All language subtitles for 2. Important Fundamental Interview questions Part 2

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew Download
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,460 --> 00:00:01,560 Hello, everyone. 2 00:00:01,570 --> 00:00:04,420 In this video, we will talk about fundamental questions. 3 00:00:04,420 --> 00:00:10,510 Part two, we already have discussed up to 28 and let's start from 29. 4 00:00:10,690 --> 00:00:16,150 So open source and license software, which one you are going to perform? 5 00:00:16,810 --> 00:00:18,850 Definitely see here what is happening. 6 00:00:19,030 --> 00:00:24,820 You know, the difference between open source and license software is that license software is keep 7 00:00:24,820 --> 00:00:25,570 updating. 8 00:00:25,570 --> 00:00:26,080 Right. 9 00:00:26,230 --> 00:00:32,920 And that's very easy to track for any organization, whereas the open source, you don't know to whom 10 00:00:33,070 --> 00:00:37,990 you are going to contact it and whether that will that will solve your problem or not. 11 00:00:37,990 --> 00:00:43,930 But in licensed software, what is happening, you can easily take those people who can actually help 12 00:00:43,930 --> 00:00:44,320 you. 13 00:00:44,950 --> 00:00:49,480 So that's why license software is much better than open source software. 14 00:00:49,960 --> 00:00:51,160 Now what is DNS? 15 00:00:51,160 --> 00:00:57,070 So the end is nothing, but it's a domain name system turns domain names into IP addresses which browsers 16 00:00:57,070 --> 00:00:59,560 use to load internet pages. 17 00:00:59,890 --> 00:01:07,270 Well, let's say example you are writing WW dot google.com then definitely DNS is responsible. 18 00:01:07,270 --> 00:01:13,480 Who there is a domain name and it is converting into the IP address because computer can't understand 19 00:01:13,480 --> 00:01:13,960 domain. 20 00:01:13,960 --> 00:01:14,470 Right. 21 00:01:15,980 --> 00:01:22,460 Now how this works, you can actually go to this YouTube.com, this channel, and you can go through 22 00:01:22,700 --> 00:01:24,920 this log Houdini's box, right? 23 00:01:25,070 --> 00:01:29,030 So you can go through these two links and that will be much better. 24 00:01:29,030 --> 00:01:31,430 And you will get to know that how actually it works. 25 00:01:32,100 --> 00:01:33,140 Now, what is TLD? 26 00:01:33,170 --> 00:01:35,450 So a top level domain domain. 27 00:01:35,450 --> 00:01:35,930 Sorry. 28 00:01:36,020 --> 00:01:40,850 So it is the most generic domain in the Internet heretical audience. 29 00:01:41,120 --> 00:01:44,270 So what really is the final component of a domain name? 30 00:01:44,300 --> 00:01:45,770 Let's let's take an example. 31 00:01:45,770 --> 00:01:46,230 Right. 32 00:01:46,250 --> 00:01:51,040 So if there is something you can say google.com, right? 33 00:01:51,050 --> 00:01:53,540 So this dot com com. 34 00:01:53,540 --> 00:01:53,930 Right. 35 00:01:53,930 --> 00:01:57,650 So this com is one of the TLD that is a top level domain. 36 00:01:57,650 --> 00:02:02,260 And let's say here is an example I have given developer dot mozilla dot org. 37 00:02:02,390 --> 00:02:02,710 Right. 38 00:02:02,750 --> 00:02:05,720 So that over there is one of the TLD. 39 00:02:06,530 --> 00:02:08,930 So this is what top level domain. 40 00:02:09,770 --> 00:02:11,030 What is name server names? 41 00:02:11,030 --> 00:02:17,690 Our server is responsible to convert or translate the domain name into an IP addresses. 42 00:02:17,840 --> 00:02:22,800 So names of let's say there is a WW dot dot Google dot com right. 43 00:02:22,820 --> 00:02:30,640 So name server is responsible to convert WW dot google.com into 8.8.8.8. 44 00:02:30,650 --> 00:02:31,220 Right. 45 00:02:31,460 --> 00:02:32,820 So this is what we are. 46 00:02:32,900 --> 00:02:34,130 We have name server. 47 00:02:36,040 --> 00:02:42,220 Now canonical names a canonical name or we can say a typical C name is a type of domain name system 48 00:02:42,220 --> 00:02:47,830 database record that indicates that domain name is the nickname or list for another domain name. 49 00:02:48,430 --> 00:02:50,080 So let's take an example. 50 00:02:50,080 --> 00:02:54,930 There is a website we have example dot com, right? 51 00:02:54,940 --> 00:03:06,370 And that is the three subdomains the let's say w one example dot com w two examiner.com w three and 52 00:03:06,700 --> 00:03:14,290 you are, you are the owner of that example dot com and you want all this sub domain should show the 53 00:03:14,290 --> 00:03:22,450 example dot com whenever a user go through W one example dot com then that should be redirect to example 54 00:03:22,450 --> 00:03:22,990 dot com. 55 00:03:22,990 --> 00:03:23,320 Right. 56 00:03:23,320 --> 00:03:30,670 So this is what can only claim that actually you are using some some other things, but once you will 57 00:03:32,380 --> 00:03:36,880 enter into it, that is going to somewhere else from the same page. 58 00:03:36,880 --> 00:03:42,780 So this is what can ethnical name which indicates that the domain name is the nickname or we can say 59 00:03:42,880 --> 00:03:44,890 list for any other domain name. 60 00:03:47,350 --> 00:03:54,490 Now what it is you find when you search IP domain for DNS lookup so you can search any any type of IP 61 00:03:54,520 --> 00:04:02,890 right on DNS lookup, you can search for that and you will find out that here a WWE saw a name, so 62 00:04:02,920 --> 00:04:04,760 you will find more details as well. 63 00:04:04,800 --> 00:04:05,220 Right. 64 00:04:05,230 --> 00:04:07,270 So now what exactly it is? 65 00:04:07,270 --> 00:04:17,410 What is that a a will denotes, you know, the IPv4 address w w will denote you, it will show you IPv6 66 00:04:17,410 --> 00:04:18,160 addresses. 67 00:04:18,490 --> 00:04:22,090 So a it means start of authority. 68 00:04:22,510 --> 00:04:30,100 So here you will get the administrator email ID when when was the last date when that IP was updated 69 00:04:30,100 --> 00:04:30,880 or something else. 70 00:04:30,880 --> 00:04:31,220 Right. 71 00:04:31,510 --> 00:04:32,290 Name server. 72 00:04:32,290 --> 00:04:38,830 Definitely you will get with the help of this DNS lookup, there will be more components as well, but 73 00:04:38,830 --> 00:04:40,540 you will have to find out. 74 00:04:40,630 --> 00:04:46,960 You will have to search on that DNS lookup because this question definitely ask many, many Indian interviewer 75 00:04:46,960 --> 00:04:47,980 ask this question. 76 00:04:49,440 --> 00:04:51,390 What is the speed generally? 77 00:04:51,570 --> 00:05:00,270 We all know that it is used to assign the IP addresses to a host, basically in an organization or wherever. 78 00:05:00,300 --> 00:05:00,780 Right. 79 00:05:01,140 --> 00:05:04,320 And it works on the concept of Dora. 80 00:05:04,830 --> 00:05:06,600 Dora means discovery. 81 00:05:06,900 --> 00:05:07,420 Right. 82 00:05:07,440 --> 00:05:11,760 Firstly, you are there is a client and server, so client will be discover. 83 00:05:11,790 --> 00:05:15,480 Then server is going to offer an IP address. 84 00:05:15,490 --> 00:05:15,990 Right. 85 00:05:17,310 --> 00:05:18,550 And or. 86 00:05:19,770 --> 00:05:22,710 You can say request R for request. 87 00:05:23,160 --> 00:05:25,070 Again, client is going to request it. 88 00:05:25,080 --> 00:05:28,780 Then server is acknowledging it to the client. 89 00:05:28,800 --> 00:05:29,490 That's work. 90 00:05:29,960 --> 00:05:32,280 That's how it works on concept to do. 91 00:05:33,580 --> 00:05:35,560 But what is CV which authority generates? 92 00:05:35,560 --> 00:05:35,890 CV? 93 00:05:35,890 --> 00:05:38,740 CV is nothing but common vulnerabilities and exposures. 94 00:05:38,740 --> 00:05:43,630 Whenever there is some some unique vulnerabilities or something, vulnerabilities happen and there is 95 00:05:43,630 --> 00:05:44,770 no numbers of CV. 96 00:05:44,770 --> 00:05:51,250 Then definitely there is an alternative which we call CV number authority, that is C and they assign 97 00:05:51,250 --> 00:05:55,180 one of the unique CV to a particular vulnerability. 98 00:05:56,700 --> 00:05:57,990 What is a look back at this? 99 00:05:57,990 --> 00:05:58,440 Look back. 100 00:05:58,590 --> 00:05:59,310 This is nothing. 101 00:05:59,640 --> 00:06:02,070 It's your default routers. 102 00:06:02,730 --> 00:06:08,880 You have the outer having the IP 120 7.0.0.1, which is called a loopback address. 103 00:06:08,910 --> 00:06:15,750 Generally, we use these these things to check out these IP protocols, whether it's working or not. 104 00:06:15,870 --> 00:06:21,150 So packets sent to this address never reach the network, but that looked through the network interface 105 00:06:21,150 --> 00:06:22,050 card only. 106 00:06:24,410 --> 00:06:27,230 Now our difference between thread and process. 107 00:06:27,230 --> 00:06:30,560 So a process is a program under execution, right? 108 00:06:31,100 --> 00:06:32,650 That is an active program. 109 00:06:32,660 --> 00:06:37,310 A thread is a lightweight process that can manage independently by scheduler. 110 00:06:37,520 --> 00:06:43,100 So process definitely process requires more time for context switching as they are more heavy while 111 00:06:43,100 --> 00:06:49,370 they are heavy because there are multiple threads in a process, there can be multiple threads, but 112 00:06:49,370 --> 00:06:51,650 a thread is definitely a very single one. 113 00:06:51,650 --> 00:06:54,740 So definitely it will take less time because it's very lightweight. 114 00:06:54,740 --> 00:06:55,040 It. 115 00:06:56,830 --> 00:06:59,350 Now what is the difference between trade and services? 116 00:06:59,350 --> 00:07:04,120 So service is a component of Android, which performs long running operation in background. 117 00:07:04,570 --> 00:07:13,060 I think we also have seen service in Windows as well, so you can search for that as well. 118 00:07:13,090 --> 00:07:18,010 Now there is a OS level feature that allows you to do some operation in the background. 119 00:07:19,210 --> 00:07:20,470 What is Kerberos? 120 00:07:20,470 --> 00:07:21,970 Kerberos is very important. 121 00:07:21,970 --> 00:07:27,010 Kerberos is the computer network authentication protocol that works on the basis of tickets to allow 122 00:07:27,010 --> 00:07:32,780 nodes communicating over a non-secure network to prove their identity to one another in a second manner. 123 00:07:32,800 --> 00:07:34,900 So let's let's take an example here. 124 00:07:35,110 --> 00:07:39,610 You know, you might have heard or you might have seen. 125 00:07:39,740 --> 00:07:41,140 So single sign on. 126 00:07:41,140 --> 00:07:41,660 Right? 127 00:07:41,680 --> 00:07:43,900 So what was the logic behind that? 128 00:07:43,930 --> 00:07:45,460 Who is working behind that? 129 00:07:45,490 --> 00:07:48,910 So so Kerberos is is behind that. 130 00:07:48,910 --> 00:07:57,280 So and he is working it because Converse is responsible to authenticate for the third party that he's 131 00:07:57,280 --> 00:08:00,250 the right person who is accessing the single sign on. 132 00:08:02,360 --> 00:08:08,120 You might have seen what is zero x 18 or zero x 12 as well in Curve's authentication. 133 00:08:08,120 --> 00:08:10,160 So now what exactly it is? 134 00:08:10,280 --> 00:08:14,270 So zero access to extract client's credentials have been revoked. 135 00:08:14,300 --> 00:08:20,090 It means account disabled, expired, may be logged out or maybe log on us and whatever the failure 136 00:08:20,090 --> 00:08:26,060 code zero x 18, it means that the account was already disabled or logged out when the client attempted 137 00:08:26,060 --> 00:08:27,380 to authenticate. 138 00:08:29,040 --> 00:08:30,060 What is Colonel? 139 00:08:30,090 --> 00:08:36,970 So Colonel is the essential center or you can say the the heart of the OS. 140 00:08:36,990 --> 00:08:39,200 You can see the computer operating system. 141 00:08:39,210 --> 00:08:43,070 It is the core that provides the basic services for all other parts of the West. 142 00:08:43,080 --> 00:08:48,780 So it is the main layer between the West and hardware and it helps with the process of memory management. 143 00:08:48,780 --> 00:08:51,180 File system, device control network. 144 00:08:52,730 --> 00:08:53,240 A lab. 145 00:08:53,330 --> 00:08:58,670 A lab generally works on both number three, eight, nine, and it is a tool for extracting the editing 146 00:08:58,670 --> 00:09:03,200 data stored in Active Directory and other compatible directory service providers. 147 00:09:04,040 --> 00:09:09,380 And each user account in an entity has several attributes such as the, you know, the user full name 148 00:09:09,380 --> 00:09:11,330 and email address, exact TikTok star. 149 00:09:13,630 --> 00:09:14,120 Sorry. 150 00:09:14,230 --> 00:09:17,110 So now what is salted hash now? 151 00:09:17,830 --> 00:09:18,070 Why? 152 00:09:18,070 --> 00:09:19,090 We are using salt. 153 00:09:19,420 --> 00:09:20,110 Salted hash. 154 00:09:20,110 --> 00:09:21,310 We already have the hash. 155 00:09:21,340 --> 00:09:27,870 Well, hash can be cracked with the help of a rainbow table, maybe with the help of collisions. 156 00:09:27,880 --> 00:09:33,150 So that's why we are adding some extra you can say extra data. 157 00:09:33,730 --> 00:09:38,440 So the exact character in the hashes so that it can be secure. 158 00:09:41,280 --> 00:09:43,040 What is a brute force attack? 159 00:09:43,050 --> 00:09:44,340 How you will mitigate it. 160 00:09:44,340 --> 00:09:46,050 So it tries various combination. 161 00:09:46,050 --> 00:09:52,050 Maybe there will be a list of users and password and it will repeatedly use it until and unless it is 162 00:09:52,050 --> 00:09:57,390 getting so this repetitive action is like an army attacking a food. 163 00:09:57,420 --> 00:09:59,250 So mitigation, what is the mitigation? 164 00:09:59,250 --> 00:10:01,010 You can limit the login attempts, right? 165 00:10:01,140 --> 00:10:04,350 You can enable do two factor authentication. 166 00:10:04,350 --> 00:10:11,190 You can use CAPTCHAs and you can also block the malicious IP, what are encoding, hashing and encryption. 167 00:10:11,190 --> 00:10:15,900 So encoding is nothing but it convert the data into the desired format required for exchange between 168 00:10:15,900 --> 00:10:16,620 the different system. 169 00:10:16,620 --> 00:10:19,920 Let's say for example, base64 hashing. 170 00:10:19,920 --> 00:10:25,050 So hashing is nothing, but it means the integrity of a message that we have already talked about this 171 00:10:25,050 --> 00:10:31,440 and we also talked about the encryption that it ensures the data is secure and one need is our digital 172 00:10:31,440 --> 00:10:34,590 verification code for image in order to open it or access it. 173 00:10:34,590 --> 00:10:36,660 So it it shows the confidentiality. 174 00:10:36,660 --> 00:10:38,610 It shows the integrity. 175 00:10:39,920 --> 00:10:46,130 What are the PCB head reflects and what they do so senores escaped arrest and fell. 176 00:10:46,340 --> 00:10:48,530 So segment synchronize right. 177 00:10:48,530 --> 00:10:55,390 Or then means if there is an urgent package you can directly call it unless it shows that that the packet 178 00:10:55,400 --> 00:10:56,310 has been raised. 179 00:10:56,330 --> 00:10:56,750 Push. 180 00:10:56,750 --> 00:10:58,670 We can push the packet reset. 181 00:10:58,670 --> 00:11:05,480 Reset means the connection has been reset and failed means the connection has been terminated. 182 00:11:06,560 --> 00:11:08,450 What is three way TCP handshaking? 183 00:11:08,600 --> 00:11:11,060 So that's basically a very easy one. 184 00:11:11,240 --> 00:11:12,500 If there is a client server. 185 00:11:12,500 --> 00:11:16,140 So client is sending syn for a sign means it. 186 00:11:16,160 --> 00:11:23,810 Initiating the communication right and server is sending Syn plus its initiation of communication. 187 00:11:23,810 --> 00:11:30,290 Plus it has acknowledged that your client has sent the initiation request and then client is saying, 188 00:11:30,290 --> 00:11:37,100 Yeah, I got it, and he's sending the packet and the communication is established. 189 00:11:39,400 --> 00:11:41,920 What is villain, what your land means? 190 00:11:41,920 --> 00:11:44,440 What what is the difference between VPN and villain? 191 00:11:44,440 --> 00:11:50,020 So VPN it is related to remote access to a network with the secure and encrypted tunnel. 192 00:11:50,020 --> 00:11:57,490 Basically there is an encryption encrypted tunnel through which we communicate from one one PC to the 193 00:11:57,490 --> 00:12:02,620 server, maybe to the second or PC that is very secure. 194 00:12:03,980 --> 00:12:10,640 And it saves the data from prying eyes while in transit and no one on the net can capture the packets. 195 00:12:10,790 --> 00:12:16,310 Wheelin helps to group focus station that are not within the same location into the same broadcast domain, 196 00:12:16,310 --> 00:12:20,390 logically segregates network without physical segregation with searches. 197 00:12:20,630 --> 00:12:22,430 So it does not involve any encryption. 198 00:12:22,430 --> 00:12:23,990 So here the data know. 199 00:12:24,500 --> 00:12:30,980 So basically it's always in the local so it is not going to have the encryption. 200 00:12:33,520 --> 00:12:35,860 Now the difference between proxy and VPN. 201 00:12:36,130 --> 00:12:38,320 So there is a minor difference. 202 00:12:38,320 --> 00:12:46,240 You know, VPN use the encryption, whereas proxy a just VPN is also hiding your IP. 203 00:12:46,240 --> 00:12:52,570 A proxy is also hiding your IP but VPN using an encrypted tunnel through which your communication is 204 00:12:52,570 --> 00:12:54,340 happening, whereas a proxy not. 205 00:12:54,340 --> 00:13:00,790 So this is what the basic difference between these two difference between reverse proxy and forward 206 00:13:00,790 --> 00:13:01,240 proxy. 207 00:13:01,240 --> 00:13:05,800 So the main difference between the two is that forward proxy is used by the client, right? 208 00:13:05,860 --> 00:13:09,790 So let's say you are you are the client and server is not knowing your IP address. 209 00:13:09,790 --> 00:13:10,220 Right. 210 00:13:11,290 --> 00:13:20,350 And reverse proxy proxy is just a reverse of that says that server server having a particular IP and 211 00:13:20,350 --> 00:13:22,080 he is using the proxy at. 212 00:13:22,970 --> 00:13:28,670 But the client can't to know from which server he's actually getting the data. 213 00:13:29,090 --> 00:13:31,040 So that's what we what proxy. 214 00:13:33,060 --> 00:13:33,270 Now. 215 00:13:33,270 --> 00:13:35,750 Cell versus steel is how SSL works. 216 00:13:35,760 --> 00:13:36,720 Which one is better? 217 00:13:36,750 --> 00:13:42,900 Well, you can say TLS is the elder brother of SSL because TLS is more secure. 218 00:13:44,550 --> 00:13:47,370 SSL is a secure socket layer and TLS is. 219 00:13:48,280 --> 00:13:51,760 You can say, okay, let's spell facility, check it SSL. 220 00:13:51,760 --> 00:13:55,860 So it is a protocol that enables safe conversation between two or more patients. 221 00:13:55,870 --> 00:14:01,540 It is designed to identify and verify that the person you are talking to on the other end is who they 222 00:14:01,540 --> 00:14:02,170 save. 223 00:14:02,170 --> 00:14:03,830 Say they are, right. 224 00:14:04,120 --> 00:14:08,590 For example, let's say a stps that uses the cell. 225 00:14:09,450 --> 00:14:15,990 And TLC is one of transport security, which is also one of the cryptographic protocol, and that provides 226 00:14:15,990 --> 00:14:18,000 authentication data encryption between. 227 00:14:18,360 --> 00:14:24,420 You can say server machines and application SSL is the predecessor to TLS and they can be used together. 228 00:14:25,380 --> 00:14:28,730 So this is the whole process of SSL handshake process. 229 00:14:28,740 --> 00:14:30,720 You can just read out these these things. 230 00:14:30,720 --> 00:14:34,200 I'm not going to discuss these things because I have already written here. 231 00:14:34,620 --> 00:14:37,260 And definitely less is more better than SSL. 232 00:14:37,600 --> 00:14:40,280 Now, what is the difference between various forms and tools and malware? 233 00:14:40,290 --> 00:14:43,290 So now let me clear it in a very short form. 234 00:14:44,280 --> 00:14:52,470 Now, where virus can affect a particular system and it can, you know, it can make a replica of it 235 00:14:52,470 --> 00:14:59,280 tool, whereas the warm can can have the tendency of virus, but it can affect the whole network as 236 00:14:59,280 --> 00:14:59,730 well. 237 00:14:59,760 --> 00:15:06,390 Now, TROs intrusion is one of the things in which that is legitimate things is going. 238 00:15:06,810 --> 00:15:12,900 I mean, there is there will be some malware which is looks like a legitimate but it is not legitimate. 239 00:15:12,900 --> 00:15:20,370 And for that for our chosen victim have to click somewhere, we have to click, then only the Trojan 240 00:15:20,370 --> 00:15:23,750 is going to install, then it is going to work. 241 00:15:23,760 --> 00:15:31,920 So for chosen we need a victim against the victim should have click on that. 242 00:15:33,840 --> 00:15:34,370 Okay. 243 00:15:34,380 --> 00:15:37,920 So there will be no self-replicating replicating? 244 00:15:37,920 --> 00:15:38,700 Definitely. 245 00:15:39,340 --> 00:15:41,160 Now, what is the chain of custody? 246 00:15:41,190 --> 00:15:47,010 So for legal cases, the data device needs to be integrated. 247 00:15:47,040 --> 00:15:49,200 Hence any access need to be undocumented. 248 00:15:49,650 --> 00:15:50,880 Who, what, when and why? 249 00:15:50,910 --> 00:15:54,990 Compromise in this process can cause legal issues for the parties involved. 250 00:15:55,020 --> 00:16:00,300 So generally, if let's say, if there is some something happened in your office and there is some data, 251 00:16:00,300 --> 00:16:03,330 then they can take that laptop in the chain of custody. 252 00:16:03,360 --> 00:16:05,480 They will investigate all those things. 253 00:16:05,490 --> 00:16:07,950 So this is what we call chain of custody. 254 00:16:07,950 --> 00:16:09,120 So that's it, guys. 255 00:16:09,900 --> 00:16:17,070 In this, we have covered the whole fundamental questions, which we have, which I have seen in many 256 00:16:17,070 --> 00:16:24,090 interviews, which I have talked to my junior and my senior, and they have helped me in that to making 257 00:16:24,090 --> 00:16:31,830 this course, making this whole 55 questions solve related to fundamental questions. 258 00:16:32,980 --> 00:16:37,900 So that's in this video and we'll meet in next video with the model questions. 259 00:16:37,900 --> 00:16:38,560 Bye bye. 23994

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.