Here you can find SI Protocols Interview Questions and Answers.
In this SI Protocols Interview Questions and Answers section you can learn and practice SI Protocols Interview Questions and Answers to improve your skills in order to face technical inerview by IT companies. By Practicing these interview questions, you can easily crack any SI Protocols interview.
AllIndiaExams provides you lots SI Protocols Interview Questions and Answers with proper explanation. Fully solved examples with detailed answer description. All students, freshers can download SI Protocols Interview Questions and Answers as PDF files and eBooks.
You no need to worry, we have given lots of SI Protocols Interview Questions and Answers and also we have provided lots of FAQ's to quickly answer the questions in the SI Protocols technical interview.
What is EDIINT ?
EDI over the Internet (EDIINT) is a working group of the Internet Engineering Task Force (IETF). Formed in February of 1996, EDIINT was chartered by the IETF to create a set of secure protocols for sending EDI data over the Internet. The two EDIINT standards that have been certified are AS1 and AS2.
How Does AS2 Work ?
AS2 provides an Internet solution for securely exchanging EDI over the Internet using Multipurpose Internet Mail Extensions (MIME) and the hypertext transmission protocol (HTTP) instead of the simple mail transport protocol (SMTP) as the transport protocol. AS2 specifies the means to connect, deliver, validate, and reply to (receipt) data in a secure and reliable way. AS2 does not concern itself with the content of the EDI document, only the transport. AS2 essentially creates a wrapper around EDI flat files that enables sending them over the Internet, instead of using a dial-up connection to a value-added network (VAN). AS2 is a real-time technology that provides security and encryption around the HTTP packets.
What are the benefits of Using AS2 ?
AS2 provides faster, almost instantaneous data transfers directly to your network and reduces the points of failure in data transmissions. Using AS2 eliminates day-to-day value-added network (VAN) charges and long distance dial-ups. AS2 also provides increased reliability and sped, improving supply-chain efficiency. Listed below are some of the main benefits of using AS2: â€¢ 24x7 availability â€¢ Designed to push data securely and reliably over the Internet â€¢ Fast and reliable connectivity â€¢ Encryption ensures that only the sender and receiver can view the data â€¢ Digital signatures ensure authentication â€¢ AS2 detects if the document was altered during transmission â€¢ Non-repudiation of receipt confirms that the intended party received the data â€¢ Faster turn-around time for business processes
What is Required to Exchange Data Using AS2 ?
â€¢ A dedicated persistent Internet connection â€¢ A web server with your EDIINT software
What is the Risk for Using AS2 ?
There is no more risk involved with transactions over AS2 then there would be with any form of normal e-Business transactions. If there is any risk with AS2, it is far outweighed by the cost savings implicit in its operation.
What is PGP ?
Pretty Good Privacy was originally developed by Phillip Zimmerman to provide a means of secure communication in an insecure electronic environment. â€œPretty Goodâ€ is an understatement â€“ the framework it is based on, PKI (Public Key Infrastructure) and its encryption standards (it can use Diffie-Helman or RSA algorithms of varying strengths), have been subjected to rigorous cryptanalysis. PGP has since grown into a more versatile application under the direction of its current owner, Network Associates (www.nai.com). Until the most recent release PGP has been completely open source, allowing anyone to review the code and suggest improvements.
How does PGP work ?
When someone starts using PGP, they generate a Key Pair. These are really just text files that look like gibberish to a human. The keys can be created at various levels of strength â€“ 512, 1024, or 2048 bit strengths are used. The higher the number, the stronger the encryption value of the key. One key of the pair is the Private key â€“ this key should always be kept safe and never given to anyone. The other key is the public key â€“ this key should be given to as many people as possible.
What are the uses of PGP ?
The most commonly used aspect of PGP is the signing and encryption of email or files. â€œSigningâ€ a document is a way of verifying the integrity of the original work. The method is as follows: 1. Make a digest or â€œhashâ€ of the file or email. A hash is an algorithm that produces (theoretically) a unique output (the hash) from a given input (the message). 2. Add the hash to the end of the message. 3. When someone wants to verify that the message has not been modified, they run the hash algorithm on the message and compare it to the hash at the end of the message. If the signatures match, the message has not been altered.
How does Encryption works ?
Encryption is a method of changing plaintext (text that is readable by humans) into ciphertext (text that is meaningless to humans). There are many different ways of encryption, some stronger than others. Two main categories of encryption are symmetric and asymmetric. In symmetric cryptography, the same key that encrypts a file also decrypts it. In asymmetric cryptography, which is what PGP uses, one key (the public key) encrypts the file, and the other key (the private key) decrypts it. So, if user A wants to send an encrypted message to user B, user A would first obtain user Bâ€™s public key. This is possible because public keys are meant to be widely distributed. Then user A encrypts the message using user Bâ€™s public key. The encrypted message can now only be decrypted with Bâ€™s private key, which only he possesses. Not even user A, who wrote the message, can decrypt what he has encrypted, because he does not possess user Bâ€™s private key. This ensures that the message is unreadable by anyone other than user A. Encryption and signing are often combined. In this scenario, user A would use user Bâ€™s public key to encrypt the message, then use his own private key to sign the message. This will ensure that no one but user B can read the message, and when user B receives it, he can be assured that the message was not altered. To read the message, userB would first use user Aâ€™s public key to verify that the signature matches. Then user B would use his private key to decrypt the message that user A wrote.