InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Differentiate between Information protection and information assurance. |
|
Answer» INFORMATION protection protects data from unauthorized access by utilizing encryption, security software, and other methods. |
|
| 2. |
What do you mean by Man-in-the-Middle Attack? |
|
Answer» A cyber threat (a type of eavesdropping assault) in which a cybercriminal wiretaps a communication or DATA transmission between two people is known as a man-in-the-middle attack. Once a cybercriminal ENTERS a two-way conversation, they appear to be genuine PARTICIPANTS, allowing them to obtain sensitive information and respond in a variety of ways. The main goal of this type of attack is to acquire access to our company's or customers' personal information. On an unprotected Wi-Fi network, for example, a cybercriminal may INTERCEPT data passing between the target device and the network. |
|
| 3. |
How can you avoid a brute force attack? |
|
Answer» There are a VARIETY of techniques for stopping or preventing BRUTE force attacks. A robust password policy is the most evident. Strong passwords should be enforced by every web application or public server. Standard user accounts, for example, must contain at least eight characters, a number, uppercase and lowercase letters, and a special character. Furthermore, servers should mandate password updates on a REGULAR basis.
|
|
| 4. |
What do you mean by two-factor authentication? |
|
Answer» Two-factor authentication (2FA), often known as two-step verification or dual-factor authentication, is a security method in which users validate their identity using two INDEPENDENT authentication factors. This PROCEDURE is carried out in order to better protect the user's credentials as well as the resources that the user has access to. Single-factor authentication (SFA), in which the user gives only one factor — generally a password or PASSCODE — provides a lower level of security than two-factor authentication (TFA). Since possessing the defendant's password alone is not enough to accomplish the authentication check, two-factor authentication adds an extra layer of security to the authentication PROCESS, making it more DIFFICULT for attackers to get access to a person's devices or online accounts. |
|
| 5. |
Differentiate between hashing and encryption. |
||||||||||||||||
Answer»
|
|||||||||||||||||
| 6. |
What do you mean by Phishing? |
|
Answer» PHISHING is a sort of cybercrime in which the sender appears to be a legitimate entity such as PayPal, eBay, financial institutions, or friends and coworkers. They send an email, phone call, or text message to a target or target with a link to convince them to click on the link. This link will take users to a fake website where they will be asked to enter sensitive information such as PERSONAL information, BANKING and credit card information, social security NUMBERS, usernames, and passwords. By clicking the link, malware will be installed on the target machines, allowing HACKERS to remotely control them. You can protect yourself from phishing attacks by following these guidelines:
|
|
| 7. |
What do you mean by Shoulder Surfing? |
|
Answer» Shoulder surfing is a form of physical ASSAULT that entails physically PEERING at PEOPLE's screens while they type INFORMATION in a semi-public space. |
|
| 8. |
What do you mean by brute force in the context of Cyber Security? |
|
Answer» A BRUTE FORCE attack is a cryptographic assault that uses a trial-and-error approach to guess all POTENTIAL combinations until the correct data is DISCOVERED. This exploit is commonly used by cybercriminals to gain personal INFORMATION such as passwords, login credentials, encryption keys, and PINs. It is very easy for hackers to implement this. |
|
| 9. |
What are the common types of cyber security attacks? |
|
Answer» The common types of CYBER security attacks are:- |
|
| 10. |
What do you mean by a Null Session? |
|
Answer» A null SESSION occurs when a user is not authorized using either a username or a PASSWORD. It can PROVIDE a SECURITY concern for APPS because it implies that the person making the request is unknown. |
|
| 11. |
Differentiate between Vulnerability Assessment and Penetration Testing. |
|
Answer» Vulnerability assessment and penetration testing are two different phrases that both SERVE the same purpose: to secure the network environment. Vulnerability Assessment is a process for defining, detecting, and prioritizing vulnerabilities in computer systems, network infrastructure, applications, and other systems, as well as providing the necessary information to the organization to correct the flaws. |
|
| 12. |
What do you mean by honeypots? |
|
Answer» Honeypots are ATTACK targets that are set up to see how different attackers attempt exploits. Private firms and GOVERNMENTS can utilize the same CONCEPT to evaluate their vulnerabilities, which is widely used in ACADEMIC settings. |
|
| 13. |
What do you mean by a botnet? |
|
Answer» A botnet is a collection of internet-connected devices, such as SERVERS, PCS, and mobile PHONES, that are infected with malware and controlled by it. |
|
| 14. |
What are the benefits of Cyber Security? |
|
Answer» The FOLLOWING are some of the advantages of putting cybersecurity in place and keeping it up to date:
|
|
| 15. |
What are the types of Cyber Security? |
|
Answer» The assets of every company are made up of a variety of various systems. These systems have a strong cybersecurity posture, which necessitates coordinated actions across the board. As a result, cybersecurity can be divided into the FOLLOWING sub-domains: Network security: It is the process of securing a computer network against unauthorized access, intruders, attacks, disruption, and misuse using hardware and software. This security aids in the protection of an organization's assets from both external and internal threats. Example: Using a Firewall. |
|
| 16. |
Who are Black Hat, White Hat and Grey Hat Hackers? |
|
Answer» Black Hat hackers, SOMETIMES known as crackers, attempt to obtain unauthorized access to a system in order to disrupt its operations or steal critical data. Because of its malicious aim, black hat hacking is always illegal, including stealing company data, violating the privacy, causing system damage, and blocking network connection, among other things. Ethical hackers are also referred to as White hat hackers. As part of penetration testing and vulnerability ASSESSMENTS, they never intend to harm a system; rather, they strive to uncover holes in a computer or network system. Grey hat hackers combine elements of both black and white hat hacking. They act without MALICE, but for the sake of AMUSEMENT, they exploit a security flaw in a computer system or network without the permission or knowledge of the owner. |
|
| 17. |
Define VPN. |
|
Answer» The TERM VPN refers to a VIRTUAL private network. It enables you to connect your computer to a private network, establishing an encrypted connection that hides your IP address, allowing you to safely share data and access the web while SAFEGUARDING your online identity. A virtual private network, or VPN, is an encrypted link between a device and a network via the Internet. The encrypted connection aids in the secure transmission of sensitive data. It protects against ILLEGAL eavesdropping on the traffic and allows the user to work remotely. In corporate settings, VPN technology is commonly used. |
|
| 18. |
What is a Firewall? |
|
Answer» A firewall serves as a BARRIER between a LAN and the Internet. It allows private resources to remain private while reducing security threats. It manages both inbound and outbound network traffic. A sample firewall between a LAN and the internet is shown in the diagram below. The POINT of vulnerability is the connection between the two. At this point, network traffic can be filtered using both HARDWARE and software. There are two types of firewall systems: one that uses network layer filters and the other that uses user, APPLICATION, or network layer proxy servers. |
|
| 19. |
What does XSS stand for? How can it be prevented? |
|
Answer» XSS stands for Cross-site scripting. It is a web security flaw that allows an attacker to manipulate how users interact with a susceptible application. It allows an attacker to get around the same-origin policy, which is meant to KEEP websites separate from one another. Cross-site scripting flaws allow an attacker to impersonate a victim user and execute any actions that the user is capable of, as well as access any of the user's data. If the victim user has privileged access to the application, the attacker may be able to take complete CONTROL of the app's functionality and data. Preventing cross-site scripting can be simple in some circumstances, but it can be much more difficult in others, depending on the application's sophistication and how it handles user-controllable data. In general, preventing XSS vulnerabilities will almost certainly need a mix of the following measures: |
|
| 20. |
Differentiate between threat, vulnerability and risk. |
|
Answer» Threat: A threat is any form of hazard that has the potential to destroy or steal data, disrupt operations, or cause harm in general. Malware, phishing, data breaches, and even unethical employees are all examples of threats. Vulnerability: A vulnerability is a flaw in hardware, SOFTWARE, personnel, or procedures that threat actors can use to achieve their objectives. Risk: The probability of a threat and the consequence of a vulnerability are COMBINED to form risk. To put it another way, the risk is the likelihood of a threat agent successfully exploiting a vulnerability, which may be calculated using the formula: Risk = Likelihood of a threat * Vulnerability Impact Risk management is the process of identifying all potential hazards, analyzing their impact, and determining the best course of action. It's a never-ending procedure that examines new threats and vulnerabilities on a regular basis. Risks can be avoided, minimized, accepted, or passed to a third party depending on the response chosen. |
|
| 21. |
What is the main objective of Cyber Security? |
|
Answer» The primary goal of cyber security is to PROTECT data. To safeguard data from cyber-attacks, the security sector offers a triangle of three connected principles. The CIA trio is the name for this principle. The CIA model is intended to help organizations develop POLICIES for their information security architecture. One or more of these principles has been broken when a security breach is discovered. Confidentiality, Integrity, and Availability are the three components of the CIA model. It's a security paradigm that guides individuals through many aspects of IT security. Let's take a closer look at each section. Confidentiality: Confidentiality is the same as privacy in that it prevents unauthorized access to data. It entails ensuring that the data is only accessible to those who are AUTHORIZED to use it, as well as restricting access to others. It keeps vital information from getting into the WRONG hands. Data encryption is a great example of keeping information private. |
|