Add office photos
FIS logo
Engaged Employer

FIS

Verified
3.9
based on 5.5k Reviews
Video summary
Filter interviews by
Intern
Experienced
Clear (1)

FIS Intern Interview Questions and Answers

Updated 5 Feb 2024

Q1. What do you understand by Three way handshake ?

Ans.

Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.

  • Three way handshake involves three steps: SYN, SYN-ACK, and ACK.

  • The client sends a SYN packet to the server to initiate the connection.

  • The server responds with a SYN-ACK packet, acknowledging the client's request.

  • Finally, the client sends an ACK packet to the server, confirming the connection establishment.

  • This process ensures reliable and synchronized communic...read more

View 1 answer
right arrow

Q2. On which layer switch and router work and their types ?

Ans.

Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.

  • Switches work on layer 2 of the OSI model and routers work on layer 3.

  • Switches are used to connect devices within a network and forward data based on MAC addresses.

  • Types of switches include unmanaged, managed, and layer 3 switches.

  • Routers are used to connect different networks and forward data based on IP addresses.

  • Types of routers include edge routers, cor...read more

Add your answer
right arrow

Q3. CIA Triad and What will we lost in DOS attack ?

Ans.

CIA Triad ensures data security. DOS attack can cause loss of availability.

  • CIA Triad stands for Confidentiality, Integrity, and Availability.

  • It ensures data security by protecting against unauthorized access, alteration, and destruction.

  • DOS attack can cause loss of availability by overwhelming a system with traffic or requests.

  • This can result in the system becoming unresponsive or crashing, making the data unavailable.

  • For example, a website may become unavailable during a DO...read more

Add your answer
right arrow

Q4. Which packets are used to perform DOS attack?

Ans.

Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.

  • SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.

  • UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.

  • ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.

  • Other types of packets, such as HTTP GET requests or DNS queries, can also be u...read more

Add your answer
right arrow
Discover FIS interview dos and don'ts from real experiences

Q5. Difference between MD5 and SHA 2

Ans.

MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.

  • MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.

  • MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.

  • SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384, and SHA-512.

  • SHA-2 is widely used for digital signatures, ...read more

Add your answer
right arrow

Q6. Cryptography and its types

Ans.

Cryptography is the practice of secure communication in the presence of third parties.

  • Symmetric-key cryptography

  • Asymmetric-key cryptography

  • Hash functions

  • Encryption algorithms

  • Digital signatures

Add your answer
right arrow

Q7. Difference between SSL and TLS

Ans.

SSL and TLS are both cryptographic protocols used to secure internet communications.

  • SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.

  • TLS stands for Transport Layer Security and is the successor to SSL.

  • TLS is more secure than SSL and offers better encryption algorithms.

  • TLS also supports newer protocols and ciphers, while SSL does not.

  • SSL is vulnerable to attacks such as POODLE and BEAST, while TLS is not.

  • TLS is used for securin...read more

Add your answer
right arrow
Contribute & help others!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Intern Interview Questions from Similar Companies

Cognizant Logo
3.7
 • 25 Interview Questions
Accenture Logo
3.8
 • 19 Interview Questions
McKinsey & Company Logo
3.8
 • 16 Interview Questions
Deloitte Logo
3.8
 • 13 Interview Questions
Sanofi Logo
4.2
 • 11 Interview Questions
View all
Recently Viewed
JOBS
JLL
No Jobs
JOBS
OSI Technologies
No Jobs
SALARIES
FIS
SALARIES
JLL
SALARIES
FIS
SALARIES
FIS
JOBS
JLL
No Jobs
JOBS
FIS
No Jobs
SALARIES
FIS
SALARIES
FIS
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter