YouTube Icon

Interview Questions.

Ibm Datapower Placement Papers - Ibm Datapower Interview Questions and Answers - Jul 28, 2022

fluid

Ibm Datapower Placement Papers - Ibm Datapower Interview Questions and Answers

Q1. Give Three Popular Algorithms Used For Encryption?

Triple DES-uses 3 man or woman keys with fifty six bits every. The overall key length adds up to 168 bits, however specialists would argue that 112-bits in key electricity is greater love it.

RSA- is a public-key encryption set of rules and the standard for encrypting records sent over the net.

AES-it's miles extraordinarily green in 128-bit shape, AES also uses keys of 192 and 256 bits for heavy responsibility encryption functions.

Q2. How Do You Gauge The Strength Of The Key, What Is The Parameter Used?

The set of rules need to be regarded to the public; however the key desires to be personal:

Key length

Performance/ Response time for Encryption or Decryption (depends on the device we use)

Mathematical proof for standardization of safety provided by that algorithm

Who supplied the certificate for the algorithm and the date of expiration date.

Q3. Why Do We Need A Digital Signature?

Digital signatures act as a verifiable seal or signature to confirm the authenticity of the sender and the integrity of the message. Users who wish to affirm their identity whilst sending a protected message can encrypt the statistics with their private key. The recipient can then decrypt the message with the sender’s public key with a view to confirm the sender’s identification and the integrity of the message.

Q4. How To I Collect A Single Log Statement As Alert As A Mail When The Object On Which Log Target Is Enables Goes Down Or Comes Up?

It is finished by setting up Event triggers.  Event triggers perform moves most effective when prompted through a specified message ID or occasion code in this situation the system goes up/down. With this filter out, it's miles viable to create a log target that collects most effective the effects of the required trigger action. For example, to cause the technology of an errors document when a certain event happens use the keep error-report command and trfer to SMTP target layout to ship as an electronic mail alert.

Q5. Why Do We Need Logtarget When There Is Already A Default Logging Mechanism Available In Datapower?

We want logtarget to seize messages which can be posted by the various gadgets and offerings which are jogging at the appliance. In order to get a specific occasion or/and object log information, we make use of logtargets.

Q6. What Is Cryptography? Why Do We Need It?

Cryptography is to defend personal conversation in the public global. For example, two entities looking to communicate – Ajitab and Mulu – are shouting their messages in a room full of people. Everyone can hear what they're saying. The intention of cryptography is to defend this conversation in order that only Ajitab and Mulu can understand the content of the messages.

Q7. What Is The Default Log Size In The Log Target? What Happens When That Log Size Is Reached?

Log size: 500 kilobytes,

When the log report reached the restriction, the device will uploaded it to the FTP server and if it's miles efficaciously uploaded, the appliance will delete the log inside the device to free area.

Q8. What Is The Log Target Type For Sending The Logs To Email, What Is The Field Name That Has To Be Given A Value For Subject Representation Of An Email?

SMTP, forwards log entries as e-mail to the configured remote SNMP servers and electronic mail addresses. Before sending, the contents of the log may be encrypted or signed. The processing rate may be restrained.

Q9. Who Issues A Certificate, Explain In Detail?

Certificate government act as depended on 1/3 parties that verify the identification of the sender of an encrypted message and issue digital certificates as evidence of authorization. These virtual certificates include the general public key of the sender, that's then exceeded along to the supposed recipient. The Certificate authorities do huge background checks earlier than giving an organisation or a given man or woman a certificate.

Q10. What Is The Value Time Stamp Format In Log Target For?

Timestamp Format: syslog

Q11. What Is A Trust Store?

A agree with shop contains certificate from other events that we expect to communicate with, or from Certificate Authorities that we believe to perceive different events. For instance, google (chrome) contains certificate of many businesses or websites. Whenever we browse that web site the browser mechanically take a look at the website for its certificates shape the shop and evaluate it. If it's far true, google will upload the ‘s’ on ‘HTTP’. That way we know that internet site is secured and believe worth.

Q12. What Are The Weakness Of Symmetric Key Cryptography And What Is The Strength Of The Asymmetric Key Cryptography?

Symmetric key cryptography:-

The biggest impediment in effectively deploying a symmetric-key algorithm is the necessity for a right exchange of private keys. This traction must be completed in a comfy way. If face to-face meeting, which proves quite impractical in many situations while taking distance and time into consideration, can not be feasible to alternate private keys. If one assumes that protection is a danger first of all due to the preference for a mystery trade of statistics within the first vicinity, the change of keys turns into similarly complicated.

Another hassle issues the compromise of a private key.  In symmetric key cryptography, each participant has an identical private key. As the wide variety of individuals in a traction increases, each the hazard of compromise and the results of this kind of compromise increase dramatically. Each extra consumer provides every other capacity point of weakness that an attacker may want to take gain of. If such an attacker succeeds in gaining manage of simply one of the non-public keys in this world, every consumer, whether there are hundreds of customers or only a few, is absolutely compromised.

Both Symmetric and Asymmetric-key cryptography also has vulnerabilities to attacks which includes the person inside the center attack. In this case, a malicious third birthday celebration intercepts a public key on its way to one of the events involved. The third birthday celebration can then instead bypass along his or her own public key with a message claiming to be from the original sender. An attacker can use this system at every step of an alternate for you to effectively impersonate every member of the communication without any other parties having know-how of this deception.

Asymmetric cryptography –More comfy!

Asymmetric keys ought to be often longer than keys in symmetric-cryptography in order to boast safety. While producing longer keys in different algorithms will commonly prevent a brute pressure attack from succeeding in any significant length of time, those computations turn out to be extra computationally in depth. These longer keys can nonetheless vary in effectiveness relying at the computing power available to an attacker.

Q13. What Is The Difference Between Object Filter And Event Filter?

Object filters permit simplest the ones log messages for specific gadgets to be written to the precise log goal. Object filters are based on item classes. With this filter out, you can create a log target that collects best log messages generated through unique times of the specified item instructions.

Event Filter allow simplest the ones log messages that include the configured event codes to be written to this log target. With this filter out, it's far possible to create a log goal that collects only log messages for a specific set of event codes.

Q14. Why Do We Need It?

We need cryptography to proportion records confidentially that is ensuring the secrecy of verbal exchange:

Authentication – Ajitab can signal his message and Mulu can confirm that he sent it primarily based on his signature

Integrity checking -Mulu can generate a checksum of the message. Ajitab can both extract it from the message or recalculate it and confirm that the message has now not been modified.

Non-repudiation – if Ajitab symptoms the message he can't deny later that he sent it, because no one else could generate that identical signature/private key.

Q15. In The Datapower File System, The Logs Are Stored Default In Log Temp? True/false, Give Appropriate File Directory If The Above Statement Is False.

True: logtemp, default vicinity of log files, together with the device-huge default log.

Q16. What Are The Different Modes Of Archival? Explain Each Mode In Two Lines Each?

Rotate, rotate the log document whilst the most length is reached. The equipment creates a replica of the document and begins a brand new file. The equipment keeps the archived copies up to the required variety of rotations. After achieving the most variety of rotations and the log file reaches its maximum length, the appliance deletes the oldest report and copies the cutting-edge document.

Upload, add the log report whilst the most length is reached. The appliance uploads the record using the desired add method.




CFG