Interview Questions Flashcards
Describe how Wireshark and Splunk are different?
Splunk is a world wide system that business’ use to create security solutions from their data. Where as Wireshark only captures and analyzes network traffic.
Explain the purpose of a networking firewall?
A network firewall blocks incoming traffic from unauthorized IP addresses connected to the internet/intranet.
Explain what Binary is and why computers use it?
Computers use binary - the digits 0 and 1 - to store data. A binary digit, or bit , is the smallest unit of data in computing. It is represented by a 0 or a 1.
What is a HoneyPot?
A honeypot is a controlled and safe environment for showing how attackers work and examining different types of threats.
What is Burp, and what type of attacks can you launch using Burp?
Burp Intruder is a tool for automating customized attacks against web applications. It is extremely powerful and configurable, and can be used to perform a huge range of tasks, from simple brute-force guessing of web directories through to active exploitation of complex blind SQL injection vulnerabilities.
Suppose you’ve implemented a firewall policy on one of your servers. How would you test it?
A network scan using nmap or hping.
Explain DNS and how it works.
DNS translates domain names to IP addresses so browsers can load Internet resources. For the web browser, the DNS lookup occurs “behind the scenes” and requires no interaction from the user’s computer apart from the initial request. (such as www.example.com) into a computer-friendly IP address (such as 192.168.1.1).
What is the difference between vulnerability assessment and penetration test?
Vulnerability scans look for known vulnerabilities in your systems and report potential exposures. Penetration tests are intended to exploit weaknesses in the architecture of your IT network and determine the degree to which a malicious attacker can gain unauthorized access to your assets.
What type of encryption is AES?
AES uses symmetric key encryption, which involves the use of only one secret key to cipher and decipher information. The Advanced Encryption Standard (AES) is the first and only publicly accessible cipher approved by the US National Security Agency (NSA) for protecting top secret information.
What is the difference between a switch and a router?
While a network switch can connect multiple devices and networks to expand the LAN, a router will allow you to share a single IP address among multiple network devices. In simpler terms, the Ethernet switch creates networks and the router allows for connections between networks.
Explain what a digital signature is used for.
Digital signatures create a virtual fingerprint that is unique to a person or entity and are used to identify users and protect information in digital messages or documents.
Explain what a ransomware attack means for your organization.
Ransomware is malware that employs encryption to hold a victim’s information at ransom. A user or organization’s critical data is encrypted so that they cannot access files, databases, or applications. A ransom is then demanded to provide access.
Under what circumstances should you pay the ransom and why?
The FBI’s official statement on ransomware advises victims not to pay the ransom. There is no guarantee that the hackers will restore your information. In some cases, paying the ransom could even be illegal, because it provides funding for criminal activity. We recommend engaging with a professional incident response team, law enforcement and regulatory bodies before negotiating with attackers.
What is the difference between an IDS and IPS?
An intrusion detection system (IDS) monitors traffic on your network, analyzes that traffic for signatures matching known attacks, and when something suspicious happens, you’re alerted. In the meantime, the traffic keeps flowing.
An intrusion prevention system (IPS) also monitors traffic. But when something unusual happens, the traffic stops altogether until you investigate and decide to open the floodgates again.
Explain SSL and TLS. Which offers better security?
SSL refers to Secure Sockets Layer whereas TLS refers to Transport Layer Security. Basically, they are one and the same, SSL and TLS are cryptographic protocols that authenticate data transfer between servers, systems, applications and users.TLS is the obvious choice. It does not only serve as an upgrade to SSL, but also performs much better.