Q1. What do you understand by the terms encryption and decryption? A1. Encryption is the process of converting clear data (e.g. database password, credit card number, etc) to incomprehensible cyberyext…
…Q1. What do you understand by the terms encryption and decryption? A1. Encryption is the process of converting clear data (e.g. database password, credit card number, etc) to incomprehensible cyberyext…
Login Register 100+ Free Java interview FAQs 100+ Free Big Data interview FAQs
Q1. What is kerberos? A1. Kerberos is a network authentication protocol designed to provide strong authentication for client/server applications by means of secret-key cryptography. Kerberos ensures the highest level of…
Login Register 100+ Free Java interview FAQs 100+ Free Big Data interview FAQs
Q1. Can you provide a high level overview of the “access control security” in a recent application you had worked? A1. As shown below, SiteMinder is configured to intercept the…
Login Register 100+ Free Java interview FAQs 100+ Free Big Data interview FAQs
Q1. Why are there so many security terminologies & standards compared to tradional security systems? A1. In traditional authentication (i.e. identify yourself) / authorisation (i.e. do you have access to…
Login Register 100+ Free Java interview FAQs 100+ Free Big Data interview FAQs
Q1. What is an LDAP server? And what is it used for in an enterprise environment? A1. LDAP stands for Lightweight Directory Access Protocol. This is an extensible open network…
Login Register 100+ Free Java interview FAQs 100+ Free Big Data interview FAQs
Below questions are based on the above diagram, and extends AWS Q&As on VPC, Subnets, Availability Zones, VPN, Route tables, NACLs & Security Groups & 15+ AWS Services overview interview…
Login Register 100+ Free Java interview FAQs 100+ Free Big Data interview FAQs
DBeaver is a universal tool to access any database or cloud application that has an ODBC or JDBC Driver such as MySQL, Oracle, Salesforce, Hive, Impala, Teradata, Redshift, Snowflake, etc. SQL Databases like Impala & Hive are secured with Kerberos & SSL. This post discusses how you can access an Impala or Hive database that is secured with Kerberos & SQL security from DBeaver.…
Why? You may have a certificate with SHA1RSA key size less than 1024 bits or you have a certificate in your chain that uses MD2RSA.
Explanation? MD2 was widely recognized as insecure and thus disabled in Java in version JDK 7 onwards. If you check the “java.security” file under “$JAVA_HOME/jre/lib/security”, you will see a line as shown below.…
Q1. What are some of the issues you encounter with SSL handshake? A1. Some of the issues you try to debug are Presence of a valid certificate in trust store…
Login Register 100+ Free Java interview FAQs 100+ Free Big Data interview FAQs
Q1. What do you understand by the term “HTTP Basic Authentication”? A1. HTTP Basic authentication is the simplest “access controls” technique for web resources like RESTful web service call. It…
Login Register 100+ Free Java interview FAQs 100+ Free Big Data interview FAQs