Scenario-Based Questions Flashcards

1
Q

What steps would you take to prevent outdated software from being exploited?

A

The best way to prevent this from happening is to automate software updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

identify a compromised system

A

Slow network activity, disconnecting from network services

Unexplained changes in file sizes, checksums, date/time stamps

Unexplained modification (addition or deletion) of data.

Unsuccessful login attempts.
Suspicious entries in the system or network accounting.

New files and users from unknown origins.

Port scanning.

Denial of service activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you secure a server?

A

Establish a secure connection

Implement complex passwords and multi-factor authentication policies

Have layers of security for hardware and software

Test the backup process.
Restrict access to the servers.
Invest in dedicated servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How would you reset a password-protected BIOS configuration?

A

Remove CMOS battery.
By utilizing the software.
By utilizing a motherboard jumper.
By utilizing MS-DOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you protect your data?

A

Mention the best practices you follow at home, at work, and in your daily life to keep your data safe. It will probably include actions like encrypting and backing up data, having an anti-malware system, automating software backups, securing your wireless connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can you mitigate brute force (password) attacks?

A
  1. Enforce the use of long, complex passphrases.
  2. Use CAPTCHAs
  3. Limit failed login attempts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to protect email messages?

A

Use cipher algorithm to protect email, credit card information, and corporate data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How often should you perform Patch management?

A

Patch management should be done as soon as it is released.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can you prevent MITM attacks?

A
Use VPN
Use strong WEP/WPA encryption
Use Intrusion Detection Systems
Force HTTPS
Public Key Pair Based Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can identity theft be prevented?

A

Ensure strong and unique password
Avoid sharing confidential information online, especially on social media

Shop from known and trusted websites
Use the latest version of the browsers
Install advanced malware and spyware tools
Use specialized security solutions against financial data
Always update your system and the software
Protect your SSN (Social Security Number)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to prevent SQL injections?

A

Use prepared statements
Use Stored Procedures
Validate user input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly