General Questions Flashcards
What is Cryptography?
securing information to protect the data from third parties that the data is not intended for.
What is the difference between IDS and IPS?
IDS is Intrusion Detection System and it only detects intrusions and the administrator has to take care of preventing the intrusion. Whereas, in IPS i.e., Intrusion Prevention System, the system detects the intrusion and also takes actions to prevent the intrusion.
Explain CIA triad
CIA stands for Confidentiality, Integrity, and Availability. CIA is a model that is designed to guide policies for Information Security. It is one of the most popular models used by organizations.
Confidentiality
The information should be accessible and readable only to authorized personnel.
Availability
The data should be available to the user whenever the user requires it.
How is Encryption different from Hashing?
encrypted data can be converted back to original data by the process of decryption but the hashed data cannot be converted back to original data.
What is a Firewall and why is it used?
Firewall is a network security system set on the boundaries of the system/network that monitors and controls network traffic. Firewalls are mainly used to protect the system/network from viruses, worms, malware, etc. Firewalls can also be to prevent remote access and content filtering.
What is the difference between VA(Vulnerability Assessment) and PT(Penetration Testing)?
Vulnerability Assessment
Vulnerability Assessment is the process of finding flaws on the target.
Penetration Testing is the process of finding vulnerabilities on the target.
What is a three-way handshake?
A three-way handshake is a method used in a TCP/IP network to create a connection between a host and a client.
What are the response codes that can be received from a Web Application?
1xx – Informational responses 2xx – Success 3xx – Redirection 4xx – Client-side error 5xx – Server-side error
What is traceroute? Why is it used?
Traceroute is a tool that shows the path of a packet.
This is used mostly when the packet is not reaching its destination.
What is the difference between HIDS and NIDS?
HIDS(Host IDS) and NIDS(Network IDS) are both Intrusion Detection System and work for the same purpose i.e., to detect the intrusions
HIDS is set up on a particular host/device. It monitors the traffic of a particular device and suspicious system activities.
NIDS is set up on a network. It monitors traffic of all devices of the network.
What are the steps to set up a firewall?
Username/password: modify the default password for a firewall device
Remote administration: Disable the feature of the remote administration
Port forwarding: Configure appropriate port forwarding for certain applications to work properly, such as a web server or FTP server
DHCP server: Installing a firewall on a network with an existing DHCP server will cause conflict unless the firewall’s DHCP is disabled
Logging: To troubleshoot firewall issues or potential attacks, ensure that logging is enabled and understand how to view logs
Policies: You should have solid security policies in place and make sure that the firewall is configured to enforce those policies.
Explain SSL Encryption
SSL(Secure Sockets Layer) is the industry-standard security technology creating encrypted connections between Web Server and a Browser
What steps will you take to secure a server?
Step 1: Make sure you have a secure password for your root and administrator users
Step 2: The next thing you need to do is make new users on your system. These will be the users you use to manage the system
Step 3: Remove remote access from the default root/administrator accounts
Step 4: The next step is to configure your firewall rules for remote access
Explain Data Leakage
Data Leakage is an intentional or unintentional transmission of data from within the organization to an external unauthorized destination.
What are the three categories of data leakage?
Accidental Breach: An entity unintentionally send data to an unauthorized person due to a fault or a blunder
Intentional Breach: The authorized entity sends data to an unauthorized entity on purpose
System Hack: Hacking techniques are used to cause data leakage
How can data leakage be prevented?
Data Leakage can be prevented by using tools, software, and strategies known as DLP(Data Leakage Prevention) Tools
What are some of the common Cyberattacks?
Malware Phishing Password Attacks DDoS Man in the Middle Drive-By Downloads Malvertising Rogue Software
What is a DDOS attack?
a malicious attempt to disrupt the normal traffic of a targeted server, service or network
What is a password attack?
when a hacker trys to steal your password.
What is a man in the middle attack
when an attacker interrupt an existing conversation or data transfer
What is a drive-by download?
When malware is downloaded or installed without the consent of a user
What is Malvertising?
Incorporating malware into advertisements
What is rogue software?
Malicious software that misleads users into believing there is a virus on their computer to pa a fake malware tool that is actually malware itself