0% found this document useful (0 votes)
51 views5 pages

LP 4 Viva Ques

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views5 pages

LP 4 Viva Ques

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Here are the answers to the questions in the image:

1. What is CSDF?
CSDF stands for Cyber Security and Digital Forensics.

2. What is Cyber Security?


Cyber Security is the practice of protecting systems, networks, and programs from digital
attacks aimed at accessing, changing, or destroying sensitive information, or interrupting
business operations.

3. What is Digital Forensics?


Digital Forensics is the process of uncovering and interpreting electronic data for use in legal
contexts. It involves preserving, collecting, and analyzing data from digital devices.

4. What are Email crimes?


Email crimes refer to illegal activities conducted using email, such as phishing, fraud,
malware distribution, and identity theft.

5. What are the goals for performing email forensics?


The goals include uncovering evidence of illegal activities, tracing the origin of malicious
emails, gathering evidence for legal cases, and analyzing the content and headers to identify
perpetrators.

6. What is Email forensics?


Email forensics involves the analysis of emails and related data to identify and gather
evidence of cybercrimes.

7. What are the common techniques for email forensic investigation?


Techniques include analyzing email headers, inspecting attachments for malware, reviewing
sender information, and using forensic tools for comprehensive analysis.

8. What is Email header analyzer tool?


An email header analyzer tool helps in parsing and examining the metadata of an email to
trace its origin and verify the sender's information.

9. What is G Suite Toolbox messageheader?


The G Suite Toolbox messageheader tool is used to analyze and interpret email headers to
help diagnose delivery problems and understand the routing of an email.

10. What is MX Toolbox?


MX Toolbox is an online tool that allows you to perform various network and email security
tests, including email header analysis and domain lookups.

11. What is My IP?


"My IP" refers to a public IP address that identifies your device on the internet. It can be
checked via IP lookup tools or websites.

12. What is Gaijin?


Gaijin is a Japanese term for "foreigner" or "non-Japanese person."

13. Full form for CAPTCHA?


CAPTCHA stands for Completely Automated Public Turing test to tell Computers and
Humans Apart.
14. How to import the Image CAPTCHA?
Image CAPTCHAs can be implemented using CAPTCHA libraries or APIs like Google's
reCAPTCHA.

15. How to import the audio CAPTCHA?


Audio CAPTCHAs can be integrated similarly to image CAPTCHAs by using services that offer
audio challenges, such as reCAPTCHA's audio option.

16. How to recover permanently deleted files?


Recovery can be done using data recovery tools like Recuva, EaseUS Data Recovery, or
forensic recovery software, provided the data blocks have not been overwritten.

17. How to recover deleted partitions?


Deleted partitions can be restored using tools like TestDisk, MiniTool Partition Wizard, or Disk
Drill.

18. What is full format?


A full format erases all data from a drive and scans for bad sectors, ensuring a more thorough
data removal compared to a quick format.

19. What is Quick format?


A quick format removes the file system structure without checking for bad sectors, making
data easier to recover compared to a full format.

20. Full form for SSD?


SSD stands for Solid State Drive.

21. What is log capturing?


Log capturing is the process of recording events, transactions, and activity logs from software
or hardware for monitoring, debugging, and forensic purposes.

22. What is the need for log capturing?


Log capturing helps in auditing, troubleshooting issues, tracking security breaches, and
maintaining records for compliance.

23. What are the following commands and their use?

o a) who: Displays information about users currently logged into the system.

o b) last: Shows the login history of users.

o c) lastlog: Reports the last login time for all users.

o d) last reboot: Displays the history of system reboots.

o e) strace: Traces system calls and signals of a program.

o f) cat: Concatenates and displays file content.

o g) system() function: Executes a command by calling the system's command


processor.

24. What is Honeypot?


A honeypot is a cybersecurity mechanism set up to lure attackers by simulating a vulnerable
target to gather information about threats.
25. Types of honeypot?
Types include low-interaction honeypots, high-interaction honeypots, and research
honeypots.

26. What are honeynets?


A honeynet is a network of honeypots used to monitor and detect complex attacks across an
entire network environment.

27. What are honey farms?


Honey farms refer to centralized collections of honeypots managed together to monitor and
collect data on attacker behavior.

28. What is shadow honeypots?


Shadow honeypots are used alongside production systems and are activated when
suspicious activity is detected, allowing for further monitoring.

29. What is Distributed Honeypot?


A distributed honeypot setup uses multiple honeypots spread across various locations to
collect threat intelligence from different points in a network.

30. What is Honeyd?


Honeyd is an open-source honeypot daemon that creates virtual hosts on a network to
simulate various systems and detect unauthorized access.

31. What is a Bot?


A bot is a software application programmed to perform automated tasks on the internet,
which can be legitimate (e.g., web crawling) or malicious (e.g., DDoS attacks).

32. What is Spectre?


Spectre is a security vulnerability that affects modern microprocessors by exploiting
speculative execution to potentially allow attackers to access sensitive data.

Here are the answers to the STQA (Software Testing and Quality Assurance) questions:

1. STQA (Software Testing and Quality Assurance): It involves the practices used to ensure the
quality of software products through systematic testing and verification processes.

2. Software Testing and Quality Assurance: A combination of testing (finding and fixing defects
in a software product) and quality assurance (ensuring the process followed to create the
software meets standards and best practices).

3. Test Scenario: A high-level description of what to test, providing an idea of what to validate
without detailed steps. It ensures that the end-to-end functionality of an application is
working as expected.

4. Functional and Non-Functional Test Scenarios:

o Functional Test Cases: Test the functions of an application to verify that they
conform to requirements (e.g., user login, form submission).
o Non-Functional Test Cases: Validate non-functional aspects like performance,
usability, and reliability (e.g., load testing, security testing).

5. Test Cases: Detailed step-by-step instructions on how to validate a specific functionality of


the application under test, including preconditions, steps, expected results, and actual
results.

6. Types of Test Cases:

o Positive Test Cases: Validate that the system works as expected with valid inputs.

o Negative Test Cases: Check how the system behaves with invalid inputs or
conditions.

o Boundary Test Cases: Focus on the edges of input ranges.

o Smoke Test Cases: Basic checks to ensure that the major functionalities work.

o Regression Test Cases: Ensure that changes have not affected existing functionalities.

7. Features or Columns in a Test Case:

o Test Case ID

o Test Description

o Preconditions

o Test Steps

o Expected Result

o Actual Result

o Status (Pass/Fail)

o Comments

8. Difference Between a Defect and a Bug:

o Defect: A variance between expected and actual results found during testing.

o Bug: A defect identified by a developer during the coding phase or by a user post-
release.

9. Bug Life Cycle: The process a bug goes through from identification to resolution, which
includes:

o New: Bug reported.

o Assigned: Bug assigned to a developer.

o Open: Developer starts working on the bug.

o Fixed: Developer resolves the bug.

o Retest: Tester verifies the fix.

o Closed: Bug confirmed as fixed.


o Reopened: Bug not fixed or issue reappears.

10. Selenium Grid: A tool in the Selenium suite that allows for parallel testing across different
browsers and environments by distributing tests across multiple machines.

11. Selenium WebDriver: A tool that automates web application testing to ensure they work as
expected. It directly interacts with the browser and supports various programming
languages.

12. Selenium in Eclipse: The integration of Selenium libraries into the Eclipse IDE for writing and
running automated test scripts.

13. Software Requirement Specification (SRS): A document that outlines the functional and
non-functional requirements of a software application, acting as a reference for developers
and stakeholders throughout the development process.

14. Difference Between Functional and Non-Functional Requirements:

o Functional Requirements: Specify what the system should do (e.g., user


authentication, data processing).

o Non-Functional Requirements: Define how the system performs a function (e.g.,


response time, scalability, security).

These answers summarize key concepts of software testing and quality assurance. If you need more
detailed explanations or examples for any topic, let me know!

You might also like