10 Top CS Interview Questions

+
10 Top CS Interview Questions

1) What is Cryptography?

Cryptography is the practice and study of techniques for securing communication and data from unauthorized access by converting it into an unreadable format. It involves 


2) What is the difference between Symmetric and Asymmetric encryption?

IDS (Intrusion Detection System) monitors network or system activities and alerts administrators of suspicious activities but does not take action. IPS (Intrusion Prevention System) not only detects but also blocks or prevents detected threats in real-time.


3) What is the difference between IDS and IPS?

The CIA triad stands for Confidentiality, Integrity, and Availability—three core principles of information security. Confidentiality ensures data is accessible only to authorized users, Integrity guarantees that data is accurate and unaltered, and Availability ensures data and systems are accessible when needed.


4) Explain CIA triad.

Encryption is a reversible process that converts plaintext into ciphertext using keys, allowing authorized parties to decrypt it back. Hashing is a one-way function converting data into a fixed-size string (hash), which cannot be reversed, used mainly for data verification and integrity checks.


5) How is Encryption different from Hashing?

A firewall is a security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It is used to block unauthorized access while permitting legitimate communication, thereby protecting networks from attacks.


6) What is a Firewall and why is it used?

Vulnerability Assessment identifies, quantifies, and prioritizes vulnerabilities in a system, generally through automated scanning. Penetration Testing simulates real attacks to exploit vulnerabilities actively, demonstrating how an attacker could breach the system.


7) What is the difference between VA (Vulnerability Assessment) and PT (Penetration Testing)?

The three-way handshake is the process used by TCP/IP networks to establish a reliable connection between a client and server. It involves three steps: SYN (synchronize), SYN-ACK (synchronize-acknowledge), and ACK (acknowledge).


8) What is a three-way handshake?

A three-way handshake establishes a TCP connection by exchanging SYN, SYN-ACK, and ACK packets between client and server.


9) What are the response codes that can be received from a Web Application?

Web applications return HTTP response codes like 200 (OK), 201 (Created), 301 (Moved Permanently), 400 (Bad Request), 401 (Unauthorized), 403 (Forbidden), 404 (Not Found), 500 (Server Error), and others.


10) What is traceroute? Why is it used?

Traceroute traces the path data packets take to a destination, helping diagnose network delays, failures, and identify each hop between source and target.


What Our Students Saying

Companies Our Alumni Are Employed At

The alumni of Techpro Education have the opportunity to take their seats in leading companies in the IT industry. Prominent tech corporates hire our candidates for their challenging software tasks.

TechPro Education Huawei
TechPro Education Mavi Soft
TechPro Education PNC Bank
TechPro Education Avansas
TechPro Education ETIYA
TechPro Education Tech Mahindra
TechPro Education Infosys
TechPro Education Capgemini
TechPro Education Walmart
TechPro Education CapitalOne
TechPro Education Vanguard
TechPro Education ZLTECH
TechPro Education Best Buy
TechPro Education Accenture
TechPro Education Ziraat Bank


TechPro Education IBM
TechPro Education USB
TechPro Education Bank Of America
TechPro Education National Bank
TechPro Education Chase
TechPro Education Betclic
TechPro Education NEC
TechPro Education Mastercard
TechPro Education Defacto
TechPro Education Amazon
TechPro Education Vodofone
TechPro Education Mercedes
TechPro Education VISA
TechPro Education Porsche
TechPro Education The Hartford