Updated Blue Coat Interview Questions and Answers
by Sachin, on Jul 12, 2022 11:06:32 PM
Q1. What does Blue coat do?
Blue coat gadgets are known as “double – use” innovation, since they can be utilized both to shield corporate systems and by governments to blue pencil and screen the open’s web traffic. The machines can see a few sorts of scrambled traffic, square sites or record site traffic.
Q2. What is Blue Coat intermediary? How does a Blue Coat intermediary work?
Blue Coat Proxy SG is a cloud-based item that gives clients web security. Interfacing this occasion source to Insight IDR will improve the security information for accessible for examination. The Blue Coat SG machine fills in as an intermediary for all HTTP, HTTPS, and FTP exchanges. It is designed with decides that course information to the Web sense ICAP server. Be that as it may, in checking mode, the Web sense ICAP server all around reacts to all diverted exchanges with Allow.
Q3. What do you mean by phishing?
It is basically an approach that simply deceit people from getting data from the users. Regular or genuine WebPages such as email-IDs ask users to enter their own password and ID.
Q4. What are gateways?
When it comes to getting connectivity between two or more network segments, gateways are used. A gateway is basically a computer that runs the concerned software and offers services that are related to translation.
Q5. What do you know about a backbone network?
It is basically an approach that is considered when it comes to distributing the data to various networks. The bandwidth management and channel legalizations are also the tasks that they can handle. In a true sense, it is the central infrastructure.
Q6. Name some WEP cracking tools you are familiar with?
- WEP Crack
Q7. What are web server vulnerabilities that lead to an unsecured server?
There are several vulnerabilities that can result in the same. Sometimes the users consider default settings and don’t customize them. This often creates vulnerabilities and imposes risk on the overall data present in the nodes. Many times the errors in the web servers and operating system also lead to this and create a lot of security issues. Another vulnerability is the improper configuration of the network and servers.
Q8. What are web server attacks? How can you prevent them?
These are basically the attacks by hackers directly on the server to gain access over the same. The hacking of websites, software, and nodes happens due to this. These attacks can be stopped up to a great extent through some of the best possible ways. The first step is to install and configure server software in a safe manner. The server firewall must always be enabled.
One must pay close attention to the system’s vulnerability. Sometimes there is a need to disable remote administration due to security protocols. All the accounts that are no longer in use should be removed or deleted from the server to avoid web server attacks.
Q9. Name a few useful certifications for Cyber Security Experts?
- CSL (Certified Security Leadership)
- GSEC (General Security Essentials)
- CFA (Certified Forensic Analyst)
- CFA (Certified Firewall analyst) are some of the best available options.
Q10. What does OSI stands for? Name the layers present in it?
OSI stands for open system interconnection. There are a total of seven layers that are present in this referencing model.
- Application Layer
- Presentation Layer
- Session Layer
- Transport Layer
- Network Layer
- Data Link Layer
- Physical Layer
Q11. What are the basic networking devices you are familiar with?
Q12. Explain subnet masking? Name one similarity between Subnet Mask and IP address?
Sometimes there is a need to combine the host address with the networking address. This is exactly where this approach is considered. The extended network address can be simply identified with subnet masking. It is similar to an IP address in terms of the number of bits it is made of. Both IP and subnet mast are of a 32-bit size.
Q13. What do you mean by the term data encapsulation?
Networks can face a lot of issues when it comes to sending large or bulky sizes. Thus the data is generally broken into smaller parts which are called packets or data packets. The approach is simple and i.e. the source and the destination address are attached through a temporary path that remains active till the transmission is going on.
Q14. What is a private IP address?
They are considered when it comes to using Intranets. They are not routable to external public networks are generally used for internal networks only. The same IPs can be used for multiple intranets.
Q15. What are web server assaults? How might you forestall them?
These are fundamentally the assaults by programmers straightforwardly on the server to get entrance over the equivalent. Hacking of sites, programming, and hubs occur because of this. These assaults can be plugged up to extraordinary degree through the absolute most ideal ways. The initial step is to establishment and arrangement of server programming in a sheltered way. The server firewall should consistently be empowered. One must give close consideration to the framework helplessness. Now and again there is a need to handicap remote organization because of security conventions. All the records that are not, at this point being used ought to be expelled or erased from the server to keep away from web server assaults.
Q16. What are web server vulnerabilities that lead to an unbound server?
There are a few vulnerabilities that can bring about same. In some cases the clients consider default settings and don’t redo them. This regularly makes vulnerabilities and forces chance on the general information present in the hubs. Many time the blunders in the web servers and working framework additionally prompts this and makes a great deal of security issues. Another weakness is ill-advised design of system and servers.
Q17. Clarify subnet covering? Name one closeness between Subnet Mask and IP address?
Once in a while there is a need to consolidate have address with the systems administration address. This is actually where this methodology is thought of. The all-encompassing system address can be just related to subnet veiling. It is like IP address as far as number of bits it is made of. Both IP and subnet pole are of 32-piece size.
Q18. What is Symantec ProxySG?
ProxySG conveys an adaptable intermediary stage design to make sure about web interchanges and quicken the conveyance of business applications. ProxySG empowers adaptable, granular, strategy powers over substance, clients, applications, web applications, and conventions.
Q19. Describe the role of a proxy server.
A proxy server is an intermediary that acts as both a server and a client for the purpose of
making requests on behalf of other clients.
Q20. Where can you find information about the currently available models and capacities of the ProxySGfamily?
- ProxySG Product Family
- License Capacity – Concurrent Users
- Proxy Edition License
Q21. Name three methods by which client configuration can be performed in an explicit ProxySG deployment.
- Configure the user agent to point to the IP address or hostname of the ProxySG;
- Configure the user agent to use WPAD
- Configure the user agent to point to the location of a PAC file.
Q22. What types of authentication credentials are supported in an IWA realm?
Basic, NTLM, and Kerberos.
Q23. What are the four components of a proxy service listener?
Source addresses, destination addresses, TCP port, action.