Flipkart GRID Document - Arsh Goyal

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Make sure to checkout this video for preparation guide for FLIPKART GRID :

https://openinapp.co/97k5j

Also , do SUBSCRIBE to Arsh Goyal for more such competitions and their
preparation!

Questions asked in Flipkart GRID Round 1 in


previous years.

What is the first thing you should do if your company is facing ransomware

al
demands?
Answer:
- Determine if ransomware demand is legitimate and follow

-
oy
instructions to get your data back.

Ignore the demands, but back up all data just in case.


G
- Contact the police and do not pay the ransom.

- Shutdown the computers


sh

During boot, Kernel is


Answer:
- To be loaded manually
Ar

- To be initialised once

- self extracted

- initialised on every boot cycle

Which strain of Ransomware hit Colonial Pipeline in the United States of


America?
Answer:
- Satan Ransomware
- Revil Ransomware
- WannaCry Ransomware
- Dark Side Ransomware

The Tor dark web may be referred to as X, a reference to the network's


Answer:
- Carrotland
- Onionland
- Onionport
- Onionworld

al
What is the motive behind forming a botnet by hackers?
Answer:
- Earn money
oy
- Use botnet to hack more systems
- Bring down services of a company or a website
G
- Carry out phishing attacks

What is the attack technique used to exploit websites by altering backend


database queries the gh inputting
sh

Answer:
- LDAP Injection
- XML Injection
- SQL Injection
- OS Commanding
Ar

Which of the following will ensure confidentiality?


Answer:
- Encoding
- Encryption
- Both a & b
- None of the above

An asymmetric-key cypher uses?


Answer:
- 1 Key
- 2 Key
- з Key
- 4 Key

Identify this person


Answer:
John McAfee
Edward Snowden
William John

al
None of the above

Question 13. What is the motive behind forming a botnet by hackers?


Answer:
oy
- Use botnet to hack more systems
- Bring down services of a company or a website
- Carry out phishing attacks
G
Question 22. What would be the format used to query the site Flipkart.com
about Cybersecu
sh

Answer:
site: Flipkart.com Cybersecurity
Flipkart.com - cybersecurity
Flipkart.com "cybersecurity"
Cybersecurity in flipkart.com
Ar

Question 20. Which is a hashing algorithm out of these?


Answer:
SHA1
AES128
RCA
MD5

Question 19. Why is SSL certificate required in HTTP?


Answer:
For making security weak
For making information move faster
For encrypted data sent over HTTP protocol
For sending and receiving emails unencrypted

Question 28. What kind of cybersecurity risks can be minimized by using a


Virtual Private Network (VPN)?
Answer:
Use of insecure Wi-Fi networks
Key-logging

al
De-anonymization by network operators
Phishing attacks
Previous

parties?
Answer:
oy
Question 21. Which method provides a one-time session key for two
G
ORSA
Diffie-Hellman
DES
AFS
sh

Question 29. Which of the following is an example of a phishing attack?


Answer:
Sending someone an email that contains a malicious link that is disguised
Ar

to look like an email from someone the person knows


Creating a fake website that looks nearly identical to a real website in order
to trick users into entering their login information
Sending someone a text message that contains a malicious link that is
disguised to look like a notification that the person has won a
All of the above

What would be the format used to query the site Flipkart.com about
hersecurity Answer:
site: Flipkart.com Cybersecurity
Flipkart.com - cybersecurity
Flipkart.com "cybersecurity"
Cybersecurity in flipkart.com

X is a malicious computer worm which mainly targets SCADA, PLC systems


which were discovered by Sergey Ulasen. Identify
Answer:
Stuxnet
Wormnet
Skynet

al
Worldnet

Which is usually targeted by nature where the emails are exclusively

Answer:
Algo-based phishing
Spear phishing
oy
designed to target any exact user
G
Domain Phishing
Vishing
sh

8. Where would "robots.txt" be located on the domain 'Flipkart.com'?


Answer:

C:\Windows\System32\robots.txt
Ar

C:\Windows\Web Pages\robots.txt

Flipkart.com\robots.txt

Flipkart.com\admin\robots.txt

An attacker can rewrite the transaction history by gaining control of more


than half of a cryptocurrency's network's computing power. That makes it
possible to cryptocurrency more than once, this is known as
Answer:
double spending

Crypto hijacking

Cheating
None of the above

Size of partition table in MBR is


Answer:
32 bytes

al
8 bits
64 bytes
64 bits

oy
Vulnerability in which service caused Eternal Blue Vulnerability?
Answer:
G
TLS 1.0
TLS 1.3
SMB v1
SMTP
sh

Software Engineering Track Previous Year Questions :


https://drive.google.com/drive/folders/1MDkOR1XXSCTtwol3YsiWIlUfkau
Hv8LV?usp=sharing
Ar

Note : All these questions have been gathered from previous year papers as
shared by various students across different social medias. The owner takes
no responsibility of the said questions and in no case would be help liable
for anything.

You might also like