Theoretical Questions Flashcards

1
Q

What is Cryptography?

A

The science of securing information and communication to ensure confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between Symmetric and Asymmetric encryption?

A

Symmetric encryption uses the same key for encryption/decryption; asymmetric uses different keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between IDS and IPS?

A

An IDS detects cyber attacks while an IPS prevents attacks based on predefined filters, patterns, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIA triad

A

Stands for confidentiality, integrity, and available. used as a model to guide/create security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define encryption

A

encryption = concealing data and communication that can later be decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define hashing

A

hashing = processing data (with a function) to produce a unique message digest, not intended to be decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a firewall?

A

A firewall is a network security device that monitors network traffic and blocks data packets depending on a set of security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a vulnerability assessment?

A

This is the process of finding “predefined” security weaknesses in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is penetration testing?

A

This is the process of finding “undefined” security weaknesses in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a three-way handshake?

A

the method used in a TCP/IP network to create a connection between a host and a client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the response codes that can be received from a Web Application?

A
1xx – Informational responses
2xx – Success
3xx – Redirection
4xx – Client-side error
5xx – Server-side error
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is traceroute? Why is it used?

A

Traceroute is a tool that shows the path of a packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What steps will you take to secure a server?

A

Step 1: Make sure you have a secure password for your root and administrator users

Step 2: The next thing you need to do is make new users on your system. These will be the users you use to manage the system

Step 3: Remove remote access from the default root/administrator accounts

Step 4: The next step is to configure your firewall rules for remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain Data Leakage

A

Data Leakage is an intentional or unintentional transmission of data from within the organization to an external unauthorized destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some of the common Cyberattacks?

A
Malware
Phishing
Password Attacks
DDoS
Man in the Middle
Drive-By Downloads
Malvertising
Rogue Software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Brute Force Attack? How can you prevent it?

A

Brute Force is a way of finding out the right credentials by repetitively trying all the permutations and combinations of possible credentials.

17
Q

What is Port Scanning?

A

Port Scanning is the technique used to identify open ports and service available on a host.

18
Q

What is a VPN?

A

VPN stands for Virtual Private Network. It is used to create a safe and encrypted connection.

19
Q

What do you understand by Risk, Vulnerability & Threat in a network?

A

Threat: Someone with the potential to harm a system or an organization
Vulnerability: Weakness in a system that can be exploited by a potential hacker
Risk: Potential for loss or damage when threat exploits a vulnerability

20
Q

What are black hat, white hat and grey hat hackers?

A

Black hat hackers are known for having vast knowledge about breaking into computer networks.

White hat (ethical) hackers specialize in penetration testing to protect the information system of an organization

Grey hat hackers sometimes violate ethical standards without malicious intent

21
Q

What is cybersecurity?

A

Cybersecurity refers to the protection of hardware, software, and data from attackers.

22
Q

Explain botnet.

A

A botnet is short for robot network. A botnet is a network of computers infected by malware that is under the control of an attacking party.

23
Q

Explain the differences between a worm and a virus

A

The main difference is that viruses must be triggered with a host’s help (human interaction), while worms are stand-alone malicious programs that act independently.

24
Q

Explain TCP Three-Way Handshake

A

It’s a three–step process in which the client establishes a connection with a server, the server responds to its request, and the client acknowledges the response to create a stable connection to transfer data.

25
Q

What is phishing?

A

Phishing is the cybercrime where targets are reached by email, phone, or text message by a hacker posing as a legitimate institution to gain access to sensitive information, such as social security numbers, financial data, and passwords.

26
Q

What are the differences between HTTPS, SSL, and TLS?

A

HTTP is the protocol used by browsers and web servers to communicate and exchange information. HTTPS (S stands for SSL) is the secured version of this protocol. TLS is a transport layer security and the successor protocol to SSL.

27
Q

Explain SSL

A

SSL stands for Secure Sockets Layer. It is a technology creating encrypted connections between a web server and a web browser. I

28
Q

What do you mean by data leakage?

A

Data leakage is an unauthorized transfer of data to the outside world.

29
Q

What is encoding?

A

Encoding involves changing data into a new format using a scheme; data can be decoded

30
Q

What is hashing?

A

hashing involves computing a fixed-length mathematical summary of data, can’t be reversed, and is commonly used to verify data integrity.

31
Q

What is encryption?

A

The process of securely encoding data and only authorized users with a key or password can decrypt to access the original data.

32
Q

What is SQL injection?

A

SQL Injection (SQLi) is a code injection attack where an attacker manipulates the data being sent to the server to execute malicious SQL statements

33
Q

What is 2FA?

A

An extra layer of security that is known as “multi-factor authentication“.

34
Q

What are salted hashes?

A

Salt is a random data, often combined with a hash value to ensure password confidentiality

35
Q

What is ARP?

A

a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network

36
Q

What is a MITM attack?

A

a type of attack where the hacker places himself in between the communication of two parties and steal the information.

37
Q

What are some of the common Cyberattacks?

A
Malware
Phishing
Password Attacks
DDoS
Man in the Middle
Drive-By Downloads
Malvertising
Rogue Software