</li>
</ul>
</div>
</div>
<h2 id="example-online-purchase" style="text-align: justify;">Example: Online purchase</h2>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-spam-viagra.gif" alt="What is Spam Vigra" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="nonsensical-email" class="color-blue">Nonsensical Email</h2>
</div>
</div>
<ul style="text-align: justify;">
<li>This type of email spam includes those email spam messages that many people receive which don’t appear to have any rationale whatsoever.</li>
<li>They aren’t trying to sell us anything.They do not contain viruses or malware. They don’t try so promote websites or defraud us in any way.</li>
<li>The objective of nonsensical spam is simply to test anti-spam and content filters so that spammers can more successfully deliver future messages.</li>
</ul>
<h2 id="example-nonsensical-email" style="text-align: justify;">Example: Nonsensical Email</h2>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/nonsensical-email.gif" alt=" Nonsensical Email " /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="unsolicited-commercial-email" class="color-blue">Unsolicited Commercial Email</h2>
</div>
</div>
<ul style="text-align: justify;">
<li>This type of <a href="https://www.wikitechy.com/tutorials/android/android-send-email-intent" target="_blank" rel="noopener">email</a> messages sent from actual businesses who are trying to spread the news and generate sales for their products and services via email to people who did not sign up directly to receive email from them.</li>
<li>This email based on a promotion of a product.</li>
</ul>
<h2 id="example-email-marketing-promotions" style="text-align: justify;">Example: Email marketing promotions</h2>
<div class="ImageContent">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/unsolicited-commercial-email-spam.gif" alt=" Unsolicited Commercial Email" /></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-spam/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is ISP ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-isp/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-isp/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 18:50:35 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[internet providers]]></category>
		<category><![CDATA[internet service]]></category>
		<category><![CDATA[internet service provider definition]]></category>
		<category><![CDATA[internet service providers]]></category>
		<category><![CDATA[internet service providers by address]]></category>
		<category><![CDATA[internet services providers]]></category>
		<category><![CDATA[isp]]></category>
		<category><![CDATA[isp full form]]></category>
		<category><![CDATA[isp internet]]></category>
		<category><![CDATA[isp internet service provider]]></category>
		<category><![CDATA[isp list]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what is isp]]></category>
		<category><![CDATA[who is my isp]]></category>
		<category><![CDATA[wireless internet service providers]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=740</guid>

					<description><![CDATA[Answer : An Internet service provider (ISP) is a company...
]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-isp" class="color-pink" style="text-align: justify;">What is ISP ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>An Internet service provider (ISP) is a company that provides Internet access to organizations and home users.</li>
<li>ISP provides with <a href="https://www.wikitechy.com/technology/how-to-block-internet-access-in-specific-apps-on-android/" target="_blank" rel="noopener">Internet access</a>, usually for a payment. Without an ISP, you wouldn’t be able to shop online, access <a href="https://www.wikitechy.com/tutorials/javascript/how-does-facebook-disable-the-browsers-integrated-developer-tools" target="_blank" rel="noopener">Facebook</a>, or read this page.</li>
<li>Connecting to the Internet requires specific telecommunications, networking, and routing equipment.</li>
<li>ISPs allow users access to networks that contain the required equipment, enabling users to establish Internet connectivity.</li>
<li>ISPs are responsible for ensure that you can access the Internet, routing Internet traffic, resolving domain names, and maintaining the network infrastructure that makes Internet access possible.</li>
<li>While the core function of an ISP is to provide Internet access, many ISPs do much more. ISPs also offer services like web hosting, domain name registration, and email services.</li>
<li>An Internet service provider is also known as an Internet access provider (IAP).</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><a href="https://cdn.wikitechy.com/interview-questions/networking/what-is-isp.png"><img decoding="async" class="img-responsive center-block" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-isp.png" alt="What is ISP" /></a></div>
</div>
<div class="text-center row" style="text-align: justify;">
<div class="col-sm-12">
<div id="bsa-zone_1590522538159-8_123456"></div>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="different-types-of-internet-service-providers" class="color-blue">Different types of Internet Service Providers</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>The <a href="https://www.isp-in-area.com/" target="_blank" rel="noopener">internet service providers (ISPs) </a>are very competitive market with lots of different offerings and deals. Even household names, such as banks and retailers, provide ISP services.</li>
<li>Internet service providers connect your personal or business computer, laptop, mobile device etc to the internet. ISPs may be commercial, non-profit, privately owned or community owned companies.</li>
<li>Most providers offer the same types of internet services to customers, including:
<ul>
<li>Internet Access</li>
<li><a href="https://www.wikitechy.com/fix-error/gmail-account-is-hacked-recovery-email-address-changed" target="_blank" rel="noopener">Email Access</a></li>
<li><a href="https://www.wikitechy.com/technology/best-cheap-domain-registration-hosting-tricks-2017/" target="_blank" rel="noopener">Domain Name Registration</a></li>
<li><a href="https://www.wikitechy.com/hosting/" target="_blank" rel="noopener">Web hosting</a></li>
<li>Co-Location (or data centre services)</li>
</ul>
</li>
</ul>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Some ISPs also provide services such as website design or development of e-commerce facilities. See different types of ISPs.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="different-types-of-isp-connections" class="color-purple">Different types of ISP connections</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>ISPs use a range of technologies to enable customers&#8217; connection to their network. The most common types of internet connections include:
<ul>
<li><a href="https://www.wikitechy.com/tutorials/angular-material/angular-material-fab-speed-dial" target="_blank" rel="noopener">Dial-up</a> or analogue</li>
<li>DSL (digital subscriber line)</li>
<li>Cable <a href="https://www.wikitechy.com/technology/understand-broadband-internet-speeds/" target="_blank" rel="noopener">broadband</a></li>
<li>Fibre optic broadband</li>
<li>Wireless or <a href="https://www.wikitechy.com/technology/top-6-futuristic-smart-wi-fi-routers-home-2017/" target="_blank" rel="noopener">Wi-Fi</a> broadband</li>
<li>Satellite and mobile broadband</li>
<li>Dedicated leased line</li>
</ul>
</li>
</ul>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">Most ISPs offer a range of packages aimed at different levels of users, based on factors such as the speed of connection, the number of email addresses needed or the amount of free web space.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-isp/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to detect a cycle in a linked list ?</title>
		<link>https://www.wikitechy.com/interview-questions/data-structure/how-to-detect-a-cycle-in-a-linked-list/</link>
					<comments>https://www.wikitechy.com/interview-questions/data-structure/how-to-detect-a-cycle-in-a-linked-list/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Tue, 13 Jul 2021 16:48:05 +0000</pubDate>
				<category><![CDATA[Data Structure]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Altimetrik India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Materials interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[BMC Software interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[CGI Group Inc interview questions and answers]]></category>
		<category><![CDATA[Chetu interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[circular linked list java]]></category>
		<category><![CDATA[Collabera Te interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[cycle detection linked list]]></category>
		<category><![CDATA[cycle detection solution]]></category>
		<category><![CDATA[cycle detection solution c++]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[find cycle in linked list]]></category>
		<category><![CDATA[find length of loop in linked list]]></category>
		<category><![CDATA[find loop in linked list]]></category>
		<category><![CDATA[find start of loop in linked list]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[floyd's cycle detection algorithm]]></category>
		<category><![CDATA[floyd's cycle finding algorithm]]></category>
		<category><![CDATA[floyd's cycle-finding algorithm c++]]></category>
		<category><![CDATA[Genpact interview questions and answers]]></category>
		<category><![CDATA[given a linked list]]></category>
		<category><![CDATA[Globallogic India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[leetcode sort linked list]]></category>
		<category><![CDATA[link cycle]]></category>
		<category><![CDATA[linked list]]></category>
		<category><![CDATA[linked list cycle]]></category>
		<category><![CDATA[linked list in data structure]]></category>
		<category><![CDATA[linked lists detect a cycle]]></category>
		<category><![CDATA[list cycle]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[n'th node from end of linked list]]></category>
		<category><![CDATA[nested loops java]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[python linked list cycle]]></category>
		<category><![CDATA[remove loop in linked list]]></category>
		<category><![CDATA[return the node where the cycle begins. if there is no cycle]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Sapient Consulting Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[Tracxn Technologies Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[what is linked list in data structure]]></category>
		<category><![CDATA[Wipro Infotech interview questions and answers]]></category>
		<category><![CDATA[WM Global Technology Services India Pvt.Ltd Limited (WMGTS) interview questions and answers]]></category>
		<category><![CDATA[Xoriant Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Yodlee Infotech Pvt Ltd interview questions and answers]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=497</guid>

					<description><![CDATA[Answer : A linked list is said to contain a cycle ...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="how-to-detect-a-cycle-in-a-linked-list" class="color-pink" style="text-align: justify;">How to detect a cycle in a linked list ?</h2>
<ul style="text-align: justify;">
<li>A <a href="https://www.wikitechy.com/technology/circular-linked-list-introduction-applications/" target="_blank" rel="noopener">linked list</a> is said to contain a cycle if any node is visited more than once.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/data-structure/how-to-detect-a-cycle-in-a-linked-list.png" alt="How do you detect a cycle in a linked list" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="method-1-using-hashing" class="color-green">Method 1 &#8211; Using Hashing</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Traverse the given list.</li>
<li>Insert each encountered node into a <a href="https://www.wikitechy.com/tutorials/java/java-hash-table" target="_blank" rel="noopener">hash table</a>.</li>
<li>If the current already present ,that means the cycle is present or not.</li>
</ul>
</div>
</div>
<div class="TextHeading">
<div class="hddn">
<h2 id="sample-code" class="color-blue" style="text-align: justify;">Sample code</h2>
<div class="code-embed-wrapper"> <div class="code-embed-infos"> </div> <pre class="language-java code-embed-pre line-numbers"  data-start="1" data-line-offset="0"><code class="language-java code-embed-code">#include &lt;iostream&gt;<br/>#include &lt;unordered_set&gt;<br/>using namespace std;<br/><br/>// Data Structure to store a linked list node<br/>struct Node<br/>{<br/>    int dt;<br/>    Node* next;<br/>};<br/><br/>// Helper function to create a new node with the given data and<br/>// pushes it onto the front of the list<br/>void push(Node*&amp; headRef, int dt)<br/>{<br/>    // create a new linked list node from heap<br/>    Node* newNode = new Node;<br/><br/>    newNode-&gt;dt = dt;<br/>    newNode-&gt;next = headRef;<br/>    headRef = newNode;<br/>}<br/><br/>// Function to detect Cycle in a linked list using Hashing<br/>bool detectcyc(Node *head)<br/>{<br/>    Node *current = head;<br/>    unordered_set&lt;Node*&gt; set;<br/><br/>    // traverse the list<br/>    while (current)<br/>    {<br/>        // return false if we already have seen this node before<br/>        if (set.find(current) != set.end())<br/>            return true;<br/><br/>        // insert current node into the set<br/>        set.insert(current);<br/><br/>        // move to the next node<br/>        current = current-&gt;next;<br/>    }<br/><br/>    // we reach here if list does not contain any cycle<br/>    return false;<br/>}<br/><br/>// Detect Cycle in a linked list<br/>int main()<br/>{<br/>    // input keys<br/>    int k[] = { 1, 2, 3, 4, 5 };<br/>    int n = sizeof(k) / sizeof(k[0]);<br/><br/>    Node* head = nullptr;<br/>    for (int i = n - 1; i &gt;= 0; i--)<br/>        push(head, k[i]);<br/><br/>    // insert cycle<br/>    head-&gt;next-&gt;next-&gt;next-&gt;next-&gt;next = head-&gt;next-&gt;next;<br/><br/>    if (detectcyc(head))<br/>        cout &lt;&lt; &quot;Cycle Found&quot;;<br/>    else<br/>        cout &lt;&lt; &quot;No Cycle Found&quot;;<br/><br/>    return 0;<br/>}</code></pre> </div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="output" class="color-blue">Output</h2>
</div>
</div>
<div class="Output" style="text-align: justify;">
<div class="hddn">
<figure class="highlight">
<pre><code class="hljs" data-lang=""><span class="nt">Cycle Found
</span></code></pre>
</figure>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="method-2-floyds-cycle-detection-algorithm" class="color-green">Method 2 &#8211; Floyd’s Cycle Detection Algorithm</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Use two pointers, which move through the sequence at different speed.</li>
<li>The fast <a href="https://www.wikitechy.com/tutorials/c++/c++-pointers-to-structure" target="_blank" rel="noopener">pointer</a> moves twice as quickly as the slow pointer.</li>
<li>Here the distance between the two pointers increased by 1 at each step.</li>
<li>If these <a href="https://www.wikitechy.com/tutorials/c++/pointer-to-array-in-c++" target="_blank" rel="noopener">pointers</a> meet at same node then there is a loop else <a href="https://www.wikitechy.com/technology/sorted-insert-circular-linked-list-2/" target="_blank" rel="noopener">linked list</a> doesn’t have loop.</li>
</ul>
</div>
</div>
<div class="TextHeading">
<div class="hddn">
<h2 id="sample-code-2" class="color-blue" style="text-align: justify;">Sample Code</h2>
<div class="code-embed-wrapper"> <div class="code-embed-infos"> </div> <pre class="language-java code-embed-pre line-numbers"  data-start="1" data-line-offset="0"><code class="language-java code-embed-code">#include &lt;iostream&gt;<br/>#include &lt;unordered_set&gt;<br/>using namespace std;<br/><br/>// Data Structure to store a linked list node<br/>struct Node<br/>{<br/>    int dt;<br/>    Node* next;<br/>};<br/><br/>// Helper function to create a new node with the given data and<br/>// pushes it onto the front of the list<br/>void push(Node*&amp; headRef, int dt)<br/>{<br/>    // create a new linked list node from heap<br/>    Node* nNode = new Node;<br/><br/>    nNode-&gt;dt = dt;<br/>    nNode-&gt;next = headRef;<br/>    headRef = nNode;<br/>}<br/><br/>// Function to detect Cycle in a linked list using<br/>// Floyd’s Cycle Detection Algorithm<br/>bool dcycle(Node *head)<br/>{<br/>    // take two pointers - slow and fast<br/>    Node *slow = head, *fast = head;<br/><br/>    while (fast &amp;&amp; fast-&gt;next)<br/>    {<br/>        // move slow by one pointer<br/>        slow = slow-&gt;next;<br/><br/>        // move fast by two pointers<br/>        fast = fast-&gt;next-&gt;next;<br/><br/>        // if they meet any any node, linked list contains a cycle<br/>        if (slow == fast)<br/>            return true;<br/>    }<br/><br/>    // we reach here if slow &amp; fast pointer do not meet<br/>    return false;<br/>}<br/><br/>// Detect Cycle in a linked list using Floyd’s Cycle Detection Algorithm<br/>int main()<br/>{<br/>    // input keys<br/>    int k[] = { 1, 2, 3, 4, 5 };<br/>    int n = sizeof(k) / sizeof(k[0]);<br/><br/>    Node* head = nullptr;<br/>    for (int i = n - 1; i &gt;= 0; i--)<br/>        push(head, k[i]);<br/><br/>    // insert cycle<br/>    head-&gt;next-&gt;next-&gt;next-&gt;next-&gt;next = head-&gt;next-&gt;next;<br/><br/>    if (dcycle(head))<br/>        cout &lt;&lt; &quot;Cycle Found&quot;;<br/>    else<br/>        cout &lt;&lt; &quot;No Cycle Found&quot;;<br/><br/>    return 0;<br/>}</code></pre> </div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="output-2" class="color-blue">Output</h2>
</div>
</div>
<div class="Output">
<div class="hddn">
<figure class="highlight" style="text-align: justify;">
<pre><code class="hljs" data-lang=""><span class="nt">Cycle Found</span></code></pre>
</figure>
</div>
</div>
</div>
</div>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/data-structure/how-to-detect-a-cycle-in-a-linked-list/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Binary Tree in Data Structures ?</title>
		<link>https://www.wikitechy.com/interview-questions/data-structure/what-is-binary-tree-in-data-structures/</link>
					<comments>https://www.wikitechy.com/interview-questions/data-structure/what-is-binary-tree-in-data-structures/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Tue, 13 Jul 2021 16:37:21 +0000</pubDate>
				<category><![CDATA[Data Structure]]></category>
		<category><![CDATA[a full binary tree with n leaves contains]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[almost complete binary tree]]></category>
		<category><![CDATA[Altimetrik India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Materials interview questions and answers]]></category>
		<category><![CDATA[array to bst]]></category>
		<category><![CDATA[b tree in data structure]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[binary search tree example]]></category>
		<category><![CDATA[binary search tree in data structure]]></category>
		<category><![CDATA[binary tree]]></category>
		<category><![CDATA[binary tree example]]></category>
		<category><![CDATA[binary tree in data structure program]]></category>
		<category><![CDATA[binary tree properties]]></category>
		<category><![CDATA[binary treetypes of binary tree]]></category>
		<category><![CDATA[BMC Software interview questions and answers]]></category>
		<category><![CDATA[bst deletion]]></category>
		<category><![CDATA[bst in data structure]]></category>
		<category><![CDATA[bst java]]></category>
		<category><![CDATA[bst traversal]]></category>
		<category><![CDATA[bst tree]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[CGI Group Inc interview questions and answers]]></category>
		<category><![CDATA[Chetu interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Collabera Te interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[complete binary tree in data structure]]></category>
		<category><![CDATA[complete binary tree properties]]></category>
		<category><![CDATA[data tree]]></category>
		<category><![CDATA[database tree structure]]></category>
		<category><![CDATA[define bst]]></category>
		<category><![CDATA[define tree in data structure]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[difference between binary tree and complete binary tree]]></category>
		<category><![CDATA[extended binary tree]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[full binary tree]]></category>
		<category><![CDATA[full binary tree number of nodes]]></category>
		<category><![CDATA[Genpact interview questions and answers]]></category>
		<category><![CDATA[Globallogic India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[perfect binary tree]]></category>
		<category><![CDATA[properties of binary search tree]]></category>
		<category><![CDATA[properties of binary search tree in data structure]]></category>
		<category><![CDATA[properties of binary tree]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Sapient Consulting Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[strictly binary tree]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[Tracxn Technologies Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[tree algorithms]]></category>
		<category><![CDATA[tree data structure]]></category>
		<category><![CDATA[tree structure]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Wipro Infotech interview questions and answers]]></category>
		<category><![CDATA[WM Global Technology Services India Pvt.Ltd Limited (WMGTS) interview questions and answers]]></category>
		<category><![CDATA[Xoriant Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Yodlee Infotech Pvt Ltd interview questions and answers]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=495</guid>

					<description><![CDATA[Answer : Binary tree is a special type of data structure...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-binary-tree-in-data-structures" class="color-pink">What is Binary Tree in Data Structures ?</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li><a href="https://www.wikitechy.com/technology/c-program-lowest-common-ancestor-binary-search-tree/" target="_blank" rel="noopener">Binary tree</a> is a special type of <a href="https://www.wikitechy.com/technology/applications-tree-data-structure/" target="_blank" rel="noopener">data structure</a>. In binary tree, every node can have a maximum of 2 children, which are known as Left child and Right Child.</li>
<li>It is a method of placing and locating the records in a database, especially when all the data is known to be in random access memory (RAM).</li>
<li>A <a href="https://www.wikitechy.com/technology/c-program-check-binary-tree-bst-not/" target="_blank" rel="noopener">binary tree</a> has the benefits of both an ordered array and a linked list as search is as quick as in a <a href="https://www.wikitechy.com/technology/algorithm-in-c-median-of-two-sorted-arrays/" target="_blank" rel="noopener">sorted array</a> and insertion or deletion operation are as fast as in linked list.</li>
</ul>
</div>
</div>
<div class="ImageContent">
<div class="hddn"><img decoding="async" class="img-responsive center-block" src="https://cdn.wikitechy.com/interview-questions/data-structure/what-is-binary-tree-in-data-structures.jpg" alt="What is Binary Tree in Data Structures" /></div>
</div>
<div class="TextHeading">
<div class="hddn">
<h2 id="representation-of-binary-tree-using-array" class="color-green">Representation of Binary Tree using Array</h2>
</div>
</div>
<ul>
<li><a href="https://www.wikitechy.com/interview-questions/data-structure/if-the-depth-of-a-tree-is-3-levels-then-what-is-the-size-of-the-tree/" target="_blank" rel="noopener">Binary tree</a> using array represents a node which is numbered sequentially level by level from left to right. Even empty nodes are numbered.</li>
</ul>
<div class="TextHeading">
<div class="hddn">
<h2 id="sample-code" class="color-blue">Sample Code</h2>
<div class="code-embed-wrapper"> <div class="code-embed-infos"> </div> <pre class="language-javascript code-embed-pre line-numbers"  data-start="1" data-line-offset="0"><code class="language-javascript code-embed-code">// JAVA implementation of tree using array <br/>// numbering starting from 0 to n-1. <br/>import java.util.*;<br/>import java.lang.*;<br/>import java.io.*;<br/><br/>class bTree {<br/>    public static void main(String[] args) {<br/>        btree_Array obj = new btree_Array();<br/>        obj.Root(&quot;P&quot;);<br/>        // obj.set_Left(&quot;Q&quot;, 0); <br/>        obj.set_Right(&quot;R&quot;, 0);<br/>        obj.set_Left(&quot;S&quot;, 1);<br/>        obj.set_Right(&quot;T&quot;, 1);<br/>        obj.set_Left(&quot;U&quot;, 2);<br/>        obj.print_Tree();<br/>    }<br/>}<br/><br/>class btree_Array {<br/>    static int root = 0;<br/>    static String[] s = new String[10];<br/><br/>    /*create root*/<br/>    public void Root(String key) {<br/>        s[0] = key;<br/>    }<br/><br/>    /*create left son of root*/<br/>    public void set_Left(String key, int root) {<br/>        int t = (root * 2) + 1;<br/><br/>        if (s[root] == null) {<br/>            System.out.printf(&quot;Can&#039;t set child at %d, no parent found\n&quot;, t);<br/>        } else {<br/>            s[t] = key;<br/>        }<br/>    }<br/><br/>    /*create right son of root*/<br/>    public void set_Right(String key, int root) {<br/>        int t = (root * 2) + 2;<br/><br/>        if (s[root] == null) {<br/>            System.out.printf(&quot;Can&#039;t set child at %d, no parent found\n&quot;, t);<br/>        } else {<br/>            s[t] = key;<br/>        }<br/>    }<br/><br/>    public void print_Tree() {<br/>        for (int i = 0; i &lt; 10; i++) {<br/>            if (s[i] != null)<br/>                System.out.print(s[i]);<br/>            else<br/>                System.out.print(&quot;-&quot;);<br/><br/>        }<br/>    }<br/>}</code></pre> </div>
<h2 id="output" class="color-purple">Output</h2>
<div class="code-embed-wrapper"> <div class="code-embed-infos"> </div> <pre class="language-javascript code-embed-pre line-numbers"  data-start="1" data-line-offset="0"><code class="language-javascript code-embed-code">Can&#039;t set child at 3, no parent found<br/>Can&#039;t set child at 4, no parent found<br/>P-R--U----</code></pre> </div>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/data-structure/what-is-binary-tree-in-data-structures/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
