Cyber Security Question-Answers
Cyber Security Question-Answers
What is cryptography?
Cryptography aids to secure information from third parties who are called adversaries. It allows
only the sender and the recipient to access the data securely.
When the packet is lost during the transmission, the traceroute will identify where the
point of failure is.
A firewall is a network security device/system, which blocks malicious traffic such as hackers,
worms, malware, and viruses to maintain data privacy.
Uses:
It monitors the incoming and outgoing network traffic. It permits or allows only data
packets that agree to the set of security rules.
It acts as a barrier between the internal network and the incoming traffic from external
sources like the Internet.
1xx: Informational
The request is received, and the process is continuing. Some example codes are:
100 (continue)
2xx: Success
The action is received, understood, and accepted successfully. A few example codes for this are:
200 (OK)
202 (accepted)
205 (reset content)
208 (already reported)
3xx: Redirection
To complete the request, further action is required to take place. Example codes:
300 (multiple choice)
302 (found)
308 (permanent redirect)
4xx: Client Error
The request has incorrect syntax, or it is not fulfilled. Here are the example codes for this:
2. Phishing: Here, the attacker will act as a trusted entity to perform malicious activities
such as getting usernames, passwords, and credit card numbers.
3. Rogue Software: It is a fraudulent attack where the attacker fakes a virus on the target
device and offers an anti-virus tool to remove the malware. This is done to install
malicious software into the system.
4. Malware: Malware is software that is designed to attack the target system. The software
can be a virus, worm, ransomware, spyware, and so on.
5. Drive-by Downloads: The hacker takes advantage of the lack of updates on the OS, app,
or browser, which automatically downloads malicious code to the system.
6. DDoS: This is done to overwhelm the target network with massive traffic, making it
impossible for the website or the service to be operable.
7. Malvertising: Malvertising refers to the injections of maleficent code to legitimate
advertising networks, which redirect users to unintended websites.
8. Password Attacks: As the name suggests, here, the cyber hacker cracks credentials like
passwords.
Data leakage means the unauthorized transmission of data from an organization to an external
recipient. The mode of transmission can be electronic, physical, web, email, mobile data, and
A port scan helps you determine the ports that are open, listening, or closed on a network.
Administrators use this to test network security and the system’s firewall strength. For hackers,
it is a popular reconnaissance tool to identify the weak point to break into a system.
1. UDP
2. Ping scan
3. TCP connect
4. TCP half-open
5. Stealth scanning
A brute force attack is a hack where the attacker tries to guess the target password by trial and
error. It is mostly implemented with the help of automated software used to login with
credentials.
A one-way function where you cannot decrypt Encrypted data can be decrypted to the original
the original message text with a proper key
Used to send files, passwords, etc. and to Used to transfer sensitive business information
search
What is the difference between vulnerability assessment (VA) and penetration testing
(PT)?
4. The web server sends the acknowledgment to start an SSL encrypted connection.
5. SSL communication starts to take place between the browser and the web server.
Detects the attacks that involve hosts Detects attacks that involve networks
Discovers hackers only after the machine is Discovers hackers at the time they generate
breached unauthorized attacks
Encryption Key Only one key to encrypt and Two different keys (public and private keys) to
decrypt a message encrypt and decrypt the message
Algorithms RC4, AES, DES, and 3DES RSA, Diffie-Hellman, and ECC
Usage For the transmission of large For smaller transmission to establish a secure
chunks of data connection prior to the actual data transfe
What is the difference between IDS and IPS?
Detects port scanners, malware, and Does not deliver malicious packets if the traffic is from
other violations known threats in databases
What is a VPN?
VPN stands for virtual private network. It is a private network that gives you online anonymity
and privacy from a public Internet connection. VPN helps you protect your online activities,
such as sending an email, paying bills, or shopping online.
How does a VPN work?
1. When you make a VPN connection, your device routes the Internet connection to the
VPN’s private server, instead of your Internet Service Provider (ISP).
2. During this transmission, your data is encrypted and sent through another point on the
Internet.
Risk: A risk happens when the threat exploits a vulnerability. It results in loss,
destruction, or damage to the asset.
Who are White Hat, Grey Hat, and Black Hat Hackers?
Black Hat Hackers
A Black Hat Hacker uses his/her hacking skills to breach confidential data without permission.
With the obtained data, the individual performs malicious activities such as injecting malware,
viruses, and worms.
White Hat Hackers
A White Hat Hacker uses his/her hacking skills to break into a system but with the permission
of the respective organizations. They are professionals known as Ethical Hackers. They hack the
system to identify its vulnerability and to fix it before a hacker takes advantage of it.
Grey Hat Hackers
A Grey Hat Hacker has the characteristics of both a Black Hat Hacker and a White Hat Hacker.
Here, the system is violated with no bad intention, but they do not have the essential permission
to surf the system, so it might become a potential threat at any time.
4. Debug
5. o 70 2E
6. o 71 FF
7. quit
This will reset all BIOS configurations, and you need to re-enter the settings for it.
In the Man-in-the-Middle attack, the hacker eavesdrops on the communication between two
parties. The individual then impersonates another person and makes the data transmission look
normal for the other parties. The intent is to alter the data, steal personal information, or get
login credentials for sabotaging communication.
These are a few ways to prevent a MITM attack:
1. Public key pair based authentication
2. Virtual private network
Flooding attacks: This is the most commonly occurring type of DDoS attack. Flooding attacks
stop the system when the server is accumulated with massive amounts of traffic that it cannot
handle. The attacker sends packets continuously with the help of automated software.
Crash attacks: This is the least common DDoS attack where the attacker exploits a bug in the
targeted system to cause a system crash. It prevents legitimate users from accessing email,
websites, banking accounts, and gaming sites.
To prevent a DDoS attack, you have to:
1. Configure firewalls and routers
2. Recognize the spike in traffic
3. Consider front-end hardware
Address Resolution Protocol is a communication protocol of the network layer in the OSI model.
Its function is to find the MAC address for the given IP address of the system. It converts the
IPv4 address, which is 32-bit, into a 48-bit MAC address.
How ARP works:
1. It sends an ARP request that broadcasts frames to the entire network.
5. If it matches, the target will send an ARP response back to the original sender via
unicast.
It refers to restricting users from accessing a set of services within the local area network. The
main aim is to stop the source from providing access to destination nodes via ports. Since all
applications run on the ports, it is necessary to block the ports to restrict unauthorized access,
which might violate the security vulnerability in the network infrastructure.
What are the protocols that fall under the TCP/IP Internet layer?
Application NFS, NIS, SNMP, telnet, ftp, rlogin, rsh, rcp, RIP, RDISC, DNS, LDAP, and
Layer others
Physical Layer Ethernet (IEEE 802.3), FDDI, Token Ring, RS-232, and others
What is a botnet?
A botnet, which is also known as a robot network, is a malware that infects networks of
computers and gets them under the control of a single attacker who is called a ‘bot herder.’ A
bot is an individual machine that is under the control of bot herders. The attacker acts as a
central party who can command every bot to perform simultaneous and coordinated criminal
actions.
The botnet is a large-scale attack since a bot herder can control millions of bots at a time. All the
botnets can receive updates from the attacker to change their behavior in no time.
A salted hash is used to randomize hashes by prepending or appending a random string (salt) to
the password before hashing. This results in the creation of two completely different hashes,
which can be employed to protect the users’ passwords in the database against the attacker.
Data is transmitted across devices or networks Data is stored in databases, local hard drives,
or USBs
Protects the data in transit with SSL and TLS Protects the data at rest with firewalls,
antiviruses, and good security practices
You must protect the data in transit since it can You should protect the data at rest to avoid
become vulnerable to MITM attacks, possible data breaches even when stolen or
eavesdropping, etc. downloaded
Two-factor authentication (2FA) requires a password, along with a unique form of identification
like a login code via text message (SMS) or a mobile application, to verify a user. When the user
enters the password, he/she is prompted for the security code to log in to the website. If the
code mismatches, the user will be blocked from entering the website.
Examples of 2FA: Google Authenticator, YubiKey, Microsoft Authenticator, etc.
Provides secure remote access to a Used to group multiple computers that are geographically
company’s network resources in different domains into the same geographical broadcast
domain
Companies wishing to connect with Companies wishing to employ traffic control and easier
their remote employees will use a management will use a VLAN
VPN
1. Install firewalls
2. Rotate passwords frequently
3. Do not click on or download from unknown sources
An employee’s bank account faces an error during a direct deposit. Two different offices
need to work on it to straighten this out. Office #1 contacts Office #2 by email to send the
valid account information for the deposit. The employee now gives the bank
confirmations that the error no longer exists. What is wrong here?
Any sensitive information cannot be shared via email as it can lead to identity theft. This is
because emails are mostly not private and secure. Sharing or sending personal information
along the network is not recommended as the route can be easily tracked.
In such scenarios, the involved parties should call each other and work with ITS as a secure way
of sending the information.
You see an unusual activity of the mouse pointer, which starts to move around on its own
and clicks on various things on the desktop. What should you do in this situation?
A. Call any of the co-workers to seek help
B. Disconnect the mouse
C. Turn your computer off
D. Inform the supervisor
E. Disconnect your computer from the network
F. Run anti-virus
G. Select all the options that apply?
Which options would you choose?
The answer is (D) and (E). This kind of activity is surely suspicious as an unknown authority
seems to have the access to control the computer remotely. In such cases, you should
immediately report it to the respective supervisor. You can keep the computer disconnected
from the network till help arrives.
Check out the list of passwords below, which are pulled out from a database:
A. Password1
B. @#$)*&^%
C. UcSc4Evr!
D. akHGksmLN
Choose the passwords that are in line with the UCSC’s password requirements.
The answer is C (UcSc4Evr!). As per the UCSC requirements, a password should be:
In your IT company, employees are registering numerous complaints that the campus
computers are delivering Viagra spam. To verify it, you check the reports, and it turns out
to be correct. The computer program is automatically sending tons of spam emails
without the owner’s knowledge. This happened because a hacker had installed a
malicious program into the system. What are the reasons you think might have caused
this incident?
This type of attack happens when the password is hacked. To avoid this, whenever you set a
password, always use a proper standard, i.e., use passwords that are at least 8-character length
and have a combination of upper case/lower case letters, symbols/special characters, and
numbers.
Other scenarios of the above attack could be: