Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Differentiate between Information protection and information assurance.

Answer»

INFORMATION protection protects data from unauthorized access by utilizing encryption, security software, and other methods.
Information ASSURANCE ENSURES the data's INTEGRITY by maintaining its availability, authentication, and secrecy, AMONG other things.

2.

What do you mean by Man-in-the-Middle Attack?

Answer»

A cyber threat (a type of eavesdropping assault) in which a cybercriminal wiretaps a communication or DATA transmission between two people is known as a man-in-the-middle attack. Once a cybercriminal ENTERS a two-way conversation, they appear to be genuine PARTICIPANTS, allowing them to obtain sensitive information and respond in a variety of ways. The main goal of this type of attack is to acquire access to our company's or customers' personal information. On an unprotected Wi-Fi network, for example, a cybercriminal may INTERCEPT data passing between the target device and the network.

3.

How can you avoid a brute force attack?

Answer»

There are a VARIETY of techniques for stopping or preventing BRUTE force attacks.

A robust password policy is the most evident. Strong passwords should be enforced by every web application or public server. Standard user accounts, for example, must contain at least eight characters, a number, uppercase and lowercase letters, and a special character. Furthermore, servers should mandate password updates on a REGULAR basis.
Brute Force attack can ALSO be avoided by the following methods:-

  • Limit the number of failed login attempts.
  • By altering the sshd_config file, you can make the root user unreachable via SSH.
  • Instead of using the default port, change it in your sshd config file.
  • Make use of Captcha.
  • Limit logins to a certain IP address or range of IP addresses.
  • Authentication using two factors
  • URLs for LOGGING in that are unique
  • Keep an eye on the server logs.
4.

What do you mean by two-factor authentication?

Answer»

Two-factor authentication (2FA), often known as two-step verification or dual-factor authentication, is a security method in which users validate their identity using two INDEPENDENT authentication factors. This PROCEDURE is carried out in order to better protect the user's credentials as well as the resources that the user has access to. Single-factor authentication (SFA), in which the user gives only one factor — generally a password or PASSCODE — provides a lower level of security than two-factor authentication (TFA). Since possessing the defendant's password alone is not enough to accomplish the authentication check, two-factor authentication adds an extra layer of security to the authentication PROCESS, making it more DIFFICULT for attackers to get access to a person's devices or online accounts.

5.

Differentiate between hashing and encryption.

Answer»
HashingEncryption
It is a method of converting data to a smaller fixed value known as the key, which is then used to represent the original data.It's the technique of securely encoding data such that only the authorized user with the key or password can get the original data; for everyone else, it SEEMS to be rubbish.
By whatever method, the hash code or key cannot be reverted to the original information. It can only be MAPPED, and the hash code is compared; if the hash code is the same, the information is identical; otherwise, it is not. It is not possible to get the original data.If we KNOW the encryption key and technique used for encryption, we can easily extract the original data.
In comparison to encryption, it is more secure.In comparison to hashing, it is less secure.
The goal of hashing is to index and retrieve data from a database. The procedure is really quick.Encryption transforms data in order to keep it hidden from others.
The hashed data is usually short and constant in length. It does not increase in SIZE as the length of information increases.The length of the encrypted data is not defined. It expands as the amount of data grows longer.
Eg:- SHA256 algorithmEg:- RSA, AES algorithm
6.

What do you mean by Phishing?

Answer»

PHISHING is a sort of cybercrime in which the sender appears to be a legitimate entity such as PayPal, eBay, financial institutions, or friends and coworkers. They send an email, phone call, or text message to a target or target with a link to convince them to click on the link. This link will take users to a fake website where they will be asked to enter sensitive information such as PERSONAL information, BANKING and credit card information, social security NUMBERS, usernames, and passwords. By clicking the link, malware will be installed on the target machines, allowing HACKERS to remotely control them.

You can protect yourself from phishing attacks by following these guidelines:

  • Don't give out important information on websites you don't know.
  • Check the site's security.
  • Make use of firewalls.
  • Use Toolbar for Anti-Phishing
7.

What do you mean by Shoulder Surfing?

Answer»

Shoulder surfing is a form of physical ASSAULT that entails physically PEERING at PEOPLE's screens while they type INFORMATION in a semi-public space.

8.

What do you mean by brute force in the context of Cyber Security?

Answer»

A BRUTE FORCE attack is a cryptographic assault that uses a trial-and-error approach to guess all POTENTIAL combinations until the correct data is DISCOVERED. This exploit is commonly used by cybercriminals to gain personal INFORMATION such as passwords, login credentials, encryption keys, and PINs. It is very easy for hackers to implement this.

9.

What are the common types of cyber security attacks?

Answer»

The common types of CYBER security attacks are:-

  • Malware 
  • Cross-Site SCRIPTING (XSS
  • Denial-of-Service (DoS)
  • DOMAIN Name System Attack
  • Man-in-the-Middle Attacks 
  • SQL Injection Attack 
  • Phishing
  • Session Hijacking
  • Brute Force
10.

What do you mean by a Null Session?

Answer»

A null SESSION occurs when a user is not authorized using either a username or a PASSWORD. It can PROVIDE a SECURITY concern for APPS because it implies that the person making the request is unknown.

11.

Differentiate between Vulnerability Assessment and Penetration Testing.

Answer»

Vulnerability assessment and penetration testing are two different phrases that both SERVE the same purpose: to secure the network environment.

Vulnerability Assessment is a process for defining, detecting, and prioritizing vulnerabilities in computer systems, network infrastructure, applications, and other systems, as well as providing the necessary information to the organization to correct the flaws.
Penetration Testing is also known as ethical hacking or pen-testing. It's a method of identifying vulnerabilities in a network, system, application, or other systems in order to prevent ATTACKERS from exploiting them. It is most commonly used to supplement a web application firewall in the context of web application security (WAF).
A vulnerability scan is similar to approaching a DOOR and checking to see if it is UNLOCKED before stopping. A penetration TEST goes a step further, not only checking to see if the door is unlocked but also opening the door and walking right in.

12.

What do you mean by honeypots?

Answer»

Honeypots are ATTACK targets that are set up to see how different attackers attempt exploits. Private firms and GOVERNMENTS can utilize the same CONCEPT to evaluate their vulnerabilities, which is widely used in ACADEMIC settings.

13.

What do you mean by a botnet?

Answer»

A botnet is a collection of internet-connected devices, such as SERVERS, PCS, and mobile PHONES, that are infected with malware and controlled by it.
It's used to steal data, SEND spam, launch distributed denial-of-service (DDoS) attacks, and more, as WELL as provide the user access to the device and its connection.

14.

What are the benefits of Cyber Security?

Answer»

The FOLLOWING are some of the advantages of putting cybersecurity in place and keeping it up to date:

  • Businesses are PROTECTED from CYBERATTACKS and data breaches.
  • Both data and network security are safeguarded.
  • Unauthorized user access is kept to a minimum.
  • There is a quicker recovery time after a breach.
  • Protection for end-users and endpoint devices.
  • Regulatory compliance.
  • Operational consistency.
  • Developers, partners, CONSUMERS, STAKEHOLDERS, and employees have a higher level of trust in the company's reputation.
15.

What are the types of Cyber Security?

Answer»

The assets of every company are made up of a variety of various systems. These systems have a strong cybersecurity posture, which necessitates coordinated actions across the board. As a result, cybersecurity can be divided into the FOLLOWING sub-domains:

Network security: It is the process of securing a computer network against unauthorized access, intruders, attacks, disruption, and misuse using hardware and software. This security aids in the protection of an organization's assets from both external and internal threats. Example: Using a Firewall.
Application security: It entails safeguarding software and devices against malicious attacks. This can be accomplished by regularly updating the apps to ensure that they are secure against threats. 
Data security: It entails putting in place a strong data storage system that ensures data integrity and privacy while in storage and transport.
Identity management: It refers to the process of identifying each individual's level of access inside an organization. Example: Restricting access to data as per the job role of an individual in the company.
Operational security: It entails analyzing and making decisions about how to handle and secure data assets. Example: Storing data in an encrypted form in the database.
Mobile security: It refers to the protection of ORGANIZATIONAL and personal data held on mobile devices such as cell PHONES, PCs, tablets, and other similar devices against a variety of hostile attacks. Unauthorized access, device loss or theft, malware, and other threats are examples of these dangers.
Cloud security: It refers to the safeguarding of data held in a digital environment or in cloud infrastructures for an organization. It employs a variety of cloud service providers, including AWS, AZURE, Google, and others, to assure protection against a variety of threats.

16.

Who are Black Hat, White Hat and Grey Hat Hackers?

Answer»

Black Hat hackers, SOMETIMES known as crackers, attempt to obtain unauthorized access to a system in order to disrupt its operations or steal critical data.

Because of its malicious aim, black hat hacking is always illegal, including stealing company data, violating the privacy, causing system damage, and blocking network connection, among other things.

Ethical hackers are also referred to as White hat hackers. As part of penetration testing and vulnerability ASSESSMENTS, they never intend to harm a system; rather, they strive to uncover holes in a computer or network system.
Ethical hacking is not a crime and is ONE of the most difficult professions in the IT business. Many businesses hire ethical hackers to do penetration tests and vulnerability assessments.

Grey hat hackers combine elements of both black and white hat hacking. They act without MALICE, but for the sake of AMUSEMENT, they exploit a security flaw in a computer system or network without the permission or knowledge of the owner.
Their goal is to draw the owners' attention to the flaw in the hope of receiving gratitude or a small reward.

17.

Define VPN.

Answer»

The TERM VPN refers to a VIRTUAL private network. It enables you to connect your computer to a private network, establishing an encrypted connection that hides your IP address, allowing you to safely share data and access the web while SAFEGUARDING your online identity.

A virtual private network, or VPN, is an encrypted link between a device and a network via the Internet. The encrypted connection aids in the secure transmission of sensitive data. It protects against ILLEGAL eavesdropping on the traffic and allows the user to work remotely. In corporate settings, VPN technology is commonly used.

18.

What is a Firewall?

Answer»

A firewall serves as a BARRIER between a LAN and the Internet. It allows private resources to remain private while reducing security threats. It manages both inbound and outbound network traffic.

A sample firewall between a LAN and the internet is shown in the diagram below. The POINT of vulnerability is the connection between the two. At this point, network traffic can be filtered using both HARDWARE and software.

There are two types of firewall systems: one that uses network layer filters and the other that uses user, APPLICATION, or network layer proxy servers.

19.

What does XSS stand for? How can it be prevented?

Answer»

XSS stands for Cross-site scripting. It is a web security flaw that allows an attacker to manipulate how users interact with a susceptible application. It allows an attacker to get around the same-origin policy, which is meant to KEEP websites separate from one another. Cross-site scripting flaws allow an attacker to impersonate a victim user and execute any actions that the user is capable of, as well as access any of the user's data. If the victim user has privileged access to the application, the attacker may be able to take complete CONTROL of the app's functionality and data.

Preventing cross-site scripting can be simple in some circumstances, but it can be much more difficult in others, depending on the application's sophistication and how it handles user-controllable data. In general, preventing XSS vulnerabilities will almost certainly need a mix of the following measures:
On arrival, filter the input. Filter user input as precisely as feasible at the point when it is received, based on what is EXPECTED or valid input.
On the output, encode the data. Encode user-controllable data in HTTP responses at the point where it is output to avoid it being perceived as active content. Depending on the output context, a combination of HTML, URL, JavaScript, and CSS encoding may be required.
Use headers that are relevant for the response. You can use the Content-Type and X-Content-Type-Options headers to ensure that BROWSERS read HTTP responses in the way you intend, preventing XSS in HTTP responses that aren't INTENDED to contain any HTML or JavaScript.
Policy for Content Security. You can utilize Content Security Policy (CSP) as a last line of defense to mitigate the severity of any remaining XSS issues.

20.

Differentiate between threat, vulnerability and risk.

Answer»

Threat: A threat is any form of hazard that has the potential to destroy or steal data, disrupt operations, or cause harm in general. Malware, phishing, data breaches, and even unethical employees are all examples of threats.
Threat actors, who might be individuals or groups with a variety of BACKGROUNDS and motives, express threats. Understanding threats is essential for developing effective mitigations and making informed cybersecurity decisions. Threat INTELLIGENCE is information regarding threats and threat actors.

Vulnerability: A vulnerability is a flaw in hardware, SOFTWARE, personnel, or procedures that threat actors can use to achieve their objectives.
Physical vulnerabilities, such as publicly exposed networking equipment, software vulnerabilities, such as a buffer overflow vulnerability in a browser, and even human vulnerabilities, such as an employee vulnerable to phishing assaults, are all examples of vulnerabilities.
Vulnerability management is the process of identifying, reporting and repairing vulnerabilities. A zero-day vulnerability is a vulnerability for which a remedy is not YET available.

Risk: The probability of a threat and the consequence of a vulnerability are COMBINED to form risk. To put it another way, the risk is the likelihood of a threat agent successfully exploiting a vulnerability, which may be calculated using the formula:

Risk = Likelihood of a threat * Vulnerability Impact

Risk management is the process of identifying all potential hazards, analyzing their impact, and determining the best course of action. It's a never-ending procedure that examines new threats and vulnerabilities on a regular basis. Risks can be avoided, minimized, accepted, or passed to a third party depending on the response chosen.

21.

What is the main objective of Cyber Security?

Answer»

The primary goal of cyber security is to PROTECT data. To safeguard data from cyber-attacks, the security sector offers a triangle of three connected principles. The CIA trio is the name for this principle. The CIA model is intended to help organizations develop POLICIES for their information security architecture. One or more of these principles has been broken when a security breach is discovered. Confidentiality, Integrity, and Availability are the three components of the CIA model. It's a security paradigm that guides individuals through many aspects of IT security. Let's take a closer look at each section.

Confidentiality: Confidentiality is the same as privacy in that it prevents unauthorized access to data. It entails ensuring that the data is only accessible to those who are AUTHORIZED to use it, as well as restricting access to others. It keeps vital information from getting into the WRONG hands. Data encryption is a great example of keeping information private.
Integrity: This principle assures that the data is genuine, correct, and safe from unwanted threat actors or unintentional user alteration. If any changes are made, precautions should be taken to protect sensitive data from corruption or loss, as well as to quickly recover from such an incident. Furthermore, it DENOTES that the source of information must be genuine.
Availability: This principle ensures that information is constantly available and helpful to those who have access to it. It ensures that system failures or cyber-attacks do not obstruct these accesses.