Mailprotector Interview Questions & Answers

Mailprotector Interview Questions

Would you like to put your hard work in a right place? Go on to to build a career that will help you achieve your goals. Mail protector is the one job suits you. In this critical role, you will be part of a private investigator and part goodwill ambassador as you connect with potential channel partners. Job givers are looking for young talent as well as experienced whatever they need for the role. Enhance Mail protector jobs interview questions and answers page for more information and for your thoughts. Visit the site to get more opportunities about your worth. Get the notifications and attend the interview with high-end confidence with your talent and grab the opportunity for a bright future.

Mailprotector Interview Questions And Answers

Mailprotector Interview Questions
    1. Question 1. What Is The Chain Of Custody?

      Answer :

      When keeping track of data or equipment for use in legal proceedings, it needs to remain in a pristine state. Therefore, documenting exactly who has had access to what for how long is vital when dealing with this situation. Any compromise in the data can lead to legal issues for the parties involved and can lead to a mistrial or contempt depending on the scenario.

    2. Question 2. What Is The Difference Between A Black Hat And A White Hat?

      Answer :

      This particular question can lead into a major philosophical debate about freedom of information, and if something is implemented in a deliberately broken way it isn't actually breaking into it, etc etc. The one I have heard the most is the classic Jedi example  same tools, different ideologies. Personally, with the people I know that have worked on both sides of the line it comes down to this  the difference between a Black Hat and a White Hat is who is signing the check.

    3. Question 3. Why Would You Bring In An Outside Contractor To Check The Security Issues?

      Answer :

      Much like getting a fresh set of eyes on a problem, sometimes you have people that don't want to see or don?t want to admit to an issue. Bringing in extra help as an audit can really help eliminate problems that your team isn?t able to resolve on their own. Granted they may cost a small fortune, but they are extremely good at what they do.

    4. Question 4. What Is A Honeypot?

      Answer :

      Honeypot is fake computer system which behaves like a real system and attracts hackers to attack on it. Honeypot is used to find out loop holes in the system and to provide solution for these kinds of attacks.

    5. Question 5. How Much Will The New Export Process For Data Cost?

      Answer :

      There is no additional cost to export your data, however, you will need to keep your account active for the duration of the export.

    6. Question 6. Why Is It Easier To Break Into A Windows Local Account Than An Ad Account?

      Answer :

      Windows local accounts have a great deal of baggage tied to them, running back a long long way to keep compatibility for user accounts. If you are a user of passwords longer than 13 characters, you may have seen the message referring to this fact. However, Active Directory accounts have a great deal of security tied onto them, not the least of which is that the system actually doing the authenticating is not the one you are usually sitting at when you are a regular user. Breaking into a Windows.

    7. Question 7. What Is Ssl And Why Is It Not Enough When It Comes To Encryption?

      Answer :

      SSL is identity verification, not hard data encryption. It is designed to be able to prove that the person you are talking to on the other end is who they say they are. SSL and its big brother TLS are both used almost everyone online, but the problem is because of this it is a huge target and is mainly attacked via its implementation (The Heartbleed bug for example) and its known methodology. As a result, SSL can be stripped in certain circumstances, so additional protections for data-in-transit .

    8. Question 8. What Is The Cia Triangle?

      Answer :

      Confidentiality, Integrity, Availability. As close to a code for Information Security as it is possible to get, it is the boiled down essence of InfoSec. Confidentiality- keeping data secure. Integrity- keeping data intact. Availability- keeping data accessible.

    9. Question 9. What Is The Three-way Handshake? How Can It Be Used To Create A Dos Attack?

      Answer :

      ACK is the acknowledgement of the server back to the client, saying that yes I hear you, let's open a connection. SYN/ACK is the final connection, and allows the two to speak. The problem is that this can be used as a very basic type of Denial of Service Attack. The client opens up the SYN connection, the server responds with the SYN/ACK, but then the client sends another SYN. The server treats this as a new connection request and keeps the previous connection open.

    10. Question 10. What Is The Difference Between Information Protection And Information Assurance?

      Answer :

      Information Protection is just what it sounds like- protecting information through the use of Encryption, Security software and other methods designed to keep it safe. Information Assurance on the other hand deals more with keeping the data reliable .RAID configurations, backups, non-repudiation techniques, etc.

    11. Question 11. What Is Iso 17799?

      Answer :

      ISO/IEC 17799 is originally published in UK and defines best practices for Information Security Management. It has guidelines for all organizations small or big for Information security.

    12. Question 12. What Is Worse In Firewall Detection, A False Negative Or A False Positive?

      Answer :

      Far and away is a false negative. A false positive is annoying, but easily dealt with  calling a legitimate piece of traffic bad. A false negative however is a piece of malicious traffic being let through without incident  definitely bad.

    13. Question 13. What Is An Easy Way To Configure A Network To Allow Only A Single Computer To Login On A Particular Jack?

      Answer :

      Sticky ports are one of the network admin's best friends and worst headaches. They allow you to set up your network so that each port on a switch only permits one (or a number that you specify) computer to connect on that port by locking it to a particular MAC address. If any other computer plugs into that port, the port shuts down and you receive a call that they can't connect anymore. If you were the one that originally ran all the network connections then this isn't a big issue.

    14. Question 14. What Is The Difference Between Closed-source And Open-source? Which Is Better?

      Answer :

      Open-source however provides the source code to be able to inspect everything it does, as well as be able to make changes yourself and recompile the code. Both have arguments for and against them, most have to do with audits and accountability. Closed-source advocates claim that open-source causes issues because everybody can see exactly how it works and exploit weaknesses in the program. Open-source counter saying that because closed-source programs don't provide ways to fully check them out.

    15. Question 15. What Is Exfiltration?

      Answer :

      Exfiltration is just the opposite: getting sensitive information or objects out of a location without being discovered. In an environment with high security, this can be extremely difficult but not impossible. Again we turn to our friends in the fake delivery uniforms wandering around the building, and see that yes there are ways to get in and out without a lot of issues.

    16. Question 16. Explain The Term Dag (data Availability Group)?

      Answer :

      DAG or Data Availability Group is a framework build is MS Exchange 2013. It is a group of upto 16 mailbox server that hosts a set of databases and provides automatic database level recovery due to failure of servers of databases.

    17. Question 17. What Are The Types Of Cookies?

      Answer :

      Types of Cookies are:

      Session Cookies : These cookies are temporary and last in that session only.

      Persistent cookies : These cookies stored on the hard disk drive and last till its expiry or manually removal of it. 

    18. Question 18. List The Components Used In Ssl?

      Answer :

      Secure Sockets Layer protocol or SSL is used to make secure connection between client and computers.

      Below are the component used in SSL:

      • SSL Recorded protocol
      • Handshake protocol
      • Change Cipher Spec
      • Encryption algorithms.

    19. Question 19. How To Judge If A Remote Server Is Running Iis Or Apache?

      Answer :

      Error messages often times give away what the server is running, and many times if the website administrator has not set up custom error pages for every site, it can give it away as simply as just entering a known bad address. Other times, just using telnet can be enough to see how it responds.

    20. Question 20. Why Would You Want To Use Ssh From A Windows Pc?

      Answer :

      SSH (TCP port 22) is a secure connection used on many different systems and dedicated appliances. Routers, Switches, SFTP servers and unsecure programs being tunnelled through this port all can be used to help harden a connection against eavesdropping. Despite the fact that most times when you hear about somebody SSHing into a box it involves Linux, the SSH protocol itself is actually implemented on a wide variety of systems  though not by default on most Windows systems. Programs like PuTTY.

    21. Question 21. What Do You Think Of Social Networking Sites Such As Facebook And Linkedin In The Context Of Data Security?

      Answer :

      This is a doozy, and there are an enormous number of opinions for this question. Many think they are the worst thing that ever happened to the world, while others praise their existence. In the realm of security, they can be the source of extreme data leaks if handled in their default configurations. It is possible to lock down permissions on social networking sites, but in some cases this isn't enough due to the fact that the backend is not sufficiently secured.

    22. Question 22. What Are The Three Ways To Authenticate A Person?

      Answer :

      Something they know (password), something they have (token), and something they are (biometrics). Two-factor authentication often times uses a password and token setup, although in some cases this can be a PIN and thumbprint.

    23. Question 23. What Is Port Scanning?

      Answer :

      Ports are the point from where information goes in and out of any system. Scanning of the ports to find out any loop holes in the system are known as Port Scanning. There can be some weak points in the system to which hackers can attack and get the critical information. These points should be identified and prevented from any misuse.

    24. Question 24. List The Parameters That Define An Ssl Session State?

      Answer :

      The parameters that define an SSL session state are:

      • Session identifier
      • Peer certificate
      • Compression method
      • Cipher spec
      • Master secret
      • Is resumable.

    25. Question 25. Describe Network Intrusion Detection System?

      Answer :

      Network Intrusion Detection System generally known as NIDS. It is used for analysis of the passing traffic on the entire sub-net and to match with the known attacks. If any loop hole identified then administrator receives an alert. 

    26. Question 26. What Is Meant By Recipient Resolution, Routing Resolution And Content Conversion For Emails?

      Answer :

      Recipient Resolution: The e-mail address of the recipient is resolved to decide whether the recipient has got a mailbox in the Exchange Organization or an external e-mail address

      Routing Resolution: Once the information regarding the recipient is resolved, the ultimate destination for the mail is routed, and the next hop are determined

      Content Conversion: Once the mail has reached its determined address, the SMTP is converted into readable format like HTML, rich text format or plain text .

    27. Question 27. What Is Data Protection In Transit Vs Data Protection At Rest?

      Answer :

      When data is protected while it is just sitting there in its database or on its hard drive- it can be considered at rest. On the other hand, while it is going from server to client it is in-transit. Many servers do one or the other- protected SQL databases, VPN connections, etc, however there are not many that do both primarily because of the extra drain on resources. It is still a good practice to do both however, even if it does take a bit longer.

    28. Question 28. How Will This Affect Detection Rate Performance For Either Malware Or Spam?

      Answer :

      No change in performance is expected. Intel Security will continue to provide support for the affected products to maintain the performance levels of the malware and spam protection through the 5 years transition period.

    29. Question 29. How Do You Protect Your Home Wireless Access Point?

      Answer :

      • There are a lot of different ways to protect a Wireless Access Point: using WPA2, not broadcasting the SSID, and using MAC address filtering are the most popular among them. 
      • There are many other options, but in a typical home environment, those three are the biggest.
      • By now you have seen more than a fair amount of troubles. You have got a toolkit of regularly used  programs, a standard suite of protection utilities, you're comfortable with cleanups.

    30. Question 30. What Are The Most Important Steps You Would Recommend For Securing A New Web Server?

      Answer :

      Web Server Security:

      • Update/Patch the web server software
      • Minimize the server functionality  disable extra modules
      • Delete default data/scripts
      • Increase logging verboseness
      • Update Permissions/Ownership of files

      Web Application Security:

      Make sure Input Validation is enforced within the code- Security QA testing.

    31. Question 31. Why Does Ingest Need To Cease Prior To Export Starting?

      Answer :

      Export is essentially a snapshot of your archive. If the contents are constantly being added to after the export begins, there would need to be another differential export after the first export completes in order to get all the new email that was archived since the export began. This would become a loop as new data is continually added, so the best solution is to "freeze" the contents of the archive during export. This also means that selective purge and retention purge will be suspended.

    32. Question 32. What's The Difference Between A White Box Test And A Black Box Test?

      Answer :

      Information given by the person commissioning the test. A White Box test is one where the pen testing team is given as much information as possible regarding the environment, while a Black Box test iswell a Black Box. They don't know what's inside.

    33. Question 33. Explain "url Manipulation"?

      Answer :

      URL manipulation is a type of attack in which hackers manipulate the website URL to get the critical information. The information is passed in the parameters in the query string via HTTP GET method between client and server. Hackers can alter the information between these parameters and get the authentication on the servers and steal the critical data.

    34. Question 34. What's The Difference Between Symmetric And Asymmetric Encryption?

      Answer :

      To boil down an extremely complicated topic into a few short words, Symmetric encryption uses the same key to encrypt and decrypt, while Asymmetric uses different keys for encryption and decryption. Symmetric is usually much faster, but is difficult to implement most times due to the fact that you would have to transfer the key over an unencrypted channel. Therefore many times an Asymmetric connection will be established first, then send creates the Symmetric connection.

    35. Question 35. What Is The Difference Between An Hids (host Intrusion Detection System) And A Nids (network Intrusion Detection System)?

      Answer :

      Both acronyms are Intrusion Detection Systems, however the first is a Host Intrusion Detection System whereas the second is a Network Intrusion Detection System. An HIDS runs as a background utility in the same as an anti-virus program for instance, while a Network Intrusion Detection System sniffs packets as they go across the network looking for things that aren't quite ordinary. Both systems have two basic variants: signature based and anomaly based.

    36. Question 36. Name The Two Common Techniques Used To Protect A Password File?

      Answer :

      Two common techniques to protect a password file are- hashed passwords and a salt value or password file access control.

    37. Question 37. Why To Do Need To Be Concerned About Our Mail Security?

      Answer :

      It seems like we can't go more than a few days anymore without hearing about a major breach, which on the surface would make it seem that more people and places are being hacked than ever before (which to be honest is true). However, it also shows that detection and reporting of attacks is improving per requirements of both government entities and insurance companies. As a result, the public and security professionals are both better informed as to what they can do to help protect themselves.

    38. Question 38. Why Are Internal Threats Oftentimes More Successful Than External Threats?

      Answer :

      This means that if you see somebody that pokes around day after day, month after month, you might get used to the fact that he is just curious. You let your guard down, and don't react as quickly to possible threats. On the other hand, say for example you have an annoyed employee that is soon to be fired and wants to show his soon to be former employer that he can bring them down, so he sells his still active credentials and card-key to a local group that specializes in white-collar crime.

    39. Question 39. What Is The Difference Between A Vulnerability And An Exploit?

      Answer :

      A lot of people would say that they are the same thing, and in a sense they would be right. However, one is a potential problem while the other is an active problem. Think of it like this: You have a shed with a broken lock where it won't latch properly. In some areas such as major cities, that would be a major problem that needs to be resolved immediately, while in others like rural areas its more of a nuisance that can be fixed when you get around to it. In both scenarios it would be a vulnerable.

    40. Question 40. What Is Soap And Wsdl?

      Answer :

      SOAP or Simple Object Access Protocol is a XML-based protocol through which applications exchange information over HTTP. XML requests are send by web services in SOAP format then a SOAP client sends a SOAP message to the server. The server responds back again with a SOAP message along with the requested service.

    41. Question 41. Why Was Proofpoint Selected?

      Answer :

      Proofpoint is a clear leader in Gartner's Magic Quadrant for Secure Email Gateway. Proofpoint is also a leader in Gartner's Magic Quadrant for Enterprise Information Archiving. Moreover, Proofpoint has products to match our email security portfolio (albeit more feature rich) and has products that extend to adjacent messaging areas which Intel Security does not have. Further details on the partnership will be forthcoming shortly.

    42. Question 42. What Is Ssl Connection And An Ssl Session?

      Answer :

      • SSL or secured socket layer connection is a transient peer-to-peer communications link where each connection is associated with one SSL Session.
      • SSL session can be defines as association between client and server generally crated by handshake protocol. There are set of parameters are defined and it may be share by multiple SSL connections.

    43. Question 43. What Is The Role Of Client Access Server?

      Answer :

      The Client Access Server gives connectivity to various services like

      • Microsoft Office Outlook
      • Outlook Web App
      • Mobile devices
      • POP & SMTP
      • Accepts mail from delivers mail to other mail hosts on the internet
      • Gives unified namespace, network security and authentication
      • Handles all client requests for Exchange
      • Routes requests to the correct mailbox server
      • Allows the use of layer 4 (TCP affinity) routing.

    44. Question 44. How Would You Find Out What A Post Code Means?

      Answer :

      POST is one of the best tools available when a system will not boot. Normally through the use of either display LEDs in more modern systems, or traditionally through audio tones, these specific codes can tell you what the system doesn't like about its current setup. Because of how rare these events can be, unless you are on a tech bench day in and day out, reference materials such as the Motherboard manual and your search engine of choice can be tremendous assets.

    45. Question 45. What's Better, A Red Team Or A Blue Team, In Penetration Testing Scenarios?

      Answer :

      In penetration testing scenarios, a red team is trying to break in while a blue team is defending. Red Teams typically are considered the cooler  of the two, while the Blue Team is usually the more difficult. The usual rules apply like in any defense game: the Blue Team has to be good every time, while the Red Team only has to be good once. That's not entirely accurate given the complexities at work in most scenarios, but it's close enough to explain the idea.

    46. Question 46. How Would You Lock Down A Mobile Device?

      Answer :

      The baseline for these though would be three key elements: An anti-malware application, a remote wipe utility, and full-disk encryption. Almost all modern mobile devices regardless of manufacturer have anti-malware and remote wipe available for them, and very few systems now do not come with full-disk encryption available as an option directly within the OS.

    47. Question 47. What Is A Cookie?

      Answer :

      Cookie is a piece of information received from web server and stored in a web browser which can be read anytime later. Cookie can contain password information, some auto fill information and if any hackers get these details it can be dangerous.

    48. Question 48. How To Reset A Password-protected Bios Configuration?

      Answer :

      While BIOS itself has been superseded by UEFI, most systems still follow the same configuration for how they keep the settings in storage. Since BIOS itself is a pre-boot system, it has its own storage mechanism for its settings and preferences. In the classic scenario, simply popping out the CMOS (complementary metal-oxide-semiconductor) battery will be enough to have the memory storing these settings lose its power supply, and as a result it will lose its settings.

Popular Interview Questions

All Interview Questions

All Practice Tests

All rights reserved © 2020 Wisdom IT Services India Pvt. Ltd Protection Status

JavaMail API Tutorial