This PPT on cybersecurity interview questions part 3 will focus on operating systems and applications questions. Here, you will be acquainted with various questions related to operating systems, sniffing tools, Linux, and many more. So, let's get started!
Start learning today's most in-demand skills for FREE. Visit us at https://www.simplilearn.com/skillup-f... Choose over 300 in-demand skills and get access to 1000+ hours of video content for FREE in various technologies like Data Science, Cybersecurity, Project Management & Leadership, Digital Marketing, and much more.
Start learning today's most in-demand skills for FREE. Visit us at https://www.simplilearn.com/skillup-f...
Choose over 300 in-demand skills and get access to 1000+ hours of video content for FREE in various technologies like Data Science, Cybersecurity, Project Management & Leadership, Digital Marketing, and much more.
Post Graduate Program in Cyber Security:
This Post Graduate Program in Cyber Security is designed to equip you with the skills required to become an expert in the rapidly growing field of Cyber Security. This cyber security course aims to help you stay abreast all the latest trends in cyber security as well. This Post Graduate Program in Cyber Security will help you learn comprehensive approaches to protecting your infrastructure and securing your data, including risk analysis and mitigation, cloud-based security, and compliance. You will receive foundational to advanced security skills through industry-leading certification courses that are part of the program.
Key Features:
✅ Simplilearn Post Graduate Certificate
✅ Masterclasses from MIT Faculty
✅ Featuring Modules from MIT SCC and EC-Council
✅ 150+ hours of Applied Learning
✅ Get noticed by the top hiring companies
✅ EC-Council learning kit
✅ Industry case studies in cyber security
✅ MIT SCC Professional Learning Community
✅ Capstone project in 3 domains
✅ 25+ hands-on projects
Learn more at: http://bit.ly/37Cf1SK
www.simplilearn.com
Interactive Powerpoint_How to Master effective communication
Cyber Security Interview Questions Part - 3 | Operating System Interview Questions | Simplilearn
1.
2. What is virtual memory?21
Virtual memory is a storage allocation method in which secondary memory (Hard disk) is used as the primary
memory (RAM)
4 GB RAM
1 TB hard disk
4 GB from hard disk is used as RAM
3. What are the different scheduling algorithms?22
First come first
serve (FCFS)
The process which requests the
CPU first, gets the CPU allocation
first
5. What are the different scheduling algorithms?22
First come first
serve (FCFS)
Shortest job first
The process with the shortest
execution time should be selected
for execution next
6. What are the different scheduling algorithms?22
First come first
serve (FCFS)
Shortest job first Priority scheduling
The scheduler selects the tasks to
work as per the priority
7. What are the different scheduling algorithms?22
First come first
serve (FCFS)
Shortest job first Priority scheduling
Multiple level
queues
Processes are assigned to a queue
based on a specific property like the
process priority, size of the memory,
etc.
8. What are the different scheduling algorithms?22
First come first
serve (FCFS)
Shortest job first Priority scheduling
Shortest remaining
time
Multiple level
queues
The process will be allocated to
the task, which is closest to its
completion
9. What are the different scheduling algorithms?22
First come first
serve (FCFS)
Shortest job first Priority scheduling
Round RobinShortest remaining
time
Multiple level
queues
Each process that comes in turn,
gets an equal share of time
10. What are the steps involved in hacking a server or network?23
This phase has all the steps to gather
evidence and information on the targets you
want to attack
01 Reconnaissance
02 Scanning
03 Gain access
05 Cover tracks
04 Maintain access
11. What are the steps involved in hacking a server or network?23
Take the information you gathered in
recon and actively apply tools and
techniques to collect more in-depth
information on targets01 Reconnaissance
02 Scanning
03 Gain access
05 Cover tracks
04 Maintain access
12. What are the steps involved in hacking a server or network?23
In this phase, accurate attacks are leveled
against the targets enumerated in the
second phase
01 Reconnaissance
02 Scanning
03 Gain access
05 Cover tracks
04 Maintain access
13. What are the steps involved in hacking a server or network?23
In this phase, hackers ensure that
they have a way back into the
compromised system
01 Reconnaissance
02 Scanning
03 Gain access
05 Cover tracks
04 Maintain access
14. What are the steps involved in hacking a server or network?23
01 Reconnaissance
02 Scanning
03 Gain access
05 Cover tracks
Attackers try to conceal their success
and avoid detection by security
professionals
04 Maintain access
15. What are various sniffing tools?24
Wireshark is used to analyze
the network in detail
TCPDUMP analyzes the
packets getting which are
transmitted
MSN Sniifer 2 is first chat
sniffing tool
This tool is perfect for man in
the middle attack
Dsniff is a password and
network analyzing tool
EtherApe displays network
activity graphically
16. What is an operating system?25
• Operating system is a software program that
provides a platform for computer hardware to
communicate and operate with the computer
software
• For input and output functions, operating system
acts as intermediate between program and
computer hardware
• Some examples of operating system are Windows,
Unix, Android, Linux, etc.
17. What is the difference between micro kernel and macro kernel?26
Aspects Micro kernel Macro kernel
Size Small Large
Execution Slow Fast
Extendibility Easy to extend Hard to extend
Security
If it crashes, working on
microkernel only is affected
If it crashes, the whole
system crashes
Code More coding is required Less coding is required
Example QNX, Symbian, L4Linux Linux, BSDs
18. What are the different types of operating systems?27
The computer operator
places the jobs coming
from input devices into
batches
Multi programmed
OS
Batched OS
Distributed OS
Time sharing OS
Real-time OS
19. What are the different types of operating systems?27
Many computers are
interconnected with
communication networks
Multi programmed
OS
Batched OS
Distributed OS
Time sharing OS
Real-time OS
20. What are the different types of operating systems?27
Time sharing OS
minimizes the response
time
Multi programmed
OS
Batched OS
Distributed OS
Time sharing OS
Real-time OS
21. What are the different types of operating systems?27
The operating system
uses CPU scheduling to
separate jobs
Multi programmed
OS
Batched OS
Distributed OS
Time sharing OS
Real-time OS
22. What are the different types of operating systems?27
Operating system gives
maximum time to critical
operations
Multi programmed
OS
Batched OS
Distributed OS
Time sharing OS
Real-time OS
23. What is the difference between logical address space and physical address
space?
28
Aspects Logical address Physical address
Definition
Address generated during
running of program is called
logical address
Physical address is
physical location of the
memory
Visibility Viewable Not viewable
Address space Logical Physical
Access Access only physical address Not directly accessed
Generation Generated by CPU
Computed by memory
management unit
Variation Variable Constant
24. What is the difference between logical address space and physical address
space?
28
14000
Logical
address
346
Physical
address
14346
CPU
Relocation
register
Memory
MMU
Diagram representing logical and physical address
25. Which shells are used in Linux?29
bash
ksh
csh
zsh
fish
Bourne again shell is default for Linux distributions
Korn shell is a high-level programming shell which supports
associative arrays and built-in operations
Friendly interactive shell which provides features like auto-
suggestions, configurations, etc.
Z shell provides unique features like filename generation, start up
files, etc.
C shell does spelling corrections and job control
26. What are the process states in Linux?30
Completed or
Terminated
Ready
Running
Blocked or wait
Zombie
27. What are the process states in Linux?30
In this state, the process
is created and is ready to
run
Completed or
Terminated
Ready
Running
Blocked or wait
Zombie
28. What are the process states in Linux?30
Completed or
Terminated
Ready
Running
Blocked or wait
Zombie
Here, the process is
being executed
29. What are the process states in Linux?30
Completed or
Terminated
Ready
Running
Blocked or wait
Zombie
In this state, the process is
waiting for input from the
user
30. What are the process states in Linux?30
Completed or
Terminated
Ready
Running
Blocked or wait
Zombie
Here, either the process
completed execution or was
terminated by the OS
31. What are the process states in Linux?30
Completed or
Terminated
Ready
Running
Blocked or wait
Zombie
In this state, the process is
terminated but the process
table still holds the
information
32. INDIA
Simplilearn Solutions Pvt. Limited
#53/1C, 24th Main, 2nd Sector
HSR Layout, Bangalore 560102
Phone: +91 8069999471
UNITED STATES
Simplilearn Solutions Pvt. Limited
801 Corporate Center Drive, Suite 138
Raleigh, NC 27607
Phone: (919) 205-5565
UNITED STATES
Simplilearn Solutions Pvt. Limited
201 Spear Street, Suite 1100
San Francisco, CA 94105
Phone: (415) 741-3319
Join us to learn more!
simplilearn.com