Amazon General Cybersecurity Interview Questions Flashcards
How do you ensure that a server is secure?
using SSH (Secure Shell) Protocol, and as SSH access encrypts data transmissions. SSH uses port 22 by default, which is common knowledge to hackers—so use port numbers between 1024 and 32,767 to reduce the risk of attack. You should also authenticate an SSH server using SSH keys instead of a traditional password. To secure web administration areas, deploy a Secure Socket Layer (SSL) to safeguard server-client and server-server communications via the internet. Intrusion prevention software, firewalls, password requirements, and user management tactics can help maintain server security.
How do you differentiate between symmetric and asymmetric encryption?
Symmetric encryption uses the same key for both encryption and decryption processes, while asymmetric encryption uses different keys, namely a public key for encryption and a private key for decryption. Asymmetric encryption provides a higher level of security by enabling secure communication without the need to exchange secret keys.
What is the difference between IDS and IPS?
IDS or Intrusion Detection System just detects intrusions. The administrator needs to act to prevent the intrusion. IPS or Intrusion Prevention System detects the intrusion and takes action to prevent it.
What Is the CIA Triad?
Confidentiality, Integrity, and Availability, or CIA for short, is one of the most popular models among organizations to guide Information Security policies.
What is the difference between HIDS and NIDS?
HIDS or Host IDS and NIDS or Network IDS are both Intrusion Detection Systems. The key difference is that while the HIDS is set up on a particular host or device and monitors the traffic and suspicious system activities of a specific device, NIDS is set up on a network and monitors the traffic of all network devices.
What Is SSL encryption?
SSL (Secure Sockets Layer) encryption serves to create a secure internet connection. SSL encryption protects client-client, server-server, and client-server connections, circumventing unauthorized parties from monitoring or tampering with data transmitted online. An updated protocol called TLS (Transport Layer Security) encryption has replaced SSL encryption as the standard security certificate.
What do you mean by port scanning?
Port scanning is a procedure for identifying open ports and services obtainable on a specific host. Hackers use port scanning methods to find information for malicious purposes.
Explain a brute force attack along with the steps to prevent it.
A brute force attack is an attempt to gain unauthorized access to a system by systematically trying all possible combinations of passwords or encryption keys. It can be prevented by enforcing strong password policies, implementing account lockout mechanisms, and using multi-factor authentication
Explain the OSI Model.
The Open Systems Interconnection (OSI) model is a conceptual structure that standardizes the communication system’s functions into seven layers.
The layers are Physical, Application, Data Link, Transport, Presentation, Session, and Network.
What is identity theft? Can you prevent it?
Identity theft occurs when an attacker uses a target’s private data to impersonate or steal from them. Methods of identity theft prevention include basic cybersecurity best practices like using robust, frequently updated passwords and adding authentication steps whenever possible.
Black Hat Hackers vs. White Hat Hackers vs. Gray Hat Hackers: Are all illegal?
White hat hackers probe cybersecurity weaknesses to help organizations develop stronger security; black hat hackers are motivated by malicious intent; and Gray hat hackers operate in the nebulous area in between — they’re not malicious, but they’re not always ethical either.
How frequently do you perform patch management?
We do patch management as soon as the patch is released. For windows, the patch should be applied to all machines within a month of its release. For network devices, a patch needs to be added as soon as it is released.
Can you reset a password-protected BIOS configuration?
If you have forgotten one of the passwords that is set in the BIOS, resetting the CMOS or NVRAM helps reset the BIOS to factory default settings and remove the passwords from the BIOS.
What is the difference between Black Box Testing and White Box Testing?
White box testing: A software testing method in which internal structure is known by tester.
Black box testing: It is a software testing method in which the internal structure code is hidden.
What do you mean by phishing? How many types of phishing are there?
Phishing is a cybercrime technique in which attackers disguise fraudulent communications as legitimate or trustworthy in order to steal sensitive data or install malware on a target’s device.
Can be done through voice, text, email