Scenario-Based Questions Flashcards
What steps would you take to prevent outdated software from being exploited?
The best way to prevent this from happening is to automate software updates
identify a compromised system
Slow network activity, disconnecting from network services
Unexplained changes in file sizes, checksums, date/time stamps
Unexplained modification (addition or deletion) of data.
Unsuccessful login attempts.
Suspicious entries in the system or network accounting.
New files and users from unknown origins.
Port scanning.
Denial of service activity.
How do you secure a server?
Establish a secure connection
Implement complex passwords and multi-factor authentication policies
Have layers of security for hardware and software
Test the backup process.
Restrict access to the servers.
Invest in dedicated servers.
How would you reset a password-protected BIOS configuration?
Remove CMOS battery.
By utilizing the software.
By utilizing a motherboard jumper.
By utilizing MS-DOS.
How do you protect your data?
Mention the best practices you follow at home, at work, and in your daily life to keep your data safe. It will probably include actions like encrypting and backing up data, having an anti-malware system, automating software backups, securing your wireless connections.
How can you mitigate brute force (password) attacks?
- Enforce the use of long, complex passphrases.
- Use CAPTCHAs
- Limit failed login attempts
How to protect email messages?
Use cipher algorithm to protect email, credit card information, and corporate data.
How often should you perform Patch management?
Patch management should be done as soon as it is released.
How can you prevent MITM attacks?
Use VPN Use strong WEP/WPA encryption Use Intrusion Detection Systems Force HTTPS Public Key Pair Based Authentication
How can identity theft be prevented?
Ensure strong and unique password
Avoid sharing confidential information online, especially on social media
Shop from known and trusted websites
Use the latest version of the browsers
Install advanced malware and spyware tools
Use specialized security solutions against financial data
Always update your system and the software
Protect your SSN (Social Security Number)
How to prevent SQL injections?
Use prepared statements
Use Stored Procedures
Validate user input