Theoretical Questions Flashcards
What is Cryptography?
The science of securing information and communication to ensure confidentiality
What is the difference between Symmetric and Asymmetric encryption?
Symmetric encryption uses the same key for encryption/decryption; asymmetric uses different keys
What is the difference between IDS and IPS?
An IDS detects cyber attacks while an IPS prevents attacks based on predefined filters, patterns, etc.
CIA triad
Stands for confidentiality, integrity, and available. used as a model to guide/create security policies.
Define encryption
encryption = concealing data and communication that can later be decrypted
Define hashing
hashing = processing data (with a function) to produce a unique message digest, not intended to be decrypted
What is a firewall?
A firewall is a network security device that monitors network traffic and blocks data packets depending on a set of security rules.
What is a vulnerability assessment?
This is the process of finding “predefined” security weaknesses in a system
What is penetration testing?
This is the process of finding “undefined” security weaknesses in a system
What is a three-way handshake?
the method used in a TCP/IP network to create a connection between a host and a client.
What are the response codes that can be received from a Web Application?
1xx – Informational responses 2xx – Success 3xx – Redirection 4xx – Client-side error 5xx – Server-side error
What is traceroute? Why is it used?
Traceroute is a tool that shows the path of a packet.
What steps will you take to secure a server?
Step 1: Make sure you have a secure password for your root and administrator users
Step 2: The next thing you need to do is make new users on your system. These will be the users you use to manage the system
Step 3: Remove remote access from the default root/administrator accounts
Step 4: The next step is to configure your firewall rules for remote access
Explain Data Leakage
Data Leakage is an intentional or unintentional transmission of data from within the organization to an external unauthorized destination.
What are some of the common Cyberattacks?
Malware Phishing Password Attacks DDoS Man in the Middle Drive-By Downloads Malvertising Rogue Software