InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What do you mean by Forward Secrecy and how does it work? |
|
Answer» Forward secrecy is a property of certain key agreement PROTOCOLS that ensures that the session keys will not be exposed if the server's private key is exposed. Perfect forward secrecy is another name for it (PFS). Cybersecurity is critical because it safeguards all types of DATA against theft and loss. Sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, data, and governmental and industry information systems all fall under this category.
|
|
| 2. |
What do you mean by Active reconnaissance? |
|
Answer» Active reconnaissance is a type of computer assault in which an intruder interacts with the target system in order to gather information about weaknesses. |
|
| 3. |
What are Polymorphic viruses? |
|
Answer» Polymorphic viruses are sophisticated file infectors that may build changed versions of themselves in order to avoid detection while maintaining the same FUNDAMENTAL behaviors after each infection. Polymorphic viruses encrypt their programming and employ various encryption keys each time to alter their physical file MAKEUP throughout each infection. |
|
| 4. |
How do you decide the placement of the encryption function? |
|
Answer» We must decide what to encrypt and where the encryption mechanism should be situated if encryption is to be USED to counter attacks on confidentiality. Link and end-to-end encryption are the two main ways of encryption placement. |
|
| 5. |
What form of cookie might be used in a spyware attack? |
|
Answer» A TRACKING COOKIE, instead of a session cookie, would be USED in a spyware attack because it would last through MULTIPLE SESSIONS rather than just one. |
|
| 6. |
What is the difference between virus and worm? |
|
Answer» A virus is a piece of harmful executable CODE that is attached to ANOTHER executable file and can modify or erase data. When a virus-infected computer application executes, it takes ACTION such as removing a file from the computer system. Viruses can't be managed from afar. |
|
| 7. |
What do you mean by SQL Injection? How do you prevent it? |
|
Answer» SQL INJECTION is a typical attack in which FRAUDSTERS employ malicious SQL scripts to manipulate backend databases and get access to sensitive data. The hostile actor can see, edit, or remove important company data, customer lists, or customers' personal details contained in the SQL DATABASE after the attack is successful. The following practices can help you AVOID SQL Injection ATTACKS:
|
|
| 8. |
What do you mean by ARP poisoning? |
|
Answer» Address Resolution Protocol Poisoning is a sort of cyber-attack that USES a network device to convert IP addresses to physical addresses. On the network, the host SENDS an ARP broadcast, and the RECEIVER machine responds with its physical address. |
|
| 9. |
Differentiate between spear phishing and phishing? |
|
Answer» Spear phishing is a type of phishing assault that targets a small number of high-value targets, USUALLY just one. Phishing usually entails SENDING a bulk EMAIL or message to a big group of people. It implies that spear-phishing will be much more personalized and perhaps more well-researched (for the individual), whereas phishing will be more like a real fishing trip where WHOEVER eats the hook is CAUGHT. |
|
| 10. |
Differentiate between Stream Cipher and Block Cipher. |
||||||||||||
|
Answer» The MAJOR distinction between a block CYPHER and a stream cypher is that a block cypher turns plain text into ciphertext one block at a time. Stream cypher, on the other hand, converts plain text into ciphertext by taking one byte of plain text at a time.
|
|||||||||||||
| 11. |
What do you mean by Domain Name System (DNS) Attack? |
|
Answer» DNS hijacking is a SORT of cyberattack in which cyber thieves utilize weaknesses in the Domain Name System to redirect USERS to malicious websites and steal data from targeted machines. Because the DNS system is such an important part of the INTERNET infrastructure, it poses a serious cybersecurity risk. These can be avoided by the following precautions:- |
|
| 12. |
Differentiate between HIDS and NIDS. |
|
Answer» HIDs look at CERTAIN host-based actions including what apps are RUN, what files are accessed, and what information is stored in the kernel logs. NIDs examine the flow of data between COMPUTERS, often known as network traffic. They basically "sniff" the network for unusual activity. As a result, NIDs can IDENTIFY a hacker before he can make an unlawful entry, whereas HIDs won't notice ANYTHING is wrong until the hacker has already gotten into the system. |
|
| 13. |
What do you mean by System Hardening? |
|
Answer» In general, system HARDENING refers to a set of tools and procedures for managing vulnerabilities in an organization's systems, applications, FIRMWARE, and other components.
|
|
| 14. |
Differentiate between Black Box Testing and White Box Testing. |
||||||||||||||
Answer»
|
|||||||||||||||
| 15. |
What do you mean by Network Sniffing? |
|
Answer» Sniffing is a technique for evaluating data packets delivered across a network. This can be accomplished through the use of specialized software or hardware. Sniffing can be used for a variety of PURPOSES, including:
|
|
| 16. |
Differentiate between IDS and IPS in the context of Cyber Security. |
|
Answer» Intrusion Detection Systems (IDS) scan and monitor NETWORK traffic for signals that attackers are attempting to infiltrate or steal data from your network using a KNOWN CYBER threat. IDS systems detect a variety of activities such as security policy violations, malware, and port scanners by comparing current network ACTIVITY to a known threat database. |
|
| 17. |
What do you mean by a DDoS attack? How can you prevent it? |
|
Answer» It's a form of cyber threat or malicious effort in which fraudsters use Internet traffic to fulfill legitimate requests to the target or its surrounding infrastructure, causing the target's regular traffic to be disrupted. The requests originate from a variety of IP addresses, which might cause the system to become unworkable, overload its servers, cause them to slow down or GO offline, or prevent an organization from performing its essential responsibilities. The methods listed below will assist you in stopping and PREVENTING DDOS attacks: |
|
| 18. |
Differentiate between Symmetric and Asymmetric Encryption. |
||||||||||||||
Answer»
|
|||||||||||||||
| 19. |
Which is more reliable: SSL or HTTPS? |
|
Answer» SSL (SECURE Sockets Layer) is a secure technology that allows two or more parties to communicate securely over the internet. To PROVIDE security, it works on top of HTTP. It works at the Presentation layer. |
|
| 20. |
What do you mean by perimeter-based and data-based protection? |
|
Answer» Perimeter-based cybersecurity entails putting SECURITY MEASURES in place to safeguard your company's network from hackers. It examines PEOPLE attempting to break into your network and prevents any suspicious intrusion attempts. The term "data-based PROTECTION" refers to the use of security measures on the data itself. It is UNAFFECTED by network connectivity. As a result, you can keep track of and safeguard your data regardless of where it is stored, who accesses it, or which connection is used to access it. |
|
| 21. |
Differentiate between VPN and VLAN. |
|
Answer» Companies use VLANs to consolidate devices that are dispersed across several remote sites into a single broadcast domain. VPNs, on the other hand, are USED to transmit secure data between two offices of the same organization or between offices of different companies. Individuals also use it for their personal needs. |
|