Add office photos
Employer?
Claim Account for FREE

FireCompass

2.4
based on 11 Reviews
Filter interviews by

BNY Interview Questions and Answers

Updated 16 Jul 2024

Q1. how do you find the IP address of the website since tracert, and ping is common so, find another one.

Ans.

One way to find the IP address of a website is by using the nslookup command in the command prompt.

  • Open the command prompt on your computer.

  • Type 'nslookup' followed by the website URL (e.g. nslookup www.google.com).

  • The IP address of the website will be displayed in the 'Address' field.

  • You can also use online tools like 'ipinfo.io' to find the IP address of a website.

Add your answer

Q2. Why is the * displayed on the tracert command on the terminal

Ans.

The * displayed on the tracert command indicates that the packet has reached the final destination

  • The * symbol is shown when the packet reaches the final destination and the response is not received

  • It could also indicate that the router is configured not to respond to the ICMP request

  • The * symbol is used to show that the hop is not responding or is blocking the response

Add your answer

Q3. What are encoding, hashing, and encryption?

Ans.

Encoding, hashing, and encryption are methods used to protect data by transforming it into a different format.

  • Encoding is the process of converting data into a different format using a scheme that is publicly available. Examples include Base64 encoding.

  • Hashing is the process of converting data into a fixed-length string of characters using a mathematical algorithm. Examples include MD5 and SHA-256.

  • Encryption is the process of converting data into a secret code that can only b...read more

Add your answer

Q4. Code the Call by value and Call by reference in a simple C++ program

Ans.

Call by value passes a copy of the actual parameter, while Call by reference passes the address of the actual parameter.

  • In Call by value, changes made to the parameter inside the function do not affect the actual parameter.

  • In Call by reference, changes made to the parameter inside the function affect the actual parameter.

  • Example for Call by value: void swap(int a, int b) { int temp = a; a = b; b = temp; }

  • Example for Call by reference: void swap(int &a, int &b) { int temp = a;...read more

Add your answer
Discover BNY interview dos and don'ts from real experiences

Q5. Certificates used on their websites and find them

Ans.

Certificates used on websites can be found by checking the SSL/TLS certificate details in the browser.

  • Check the SSL/TLS certificate details in the browser by clicking on the padlock icon in the address bar.

  • Look for the certificate authority (CA) that issued the certificate.

  • Verify the validity period of the certificate and the encryption algorithm used.

  • Check for any certificate errors or warnings.

  • Some common certificate authorities include Let's Encrypt, DigiCert, and Comodo.

  • C...read more

Add your answer

Q6. OSI model with all the layer workings

Ans.

The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.

  • Physical Layer: Deals with physical connections and transmission of raw data over a physical medium (e.g. cables)

  • Data Link Layer: Manages data frames, error detection, and flow control (e.g. Ethernet)

  • Network Layer: Handles routing, addressing, and logical connections between different networks (e.g. IP)

  • Transport Layer: Ensures reliab...read more

Add your answer

Q7. nmap with all the -help otion

Ans.

nmap is a powerful network scanning tool used for discovering hosts and services on a network.

  • nmap -help will display all available options and their descriptions

  • Options include scanning techniques, target specifications, output formats, and more

  • Examples: nmap -A for aggressive scan, nmap -sV for version detection

Add your answer

Q8. Nmap with specific commands

Ans.

Nmap is a powerful network scanning tool used to discover hosts and services on a network.

  • Use 'nmap -sP ' to perform a ping scan to determine which hosts are online.

  • Use 'nmap -sS ' to perform a TCP SYN scan to determine open ports.

  • Use 'nmap -A ' to enable OS detection, version detection, script scanning, and traceroute.

  • Use 'nmap -p ' to scan a specific port on a target host.

  • Use 'nmap -O ' to perform OS detection on a target host.

Add your answer

Q9. The harvester tool

Ans.

The harvester tool is a data gathering tool used by security analysts to collect information from various sources.

  • The harvester tool can be used to gather information from social media platforms, websites, and public databases.

  • It helps security analysts in reconnaissance phase of a security assessment.

  • Examples of information gathered include email addresses, subdomains, and employee names.

Add your answer

More about working at FireCompass

HQ - Newark,Delaware, United States
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at BNY

based on 1 interviews
Interview experience
3.0
Average
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter