OasisInterview Flashcards

1
Q

What is CSRF?

A

Cross site request forgery is a web application vulnerability where the server does not check whether the request comes from a trusted client or not. The request is processed directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is security misconfiguration?

A

Security misconfiguration is a vulnerability when a device/application/network is configured in a way which can be exploited by an attacker to take advantage of it. This can be leaving the default username/password unchanged or too simple for device accounts etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Definitions of black hat, white hat and grey hat hacker

A

Black hat: hack without authority.
White hat: authorized to perform hacking
Grey hats: white hat who sometimes perform unauthorized activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a firewall?

A

Device that blocks/allows traffic as per defined by a set of rules. Placed as boundaries of trusted and untrusted networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you keep yourself updated with information security news?

A

I follow threatpost and occasionally listen to podcasts like Cybersecurity weekly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CIA triangle

A

Confidentiality

Integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain risk, vulnerability and threat

A

Risk: measure of potential loss when the vulnerability is exploited by threat
Vulnerability: weakness in a system
Threat: when an attacker exploits a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Difference between asymmetric and symmetric encryption and which is better

A

Symmetric encryption: is the same key for both encryption and decryption. Faster but is transferred over an unencrypted channel

Asymmetric: uses different keys. More secure but slow
Hybrid approach is best. Setting up a channel using asymmetric encryption and sending data over symmetric process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an IPS and how does it differ from IDS

A

IPS (intrusion prevention system): will detect and also take action to prevent intrusion (more noisy)

IDS (intrusion detection system): detect the intrusion and administrator decides what to do next

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is XSS and how will you mitigate it?

A

Cross site scripting is JavaScript vulnerability in the web applications. User enters script in client side input fields and that input gets processed without validation. Leading to untrusted data getting saved and executed on client side

Example: hacking of MySpace

Countermeasure: input validation, implementing CSP (content security policy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is difference between encryption and hashing?

A

Encryption: reversible. Ensures confidentiality

Hashing: can be cracked but is not reversible. Ensures integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HIDS vs NIDS and which one is better and why?

A

HIDS (host intrusion detection system):
Placed on the host

NIDS (network intrusion detection system): placed on the network

Placement is different

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is port scanning?

A

Process of sending messages to gather information about network, system, etc. analyzing responses received

Nmap command
Also netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Difference between VA and PT

A

VA: vulnerability assessment: finds flaws in application/network

PT (penetration testing): of finding exploitable vulnerabilities

VA is on the surface and PT is more in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is WAF and it’s types?

A

WAF: web application firewall. Used to protect the application by filtering legitimate traffic from malicious traffic. Can be box or cloud based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain objects of basic web architecture

A

Front ending server (provides scalability), web application server (hosts applications) and database server

17
Q

Difference between policies, processes and guidelines

A

Policies: defines security objectives and security framework of an organization

Process: detailed step by step how to document that specifies the exact action to necessary to implement important security mechanism

Guidelines: recommendations

18
Q

What is false positive and false negative?

A

False positive: false alarm. No threat

False negative: intrusion has taken place and there is no alarm

19
Q

How to harden a server?

A

Close unused ports, create accounts with least privilege permissions, disable remote access for admin and root accounts

20
Q

What is the difference between UDP and TCP?

A

UDP: kind of a shot in the dark. Could miss some packets. An example is live-streaming

TCP: when each packet is accounted for. For example Netflix

21
Q

OSI model

A
Physical
Data link
Network
Transport
Session 
Presentation 
Application
22
Q

Port of file transfer protocol (FTP)

Transport protocol: TCP

A

20, 21

20: data transfer
21: control

Used for transferring files on internet or private network

23
Q

Secure shell (SSH)

Uses TCP and UDP

A

Primary method used to manage network devices on the command level. Secure Alternative to Telnet

22

24
Q

Telnet port

Uses TCP

A

23

Primary method used to manage network devices at the command level. Insecure connection

25
Q

Simple mail transfer protocol (SMTP)

Uses TCP

A

25

Used for transferring mail (email) from source to destination and mail servers and used for end users to send emails

26
Q

IPSec

A

50, 51

27
Q

Dynamic host configuration protocol (DHCP)

UDP

A

69

Used on networks that do not use static IP address assignment. Set up by admin with a poll of addresses that are available for assignment

28
Q

Trivial file transfer protocol (TFTP)

Uses UDP

A

69

Method of file transfer (like FTP but without session establishment—uses UDP instead of TCP).

29
Q

Hyper text transfer protocol (HTTP)

Uses TCP

A

80

Main protocol used by web browsers

30
Q

Post office protocol (POP3)

Uses TCP

A

110

Retrieve mail from server.

31
Q

HTTP with secure sockets layer (SSL)

TCP and UDP

A

443

32
Q

FTP over SSL/TLS

Uses TCP

A

989,990

33
Q

Remote Desktop protocol

TCP and UDP

A

3389

34
Q

Domain name system (DNS)

TCP/UDP

A

53

Used on public internet and on private networks to translate domain names into IP addresses.

35
Q

Network time protocol (NTP)

UDP

A

123

Synchronized devices on the Internet

36
Q

NetBios

TCP/UDP

A

137/138/139

Not a protocol but is used with IP with the NetBios over TCP/IP (NBT) protocol.

37
Q

Internet message access protocol (IMAP)

TCP

A

143

Like POP (receivers mail), but supports wider array of remote mailbox operations

38
Q

Simple network management protocol (SNMP)

TCP/UDP

A

161/162

For network management. Monitor, configure and control