Question:- In our campus computer lab, one of my friends logged into her Yahoo account. When she left the lab, she made sure that the account was not left open. Later, she came to realize that someone re-accessed her account from the browser, which she has used to send emails, by impersonating her. How do you think this happened?
Answer:- There are two possible scenarios: 1. The attacker can visit the browser’s history to access her account if she hasn’t logged out. 2. Even if she has logged out but has not cleared the web cache (pages a browser saves to gain easy and quick access for the future)
Question:- An employee’s bank account faces an error during a direct deposit. Two different offices need to work on it to straighten this out. Office #1 contacts Office #2 by email to send the valid account information for the deposit. The employee now gives the bank confirmations that the error no longer exists. What is wrong here?
Answer:- Any sensitive information cannot be shared via email as it can lead to identity theft. This is because emails are mostly not private and secure. Sharing or sending personal information along the network is not recommended as the route can be easily tracked. In such scenarios, the involved parties should call each other and work with ITS as a secure way of sending the information.
Question:- You see an unusual activity of the mouse pointer, which starts to move around on its own and clicks on various things on the desktop. What should you do in this situation? A. Call any of the co-workers to seek help B. Disconnect the mouse C. Turn your computer off D. Inform the supervisor E. Disconnect your computer from the network F. Run anti-virus G. Select all the options that apply? Which options would you choose?
Answer:- The answer is (D) and (E). This kind of activity is surely suspicious as an unknown authority seems to have the access to control the computer remotely. In such cases, you should immediately report it to the respective supervisor. You can keep the computer disconnected from the network till help arrives.
Question:- Check out the list of passwords below, which are pulled out from a database: A. Password1 B. @#$)*&^% C. UcSc4Evr! D. akHGksmLN Choose the passwords that are in line with the UCSC’s password requirements.
Answer:- The answer is C (UcSc4Evr!). As per the UCSC requirements, a password should be: Minimum of 8 characters in length Having any of the three from these four types of characters: lower case, upper case, numbers, and special characters.
Question:- The bank sends you an email, which says it has encountered a problem with your account. The email is provided with instructions and also a link to log in to the account so that you can fix it. What do you infer from the above situation? Explain.
Answer:- It appears to be an unsolicited email. You should report it as spam and move the email to the trash immediately in the respective web client you use (Yahoo Mail, Gmail, etc.). Before providing any bank-related credentials online, you should call the bank to check if the message is legitimate and is from the bank.
Question:- In your IT company, employees are registering numerous complaints that the campus computers are delivering Viagra spam. To verify it, you check the reports, and it turns out to be correct. The computer program is automatically sending tons of spam emails without the owner’s knowledge. This happened because a hacker had installed a malicious program into the system. What are the reasons you think might have caused this incident?
Answer:- This type of attack happens when the password is hacked. To avoid this, whenever you set a password, always use a proper standard, i.e., use passwords that are at least 8-character length and have a combination of upper case/lower case letters, symbols/special characters, and numbers. Other scenarios of the above attack could be: 1. Dated antivirus software or the lack of it 2. Dated updates or security patches
Question:- Compare MongoDB with Cassandra.
Answer:- • MongoDB • Document • Read • Multi-indexed • Cassandra • Bigtable like • Write • Using Key or Scan
Question:- What makes MongoDB the best?
Answer:- MongoDB is considered to be the best NoSQL database because of its following features: • Document-oriented (DO) • High performance (HP) • High availability (HA) • Easy scalability • Rich query language
Question:- How to do transactions/locking in MongoDB?
Answer:- MongoDB does not use conventional locking with reduction as it is planned to be light, high-speed, and knowable in its presentation. It can be considered as parallel to the MySQL MyISAM auto entrust sculpt. With the simplest business sustain, performance is enhanced, particularly in a structure with numerous servers.
Question:- When and to what extent does data get extended to multi-slice?
Answer:- MongoDB scrap stands on a collection. So, an album of all substances is kept in a lump or mass. Only when there is an additional time slot, there will be more than a few slice data achievement choices, but when there is more than one lump, data gets extended to a lot of slices and it can be extended to 64 MB.
Question:- Compare MongoDB with Couchbase and CouchbaseDB.
Answer:- Although MongoDB, Couchbase, and Couchbase DB are common in many ways, still they are different in the case of necessities for the execution of the model, crossing points, storage, duplications, etc.
Question:- When do we use a namespace in MongoDB?
Answer:- During the sequencing of the names of the database and the collection, the namespace is used.
Question:- If you remove an object attribute, is it deleted from the database?
Answer:- Yes, it is deleted. Hence, it is better to eliminate the attribute and then save the object again.
Question:- If you remove an object attribute, is it deleted from the database?
Answer:- Yes, it is deleted. Hence, it is better to eliminate the attribute and then save the object again.
