Additional Questions
Additional Questions
1. What is Cryptography?
Basis of
Symmetric Encryption Asymmetric Encryption
Comparison
Same key for encryption Different keys for
Encryption key
& decryption encryption & decryption
Encryption is fast but Encryption is slow due to
Performance
more vulnerable high computation
Algorithms DES, 3DES, AES and RC4 Diffie-Hellman, RSA
Used for bulk data Often used for securely
Purpose
transmission exchanging secret keys
3. What is the difference between IDS and IPS?
Confidentiality
The information should be accessible and readable only to authorized
personnel. It should not be accessible by unauthorized personnel. The
information should be strongly encrypted just in case someone uses
hacking to access the data so that even if the data is accessed, it is not
readable or understandable.
Integrity
Making sure the data has not been modified by an unauthorized entity.
Integrity ensures that data is not corrupted or modified by
unauthorized personnel. If an authorized individual/system is trying to
modify the data and the modification wasn’t successful, then the data
should be reversed back and should not be corrupted.
Availability
The data should be available to the user whenever the user requires it.
Maintaining of Hardware, upgrading regularly, Data Backups and
Recovery, Network Bottlenecks should be taken care of.
Other
India USA
Cities/Countries
Bangalore New York UK
Hyderabad Chicago London
Delhi Atlanta Canada
Chennai Houston Toronto
Mumbai Los Angeles Australia
Pune Boston UAE
Kolkata Miami Dubai
Ahmedabad San Francisco Philippines
5. How is Encryption different from Hashing?
Both Encryption and Hashing are used to convert readable data into an
unreadable format. The difference is that the encrypted data can be
converted back to original data by the process of decryption but the
hashed data cannot be converted back to original data.
9. What are the response codes that can be received from a Web
Application?
Let us now go ahead and take a look at some of the other Cybersecurity
Interview Questions
Traceroute is a tool that shows the path of a packet. It lists all the
points (mainly routers) that the packet passes through. This is used
mostly when the packet is not reaching its destination. Traceroute is
used to check where the connection stops or breaks to identify the
point of failure.
Step 1: Make sure you have a secure password for your root and
administrator users
Step 2: The next thing you need to do is make new users on your
system. These will be the users you use to manage the system
Step 4: The next step is to configure your firewall rules for remote
access
1. Malware
2. Phishing
3. Password Attacks
4. DDoS
5. Man in the Middle
6. Drive-By Downloads
7. Malvertising
8. Rogue Software
17. What is a Brute Force Attack? How can you prevent it?
Brute Force is a way of finding out the right credentials by repetitively trying all
the permutations and combinations of possible credentials. In most cases, brute
force attacks are automated where the tool/software automatically tries to login
with a list of credentials. There are various ways to prevent Brute Force attacks.
Some of them are:
Password Length: You can set a minimum length for password. The lengthier the
password, the harder it is to find.
Password Complexity: Including different formats of characters in the password
makes brute force attacks harder. Using alpha-numeric passwords along with
special characters, and upper and lower case characters increase the password
complexity making it difficult to be cracked.
Limiting Login Attempts: Set a limit on login failures. For example, you can set the
limit on login failures as 3. So, when there are 3 consecutive login failures, restrict
the user from logging in for some time, or send an Email or OTP to use to log in
the next time. Because brute force is an automated process, limiting login
attempts will break the brute force process.
18. What is Port Scanning?
Port Scanning is the technique used to identify open ports and service available on
a host. Hackers use port scanning to find information that can be helpful to exploit
vulnerabilities. Administrators use Port Scanning to verify the security policies of
the network. Some of the common Port Scanning Techniques are:
Ping Scan
TCP Half-Open
TCP Connect
UDP
Stealth Scanning
Enroll in a prestigious Cyber Security Internship program to kickstart your career.
Physical Layer: Responsible for transmission of digital data from sender to receiver
through the communication media,
Data Link Layer: Handles the movement of data to and from the physical link. It is
also responsible for encoding and decoding of data bits.
Network Layer: Responsible for packet forwarding and providing routing paths for
network communication.
Transport Layer: Responsible for end-to-end communication over the network. It
splits the data from the above layer and passes it to the Network Layer and then
ensures that all the data has successfully reached at the receiver’s end.
Session Layer: Controls connection between the sender and the receiver. It is
responsible for starting, ending, and managing the session and establishing,
maintaining and synchronizing interaction between the sender and the receiver.
Presentation Layer: It deals with presenting the data in a proper format and data
structure instead of sending raw datagrams or packets.
White hat hackers use their powers for good deeds and so they are also called
Ethical Hackers. Look out for our Ethical Hacking Course to learn more about the
Ethical Hacking. These are mostly hired by companies as a security specialist that
attempts to find and fix vulnerabilities and security holes in the systems. They use
their skills to help make the security better.
Anonymity is just a simple thing in Ethical Hacking & CyberSecurity. If you are
interested in this domain, check Edureka’s CompTIA Security+ Certification
Training.
Grey hat hackers are an amalgamation of a white hat and black hat hacker. They
look for system vulnerabilities without the owner’s permission. If they find any
vulnerabilities, they report it to the owner. Unlike Black hat hackers, they do not
exploit the vulnerabilities found.
Use VPN
Use strong WEP/WPA encryption
Use Intrusion Detection Systems
Force HTTPS
Public Key Pair Based Authentication
27. Explain DDOS attack and how to prevent it?
This again is an important Cybersecurity Interview Question. A DDOS(Distributed
Denial of Service) attack is a cyberattack that causes the servers to refuse to
provide services to genuine clients. DDOS attack can be classified into two types:
Flooding attacks: In this type, the hacker sends a huge amount of traffic to the
server which the server can not handle. And hence, the server stops functioning.
This type of attack is usually executed by using automated programs that
continuously send packets to the server.
Crash attacks: In this type, the hackers exploit a bug on the server resulting in the
system to crash and hence the server is not able to provide service to the clients.
You can prevent DDOS attacks by using the following practices:
When an incoming packet destined for a host machine on a particular local area
network arrives at a gateway, the gateway asks the ARP program to find a physical
host or MAC address that matches the IP address.
The ARP program looks in the ARP cache and, if it finds the address, provides it so
that the packet can be converted to the right packet length and format and sent to
the machine.
If no entry is found for the IP address, ARP broadcasts a request packet in a special
format to all the machines on the LAN to see if one machine knows that it has that
IP address associated with it.
Stopping the source to not to access the destination node via ports. As the
application works on the ports, so ports are blocked to restricts the access filling
up the security holes in the network infrastructure.
Example: If someone uses the same password on two different systems and they
are being used using the same hashing algorithm, the hash value would be same,
however, if even one of the system uses salt with the hashes, the value will be
different.
TLS is also an identification tool just like SSL, but it offers better security features.
It provides additional protection to the data and hence SSL and TLS are often used
together for better protection.
Authenticator apps replace the need to obtain a verification code via text, voice
call or email.
Self-learning security systems use data mining, pattern recognition, and natural
language processing to simulate the human brain, albeit in a high-powered
computer model.
Don’t enter sensitive information in the webpages that you don’t trust
Verify the site’s security
Use Firewalls
Use AntiVirus Software that has Internet Security
Use Anti-Phishing Toolbar
40. Explain SQL Injection and how to prevent it?
SQL Injection (SQLi) is a code injection attack where an attacker manipulates the
data being sent to the server to execute malicious SQL statements to control a
web application’s database server, thereby accessing, modifying and deleting
unauthorized data. This attack is mainly used to take over database servers.
You can prevent SQL Injection attacks by using the following practices:
Above that, a corporate company will never ask for personal details on mail.
They want your information. Don’t respond to email, instant messages (IM), texts,
phone calls, etc., asking you for your password or other private information.
You should never disclose your password to anyone, even if they say they work for
UCSC, ITS, or other campus organizations.
2. A friend of yours sends an e-card to your mail. You have to click on the
attachment to get the card.
What do you do? Justify your answer
All three newsletters probably have the same parent company or are distributed
through the same service. The parent company or service can combine individual
pieces of seemingly-harmless information and use or sell it for identity theft
It is even possible that there is a fourth newsletter that asks for a day of birth as
one of the activation questions
4. In our computing labs, print billing is often tied to the user’s login. Sometimes
people call to complain about bills for printing they never did only to find out that
the bills are, indeed, correct.
What do you infer from this situation? Justify.
Sometimes they realize they loaned their account to a friend who couldn’t
remember his/her password, and the friend did the printing. Thus the charges. It’s
also possible that somebody came in behind them and used their account
This is an issue with shared or public computers in general. If you don’t log out of
the computer properly when you leave, someone else can come in behind you
and retrieve what you were doing, use your accounts, etc. Always log out of all
accounts, quit programs, and close browser windows before you walk away.
5. There is this case that happened in my computer lab. A friend of mine used
their yahoo account at a computer lab on campus. She ensured that her account
was not left open before she left the lab. Someone came after her and used the
same browser to re-access her account. and they started sending emails from it.
What do you think might be going on here?
The first person probably didn’t log out of her account, so the new person could
just go to history and access her account.
Another possibility is that she did log out, but didn’t clear her web cache. (This is
done through the browser menu to clear pages that the browser has saved for
future use.)
The employee confirms with the bank that everything has, indeed, been
straightened out.
Account and deposit information is sensitive data that could be used for identity
theft. Sending this or any kind of sensitive information by email is very risky
because email is typically not private or secure. Anyone who knows how can
access it anywhere along its route.
As an alternative, the two offices could have called each other or worked with ITS
to send the information a more secure way.
7. The mouse on your computer screen starts to move around on its own and click
on things on your desktop. What do you do?
a) Call your co-workers over so they can see
f) Run anti-virus
Also, since it seems possible that someone is controlling the computer remotely, it
is best if you can disconnect the computer from the network (and turn off wireless
if you have it) until help arrives. If possible, don’t turn off the computer.
B. akHGksmLN
C.UcSc4Evr!
D.Password1
Answer is UcSc4Evr!
This is the only choice that meets all of the following UCSC requirements:
9. You receive an email from your bank telling you there is a problem with your
account. The email provides instructions and a link so you can log into your
account and fix the problem.
What should you do?
Delete the email. Better yet, use the web client (e.g. gmail, yahoo mail, etc.) and
report it as spam or phishing, then delete it.
Any unsolicited email or phone call asking you to enter your account information,
disclose your password, financial account information, social security number, or
other personal or private information is suspicious – even if it appears to be from
a company you are familiar with. Always contact the sender using a method you
know is legitimate to verify that the message is from them.
10. A while back, the IT folks got a number of complaints that one of our campus
computers was sending out Viagra spam. They checked it out, and the reports
were true: a hacker had installed a program on the computer that made it
automatically send out tons of spam email without the computer owner’s
knowledge.
How do you think the hacker got into the computer to set this up?
This was actually the result of a hacked password. Using passwords that can’t be
easily guessed, and protecting your passwords by not sharing them or writing
them down can help to prevent this. Passwords should be at least 8 characters in
length and use a mixture of upper and lower case letters, numbers, and symbols.
Even though in this case it was a hacked password, other things that could
possibly lead to this are:
If you wish to learn more and build a colorful career, then check out our Cyber
Security Course in India which comes with instructor-led live training and real-life
project experience. This training will help you understand Linux Administration in-
depth and help you achieve mastery over the subject.
You can also take a look at our newly launched course on CompTIA Security+
Certification which is a first-of-a-kind official partnership between Edureka &
CompTIA Security+. It offers you a chance to earn a global certification that
focuses on core cybersecurity skills which are indispensable for security and
network administrators.
Also, learn Cybersecurity the right way with Edureka’s POST GRADUATE PROGRAM
with NIT Rourkela and defend the world’s biggest companies from phishers,
hackers and cyber attacks.