Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,460 --> 00:00:01,560
Hello, everyone.
2
00:00:01,570 --> 00:00:04,420
In this video, we will talk about fundamental questions.
3
00:00:04,420 --> 00:00:10,510
Part two, we already have discussed up to 28 and let's start from 29.
4
00:00:10,690 --> 00:00:16,150
So open source and license software, which one you are going to perform?
5
00:00:16,810 --> 00:00:18,850
Definitely see here what is happening.
6
00:00:19,030 --> 00:00:24,820
You know, the difference between open source and license software is that license software is keep
7
00:00:24,820 --> 00:00:25,570
updating.
8
00:00:25,570 --> 00:00:26,080
Right.
9
00:00:26,230 --> 00:00:32,920
And that's very easy to track for any organization, whereas the open source, you don't know to whom
10
00:00:33,070 --> 00:00:37,990
you are going to contact it and whether that will that will solve your problem or not.
11
00:00:37,990 --> 00:00:43,930
But in licensed software, what is happening, you can easily take those people who can actually help
12
00:00:43,930 --> 00:00:44,320
you.
13
00:00:44,950 --> 00:00:49,480
So that's why license software is much better than open source software.
14
00:00:49,960 --> 00:00:51,160
Now what is DNS?
15
00:00:51,160 --> 00:00:57,070
So the end is nothing, but it's a domain name system turns domain names into IP addresses which browsers
16
00:00:57,070 --> 00:00:59,560
use to load internet pages.
17
00:00:59,890 --> 00:01:07,270
Well, let's say example you are writing WW dot google.com then definitely DNS is responsible.
18
00:01:07,270 --> 00:01:13,480
Who there is a domain name and it is converting into the IP address because computer can't understand
19
00:01:13,480 --> 00:01:13,960
domain.
20
00:01:13,960 --> 00:01:14,470
Right.
21
00:01:15,980 --> 00:01:22,460
Now how this works, you can actually go to this YouTube.com, this channel, and you can go through
22
00:01:22,700 --> 00:01:24,920
this log Houdini's box, right?
23
00:01:25,070 --> 00:01:29,030
So you can go through these two links and that will be much better.
24
00:01:29,030 --> 00:01:31,430
And you will get to know that how actually it works.
25
00:01:32,100 --> 00:01:33,140
Now, what is TLD?
26
00:01:33,170 --> 00:01:35,450
So a top level domain domain.
27
00:01:35,450 --> 00:01:35,930
Sorry.
28
00:01:36,020 --> 00:01:40,850
So it is the most generic domain in the Internet heretical audience.
29
00:01:41,120 --> 00:01:44,270
So what really is the final component of a domain name?
30
00:01:44,300 --> 00:01:45,770
Let's let's take an example.
31
00:01:45,770 --> 00:01:46,230
Right.
32
00:01:46,250 --> 00:01:51,040
So if there is something you can say google.com, right?
33
00:01:51,050 --> 00:01:53,540
So this dot com com.
34
00:01:53,540 --> 00:01:53,930
Right.
35
00:01:53,930 --> 00:01:57,650
So this com is one of the TLD that is a top level domain.
36
00:01:57,650 --> 00:02:02,260
And let's say here is an example I have given developer dot mozilla dot org.
37
00:02:02,390 --> 00:02:02,710
Right.
38
00:02:02,750 --> 00:02:05,720
So that over there is one of the TLD.
39
00:02:06,530 --> 00:02:08,930
So this is what top level domain.
40
00:02:09,770 --> 00:02:11,030
What is name server names?
41
00:02:11,030 --> 00:02:17,690
Our server is responsible to convert or translate the domain name into an IP addresses.
42
00:02:17,840 --> 00:02:22,800
So names of let's say there is a WW dot dot Google dot com right.
43
00:02:22,820 --> 00:02:30,640
So name server is responsible to convert WW dot google.com into 8.8.8.8.
44
00:02:30,650 --> 00:02:31,220
Right.
45
00:02:31,460 --> 00:02:32,820
So this is what we are.
46
00:02:32,900 --> 00:02:34,130
We have name server.
47
00:02:36,040 --> 00:02:42,220
Now canonical names a canonical name or we can say a typical C name is a type of domain name system
48
00:02:42,220 --> 00:02:47,830
database record that indicates that domain name is the nickname or list for another domain name.
49
00:02:48,430 --> 00:02:50,080
So let's take an example.
50
00:02:50,080 --> 00:02:54,930
There is a website we have example dot com, right?
51
00:02:54,940 --> 00:03:06,370
And that is the three subdomains the let's say w one example dot com w two examiner.com w three and
52
00:03:06,700 --> 00:03:14,290
you are, you are the owner of that example dot com and you want all this sub domain should show the
53
00:03:14,290 --> 00:03:22,450
example dot com whenever a user go through W one example dot com then that should be redirect to example
54
00:03:22,450 --> 00:03:22,990
dot com.
55
00:03:22,990 --> 00:03:23,320
Right.
56
00:03:23,320 --> 00:03:30,670
So this is what can only claim that actually you are using some some other things, but once you will
57
00:03:32,380 --> 00:03:36,880
enter into it, that is going to somewhere else from the same page.
58
00:03:36,880 --> 00:03:42,780
So this is what can ethnical name which indicates that the domain name is the nickname or we can say
59
00:03:42,880 --> 00:03:44,890
list for any other domain name.
60
00:03:47,350 --> 00:03:54,490
Now what it is you find when you search IP domain for DNS lookup so you can search any any type of IP
61
00:03:54,520 --> 00:04:02,890
right on DNS lookup, you can search for that and you will find out that here a WWE saw a name, so
62
00:04:02,920 --> 00:04:04,760
you will find more details as well.
63
00:04:04,800 --> 00:04:05,220
Right.
64
00:04:05,230 --> 00:04:07,270
So now what exactly it is?
65
00:04:07,270 --> 00:04:17,410
What is that a a will denotes, you know, the IPv4 address w w will denote you, it will show you IPv6
66
00:04:17,410 --> 00:04:18,160
addresses.
67
00:04:18,490 --> 00:04:22,090
So a it means start of authority.
68
00:04:22,510 --> 00:04:30,100
So here you will get the administrator email ID when when was the last date when that IP was updated
69
00:04:30,100 --> 00:04:30,880
or something else.
70
00:04:30,880 --> 00:04:31,220
Right.
71
00:04:31,510 --> 00:04:32,290
Name server.
72
00:04:32,290 --> 00:04:38,830
Definitely you will get with the help of this DNS lookup, there will be more components as well, but
73
00:04:38,830 --> 00:04:40,540
you will have to find out.
74
00:04:40,630 --> 00:04:46,960
You will have to search on that DNS lookup because this question definitely ask many, many Indian interviewer
75
00:04:46,960 --> 00:04:47,980
ask this question.
76
00:04:49,440 --> 00:04:51,390
What is the speed generally?
77
00:04:51,570 --> 00:05:00,270
We all know that it is used to assign the IP addresses to a host, basically in an organization or wherever.
78
00:05:00,300 --> 00:05:00,780
Right.
79
00:05:01,140 --> 00:05:04,320
And it works on the concept of Dora.
80
00:05:04,830 --> 00:05:06,600
Dora means discovery.
81
00:05:06,900 --> 00:05:07,420
Right.
82
00:05:07,440 --> 00:05:11,760
Firstly, you are there is a client and server, so client will be discover.
83
00:05:11,790 --> 00:05:15,480
Then server is going to offer an IP address.
84
00:05:15,490 --> 00:05:15,990
Right.
85
00:05:17,310 --> 00:05:18,550
And or.
86
00:05:19,770 --> 00:05:22,710
You can say request R for request.
87
00:05:23,160 --> 00:05:25,070
Again, client is going to request it.
88
00:05:25,080 --> 00:05:28,780
Then server is acknowledging it to the client.
89
00:05:28,800 --> 00:05:29,490
That's work.
90
00:05:29,960 --> 00:05:32,280
That's how it works on concept to do.
91
00:05:33,580 --> 00:05:35,560
But what is CV which authority generates?
92
00:05:35,560 --> 00:05:35,890
CV?
93
00:05:35,890 --> 00:05:38,740
CV is nothing but common vulnerabilities and exposures.
94
00:05:38,740 --> 00:05:43,630
Whenever there is some some unique vulnerabilities or something, vulnerabilities happen and there is
95
00:05:43,630 --> 00:05:44,770
no numbers of CV.
96
00:05:44,770 --> 00:05:51,250
Then definitely there is an alternative which we call CV number authority, that is C and they assign
97
00:05:51,250 --> 00:05:55,180
one of the unique CV to a particular vulnerability.
98
00:05:56,700 --> 00:05:57,990
What is a look back at this?
99
00:05:57,990 --> 00:05:58,440
Look back.
100
00:05:58,590 --> 00:05:59,310
This is nothing.
101
00:05:59,640 --> 00:06:02,070
It's your default routers.
102
00:06:02,730 --> 00:06:08,880
You have the outer having the IP 120 7.0.0.1, which is called a loopback address.
103
00:06:08,910 --> 00:06:15,750
Generally, we use these these things to check out these IP protocols, whether it's working or not.
104
00:06:15,870 --> 00:06:21,150
So packets sent to this address never reach the network, but that looked through the network interface
105
00:06:21,150 --> 00:06:22,050
card only.
106
00:06:24,410 --> 00:06:27,230
Now our difference between thread and process.
107
00:06:27,230 --> 00:06:30,560
So a process is a program under execution, right?
108
00:06:31,100 --> 00:06:32,650
That is an active program.
109
00:06:32,660 --> 00:06:37,310
A thread is a lightweight process that can manage independently by scheduler.
110
00:06:37,520 --> 00:06:43,100
So process definitely process requires more time for context switching as they are more heavy while
111
00:06:43,100 --> 00:06:49,370
they are heavy because there are multiple threads in a process, there can be multiple threads, but
112
00:06:49,370 --> 00:06:51,650
a thread is definitely a very single one.
113
00:06:51,650 --> 00:06:54,740
So definitely it will take less time because it's very lightweight.
114
00:06:54,740 --> 00:06:55,040
It.
115
00:06:56,830 --> 00:06:59,350
Now what is the difference between trade and services?
116
00:06:59,350 --> 00:07:04,120
So service is a component of Android, which performs long running operation in background.
117
00:07:04,570 --> 00:07:13,060
I think we also have seen service in Windows as well, so you can search for that as well.
118
00:07:13,090 --> 00:07:18,010
Now there is a OS level feature that allows you to do some operation in the background.
119
00:07:19,210 --> 00:07:20,470
What is Kerberos?
120
00:07:20,470 --> 00:07:21,970
Kerberos is very important.
121
00:07:21,970 --> 00:07:27,010
Kerberos is the computer network authentication protocol that works on the basis of tickets to allow
122
00:07:27,010 --> 00:07:32,780
nodes communicating over a non-secure network to prove their identity to one another in a second manner.
123
00:07:32,800 --> 00:07:34,900
So let's let's take an example here.
124
00:07:35,110 --> 00:07:39,610
You know, you might have heard or you might have seen.
125
00:07:39,740 --> 00:07:41,140
So single sign on.
126
00:07:41,140 --> 00:07:41,660
Right?
127
00:07:41,680 --> 00:07:43,900
So what was the logic behind that?
128
00:07:43,930 --> 00:07:45,460
Who is working behind that?
129
00:07:45,490 --> 00:07:48,910
So so Kerberos is is behind that.
130
00:07:48,910 --> 00:07:57,280
So and he is working it because Converse is responsible to authenticate for the third party that he's
131
00:07:57,280 --> 00:08:00,250
the right person who is accessing the single sign on.
132
00:08:02,360 --> 00:08:08,120
You might have seen what is zero x 18 or zero x 12 as well in Curve's authentication.
133
00:08:08,120 --> 00:08:10,160
So now what exactly it is?
134
00:08:10,280 --> 00:08:14,270
So zero access to extract client's credentials have been revoked.
135
00:08:14,300 --> 00:08:20,090
It means account disabled, expired, may be logged out or maybe log on us and whatever the failure
136
00:08:20,090 --> 00:08:26,060
code zero x 18, it means that the account was already disabled or logged out when the client attempted
137
00:08:26,060 --> 00:08:27,380
to authenticate.
138
00:08:29,040 --> 00:08:30,060
What is Colonel?
139
00:08:30,090 --> 00:08:36,970
So Colonel is the essential center or you can say the the heart of the OS.
140
00:08:36,990 --> 00:08:39,200
You can see the computer operating system.
141
00:08:39,210 --> 00:08:43,070
It is the core that provides the basic services for all other parts of the West.
142
00:08:43,080 --> 00:08:48,780
So it is the main layer between the West and hardware and it helps with the process of memory management.
143
00:08:48,780 --> 00:08:51,180
File system, device control network.
144
00:08:52,730 --> 00:08:53,240
A lab.
145
00:08:53,330 --> 00:08:58,670
A lab generally works on both number three, eight, nine, and it is a tool for extracting the editing
146
00:08:58,670 --> 00:09:03,200
data stored in Active Directory and other compatible directory service providers.
147
00:09:04,040 --> 00:09:09,380
And each user account in an entity has several attributes such as the, you know, the user full name
148
00:09:09,380 --> 00:09:11,330
and email address, exact TikTok star.
149
00:09:13,630 --> 00:09:14,120
Sorry.
150
00:09:14,230 --> 00:09:17,110
So now what is salted hash now?
151
00:09:17,830 --> 00:09:18,070
Why?
152
00:09:18,070 --> 00:09:19,090
We are using salt.
153
00:09:19,420 --> 00:09:20,110
Salted hash.
154
00:09:20,110 --> 00:09:21,310
We already have the hash.
155
00:09:21,340 --> 00:09:27,870
Well, hash can be cracked with the help of a rainbow table, maybe with the help of collisions.
156
00:09:27,880 --> 00:09:33,150
So that's why we are adding some extra you can say extra data.
157
00:09:33,730 --> 00:09:38,440
So the exact character in the hashes so that it can be secure.
158
00:09:41,280 --> 00:09:43,040
What is a brute force attack?
159
00:09:43,050 --> 00:09:44,340
How you will mitigate it.
160
00:09:44,340 --> 00:09:46,050
So it tries various combination.
161
00:09:46,050 --> 00:09:52,050
Maybe there will be a list of users and password and it will repeatedly use it until and unless it is
162
00:09:52,050 --> 00:09:57,390
getting so this repetitive action is like an army attacking a food.
163
00:09:57,420 --> 00:09:59,250
So mitigation, what is the mitigation?
164
00:09:59,250 --> 00:10:01,010
You can limit the login attempts, right?
165
00:10:01,140 --> 00:10:04,350
You can enable do two factor authentication.
166
00:10:04,350 --> 00:10:11,190
You can use CAPTCHAs and you can also block the malicious IP, what are encoding, hashing and encryption.
167
00:10:11,190 --> 00:10:15,900
So encoding is nothing but it convert the data into the desired format required for exchange between
168
00:10:15,900 --> 00:10:16,620
the different system.
169
00:10:16,620 --> 00:10:19,920
Let's say for example, base64 hashing.
170
00:10:19,920 --> 00:10:25,050
So hashing is nothing, but it means the integrity of a message that we have already talked about this
171
00:10:25,050 --> 00:10:31,440
and we also talked about the encryption that it ensures the data is secure and one need is our digital
172
00:10:31,440 --> 00:10:34,590
verification code for image in order to open it or access it.
173
00:10:34,590 --> 00:10:36,660
So it it shows the confidentiality.
174
00:10:36,660 --> 00:10:38,610
It shows the integrity.
175
00:10:39,920 --> 00:10:46,130
What are the PCB head reflects and what they do so senores escaped arrest and fell.
176
00:10:46,340 --> 00:10:48,530
So segment synchronize right.
177
00:10:48,530 --> 00:10:55,390
Or then means if there is an urgent package you can directly call it unless it shows that that the packet
178
00:10:55,400 --> 00:10:56,310
has been raised.
179
00:10:56,330 --> 00:10:56,750
Push.
180
00:10:56,750 --> 00:10:58,670
We can push the packet reset.
181
00:10:58,670 --> 00:11:05,480
Reset means the connection has been reset and failed means the connection has been terminated.
182
00:11:06,560 --> 00:11:08,450
What is three way TCP handshaking?
183
00:11:08,600 --> 00:11:11,060
So that's basically a very easy one.
184
00:11:11,240 --> 00:11:12,500
If there is a client server.
185
00:11:12,500 --> 00:11:16,140
So client is sending syn for a sign means it.
186
00:11:16,160 --> 00:11:23,810
Initiating the communication right and server is sending Syn plus its initiation of communication.
187
00:11:23,810 --> 00:11:30,290
Plus it has acknowledged that your client has sent the initiation request and then client is saying,
188
00:11:30,290 --> 00:11:37,100
Yeah, I got it, and he's sending the packet and the communication is established.
189
00:11:39,400 --> 00:11:41,920
What is villain, what your land means?
190
00:11:41,920 --> 00:11:44,440
What what is the difference between VPN and villain?
191
00:11:44,440 --> 00:11:50,020
So VPN it is related to remote access to a network with the secure and encrypted tunnel.
192
00:11:50,020 --> 00:11:57,490
Basically there is an encryption encrypted tunnel through which we communicate from one one PC to the
193
00:11:57,490 --> 00:12:02,620
server, maybe to the second or PC that is very secure.
194
00:12:03,980 --> 00:12:10,640
And it saves the data from prying eyes while in transit and no one on the net can capture the packets.
195
00:12:10,790 --> 00:12:16,310
Wheelin helps to group focus station that are not within the same location into the same broadcast domain,
196
00:12:16,310 --> 00:12:20,390
logically segregates network without physical segregation with searches.
197
00:12:20,630 --> 00:12:22,430
So it does not involve any encryption.
198
00:12:22,430 --> 00:12:23,990
So here the data know.
199
00:12:24,500 --> 00:12:30,980
So basically it's always in the local so it is not going to have the encryption.
200
00:12:33,520 --> 00:12:35,860
Now the difference between proxy and VPN.
201
00:12:36,130 --> 00:12:38,320
So there is a minor difference.
202
00:12:38,320 --> 00:12:46,240
You know, VPN use the encryption, whereas proxy a just VPN is also hiding your IP.
203
00:12:46,240 --> 00:12:52,570
A proxy is also hiding your IP but VPN using an encrypted tunnel through which your communication is
204
00:12:52,570 --> 00:12:54,340
happening, whereas a proxy not.
205
00:12:54,340 --> 00:13:00,790
So this is what the basic difference between these two difference between reverse proxy and forward
206
00:13:00,790 --> 00:13:01,240
proxy.
207
00:13:01,240 --> 00:13:05,800
So the main difference between the two is that forward proxy is used by the client, right?
208
00:13:05,860 --> 00:13:09,790
So let's say you are you are the client and server is not knowing your IP address.
209
00:13:09,790 --> 00:13:10,220
Right.
210
00:13:11,290 --> 00:13:20,350
And reverse proxy proxy is just a reverse of that says that server server having a particular IP and
211
00:13:20,350 --> 00:13:22,080
he is using the proxy at.
212
00:13:22,970 --> 00:13:28,670
But the client can't to know from which server he's actually getting the data.
213
00:13:29,090 --> 00:13:31,040
So that's what we what proxy.
214
00:13:33,060 --> 00:13:33,270
Now.
215
00:13:33,270 --> 00:13:35,750
Cell versus steel is how SSL works.
216
00:13:35,760 --> 00:13:36,720
Which one is better?
217
00:13:36,750 --> 00:13:42,900
Well, you can say TLS is the elder brother of SSL because TLS is more secure.
218
00:13:44,550 --> 00:13:47,370
SSL is a secure socket layer and TLS is.
219
00:13:48,280 --> 00:13:51,760
You can say, okay, let's spell facility, check it SSL.
220
00:13:51,760 --> 00:13:55,860
So it is a protocol that enables safe conversation between two or more patients.
221
00:13:55,870 --> 00:14:01,540
It is designed to identify and verify that the person you are talking to on the other end is who they
222
00:14:01,540 --> 00:14:02,170
save.
223
00:14:02,170 --> 00:14:03,830
Say they are, right.
224
00:14:04,120 --> 00:14:08,590
For example, let's say a stps that uses the cell.
225
00:14:09,450 --> 00:14:15,990
And TLC is one of transport security, which is also one of the cryptographic protocol, and that provides
226
00:14:15,990 --> 00:14:18,000
authentication data encryption between.
227
00:14:18,360 --> 00:14:24,420
You can say server machines and application SSL is the predecessor to TLS and they can be used together.
228
00:14:25,380 --> 00:14:28,730
So this is the whole process of SSL handshake process.
229
00:14:28,740 --> 00:14:30,720
You can just read out these these things.
230
00:14:30,720 --> 00:14:34,200
I'm not going to discuss these things because I have already written here.
231
00:14:34,620 --> 00:14:37,260
And definitely less is more better than SSL.
232
00:14:37,600 --> 00:14:40,280
Now, what is the difference between various forms and tools and malware?
233
00:14:40,290 --> 00:14:43,290
So now let me clear it in a very short form.
234
00:14:44,280 --> 00:14:52,470
Now, where virus can affect a particular system and it can, you know, it can make a replica of it
235
00:14:52,470 --> 00:14:59,280
tool, whereas the warm can can have the tendency of virus, but it can affect the whole network as
236
00:14:59,280 --> 00:14:59,730
well.
237
00:14:59,760 --> 00:15:06,390
Now, TROs intrusion is one of the things in which that is legitimate things is going.
238
00:15:06,810 --> 00:15:12,900
I mean, there is there will be some malware which is looks like a legitimate but it is not legitimate.
239
00:15:12,900 --> 00:15:20,370
And for that for our chosen victim have to click somewhere, we have to click, then only the Trojan
240
00:15:20,370 --> 00:15:23,750
is going to install, then it is going to work.
241
00:15:23,760 --> 00:15:31,920
So for chosen we need a victim against the victim should have click on that.
242
00:15:33,840 --> 00:15:34,370
Okay.
243
00:15:34,380 --> 00:15:37,920
So there will be no self-replicating replicating?
244
00:15:37,920 --> 00:15:38,700
Definitely.
245
00:15:39,340 --> 00:15:41,160
Now, what is the chain of custody?
246
00:15:41,190 --> 00:15:47,010
So for legal cases, the data device needs to be integrated.
247
00:15:47,040 --> 00:15:49,200
Hence any access need to be undocumented.
248
00:15:49,650 --> 00:15:50,880
Who, what, when and why?
249
00:15:50,910 --> 00:15:54,990
Compromise in this process can cause legal issues for the parties involved.
250
00:15:55,020 --> 00:16:00,300
So generally, if let's say, if there is some something happened in your office and there is some data,
251
00:16:00,300 --> 00:16:03,330
then they can take that laptop in the chain of custody.
252
00:16:03,360 --> 00:16:05,480
They will investigate all those things.
253
00:16:05,490 --> 00:16:07,950
So this is what we call chain of custody.
254
00:16:07,950 --> 00:16:09,120
So that's it, guys.
255
00:16:09,900 --> 00:16:17,070
In this, we have covered the whole fundamental questions, which we have, which I have seen in many
256
00:16:17,070 --> 00:16:24,090
interviews, which I have talked to my junior and my senior, and they have helped me in that to making
257
00:16:24,090 --> 00:16:31,830
this course, making this whole 55 questions solve related to fundamental questions.
258
00:16:32,980 --> 00:16:37,900
So that's in this video and we'll meet in next video with the model questions.
259
00:16:37,900 --> 00:16:38,560
Bye bye.
23994
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.