CS Interview Questions
CS Interview Questions
1. What is Cryptography?
Cryptography is the practice and study of techniques for securing information and
communication mainly to protect the data from third parties that the data is not intended
for.
Integrity
Making sure the data has not been modified by an unauthorized entity. Integrity ensures
that data is not corrupted or modified by unauthorized personnel. If an authorized
individual/system is trying to modify the data and the modification wasn’t successful, then
the data should be reversed back and should not be corrupted.
Availability
The data should be available to the user whenever the user requires it. Maintaining of
Hardware, upgrading regularly, Data Backups and Recovery, Network Bottlenecks should
be taken care of.
9. What are the response codes that can be received from a Web
Application?
Ixx Informational responses
2xx Success
3xx Redirection
Step 1: Make sure you have a secure password for your root and administrator users
Step 2: The next thing you need to do is make new users on your system. These will
be the users you use to manage the system
Step 3: Remove remote access from the default root/administrator accounts
Step 4: The next step is to configure your firewall rules for remote access
15. Explain Data Leakage/Loss
Data Leakage is an intentional or unintentional transmission of data from within the
organization to an external unauthorized destination. It is the disclosure of confidential
information to an unauthorized entity. Data Leakage can be divided into 3 categories
based on how it happens:
1 Accidental Breach: An entity unintentionally send data to an unauthorized person
due to a fault or a blunder
2 Intentional Breach: The authorized entity sends data to an unauthorized entity on
purpose
3 System Hack: Hacking techniques are used to cause data leakage
Data Leakage/Loss can be prevented by using tools, software, and strategies known
as DLP(Data Loss Prevention) Tools.
1 Malware
2 Phishing
3 Password Attacks
4 DD0S
5 Man in the Middle
6 Drive-By Downloads
7 Malvertising
8 Rogue Software
17. What is a Brute Force Attack? How can you prevent it?
Brute Force is a way of finding out the right credentials by repetitively trying all the
permutations and combinations of possible credentials. In most cases, brute force attacks
are automated where the tool/software automatically tries to login with a list of
credentials. There are various ways to prevent Brute Force attacks. Some of them are:
Password Length: You can set a minimum length for password. The lengthier the password,
the harder it is to find.
Password Complexity: Including different formats of characters in the password makes
brute force attacks harder. Using alpha-numeric passwords along with special characters,
and upper and lower case characters increase the password complexity making it difficult
to be cracked.
Limiting Login Attempts: Set a limit on login failures. For example, you can set the
limit on login failures as 3. So, when there are 3 consecutive login failures, restrict
the user from logging in for some time, or send an Email or OTP to use to log in the
next time. Because brute force is an automated process, limiting login attempts will
break the brute force process.
Network Layer: Responsible for packet forwarding and providing routing paths for
network communication.
Transport Layer: Responsible for end-to-end communication over the network. It
splits the data from the above layer and passes it to the Network Layer and then
ensures that all the data has successfully reached at the receiver's’end.
Session Layer: Controls connection between the sender and the receiver. It is responsible
for starting, ending, and managing the session and establishing, maintaining and
synchronizing interaction between the sender and the receiver.
Presentation Layer: It deals with presenting the data in a proper format and data structure
instead of sending raw datagrams or packets.
Application Layer: It provides an interface between the application and the network. It
focuses on process-to-process communication and provides a communication interface.
23. What are black hat, white hat and grey hat hackers?
Black hat hackers are known for having vast knowledge about breaking into computer
networks. They can write malware which can be used to gain access to these systems. This
type of hackers misuse their skills to steal information or use the hacked system for
malicious purpose.
White hat hackers use their powers for good deeds and so they are also called Ethical
Hackers. Look out for our Ethical Hacking Course to learn more about the Ethical Hacking.
These are mostly hired by companies as a security specialist that attempts to find and fix
vulnerabilities and security holes in the systems. They use their skills to help make the
security better.
Grey hat hackers are an amalgamation of a white hat and black hat hacker. They look for
system vulnerabilities without the owner's’permission. If they find any vulnerabilities,
they report it to the owner. Unlike Black hat hackers, they do not exploit the vulnerabilities
found.
1. Flooding attacks: In this type, the hacker sends a huge amount of traffic to the
server which the server can not handle. And hence, the server stops functioning.
This type of attack is usually executed by using automated programs that
continuously send packets to the server.
2. Crash attacks: In this type, the hackers exploit a bug on the server resulting in the
system to crash and hence the server is not able to provide service to the clients.
You can prevent DDOS attacks by using the following practices:
If no entry is found for the IP address, ARP broadcasts a request packet in a special
format to all the machines on the LAN to see if one machine knows that it has that IP
address associated with it.
Example: If someone uses the same password on two different systems and they
are being used using the same hashing algorithm, the hash value would be same,
however, if even one of the system uses salt with the hashes, the value will be
different.
TLS is also an identification tool just like SSL, but it offers better security features. It
provides additional protection to the data and hence SSL and TLS are often used together
for better protection.
36. What is 2FA and how can it be implemented for public websites?
An extra layer of security that is known as "m“lti-factor authentication".”
Requires not only a password and username but also something that only, and only, that
user has on them, i.e. a piece of information only they should know or have immediately
to hand — such as a physical token.
Authenticator apps replace the need to obtain a verification code via text, voice call or
email.
37. What is Cognitive Cybersecurity?
Cognitive Cybersecurity is an application of Al technologies patterned on human thought
processes to detect threats and protect physical and digital systems.
Self-learning security systems use data mining, pattern recognition, and natural language
processing to simulate the human brain, albeit in a high-powered computer model.
VPN VLAN
Helps to group workstations that are Related to remote access to the network of a
not within the same locations into company
the same broadcast domain
42.What is ransomware?
Ransomware is a type of malware that encrypts a victim's data and demands a ransom payment
for decryption. It often spreads through phishing emails or malicious downloads.
Example: The WannaCry ransomware attack in 2017 encrypted files on Windows systems
worldwide, demanding Bitcoin payments to restore access.
Encryption: Transforms data into ciphertext, which can be decrypted back to plaintext using a
key. Used for securing data transmission or storage.
Example: Passwords are hashed before storage in a database, while credit card details are
encrypted for secure transactions.
Can you explain common hashing algorithms like SHA-256 and their use cases?
How can organizations train employees to detect and prevent social engineering?
Can you describe a real-life incident where social engineering was used successfully?
Example: An attacker uses Wireshark to capture unencrypted login credentials sent over an
insecure network.
Example: An attacker uses a botnet to send millions of requests to a website, causing it to crash
and become inaccessible.
Can you explain how traffic filtering helps in preventing DoS attacks?
Factors include:
Example: Accessing an online banking account requires a password and a fingerprint scan.
Expected Follow-Up Questions:
Can you explain how SMS-based MFA differs from app-based MFA?
Example: A penetration tester exploits a weak password policy to gain unauthorized admin
access and recommends implementing stronger password requirements.
Part B - Situation/Scenario Based Questions
1.Here is a situation- You receive the following email from the help
desk: Dear XYZ Email user,
To create space for more users we'r’ deleting all inactive email accounts.
Here's’what you have to send to save your account from getting deleted:
If we don't’receive the above information from you by the end of the week, your email
account will be terminated.
This email is a classic example of "phishing" — trying to trick you into "biting". The
justification is the generalized way of addressing the receiver which is used in mass spam
emails.
Above that, a corporate company will never ask for personal details on mail.
They want your information. Don't respond to email, instant messages (1M), texts, phone
calls, etc., asking you for your password or other private information.
You should never disclose your password to anyone, even if they say they work for UCSC,
ITS, or other campus organizations.
Scenario 2:A friend of yours sends an e-card to your mail. You have to
click on the attachment to get the card. What do you do? Justify your
answer
Example Answer:
There are four risks here:
Some attachments contain viruses or other malicious programs, so just in general,
it's risky to open unknown or unsolicited attachments.
Also, in some cases just clicking on a malicious link can infect a computer, so unless
you are sure a link is safe, don't click on it.
Email addresses can be faked, so just because the email says it is from someone you
know, you can't be certain of this without checking with the person.
Finally, some websites and links look legitimate, but they're really hoaxes designed
to steal your information.
It is even possible that there is a fourth newsletter that asks for a day of birth as one of
the activation questions
Often questions about personal information are optional. In addition to being suspicious
about situations like the one described here, never provide personal information when it
is not legitimately necessary, or to people or companies, you don't personally know.
Scenario 4:In our computing labs, print billing is often tied to the user's
login. Sometimes people call to complain about bills for printing they
never did only to find out that the bills are, indeed, correct.
What do you Infer from this situation? Justify.
Example Answer:
Sometimes they realize they loaned their account to a friend who couldn't remember
his/her password, and the friend did the printing. Thus the charges. It's also possible that
somebody came in behind them and used their account
This is an issue with shared or public computers in general. If you don't log out of the
computer properly when you leave, someone else can come in behind you and retrieve
what you were doing, use your accounts, etc. Always log out of all accounts, quit
programs, and close browser windows before you walk away.
Scenario 5:There is this case that happened in my computer lab. A
friend of mine used their yahoo account at a computer lab on campus.
She ensured that her account was not left open before she left the lab.
Someone came after her and used the same browser to re-access her
account. and they started sending emails from it.
What do you think might be going on here?
Example Answer:
The first person probably didn't log out of her account, so the new person could just go to
history and access her account.
Another possibility is that she did log out, but didn't clear her web cache. (This is done
through the browser menu to clear pages that the browser has saved for future use.)
The employee confirms with the bank that everything has, indeed, been straightened
out.
As an alternative, the two offices could have called each other or worked with ITS to send
the information a more secure way.
7.The mouse on your computer screen starts to move around on its own
and click on things on your desktop. What do you do?
a) Call your co-workers over so they can see
f) Run anti-virus
Also, since it seems possible that someone is controlling the computer remotely, it is best
if you can disconnect the computer from the network (and turn off wireless if you have it)
until help arrives. If possible, don't turn off the computer.
B. akHGksmLN
C. UcSc4Evr!
D.Password1
Scenario 10:A while back, the IT folks got several complaints that one of our
campus computers was sending out Viagra spam. They checked it out, and the
reports were true: a hacker had installed a program on the computer that made
it automatically send out tons of spam email without the computer owner's
knowledge.
How do you think the hacker got into the computer to set this up?
Example Answer:This was the result of a hacked password. Using passwords that can't
be easily guessed, and protecting your passwords by not sharing them or writing them
down can help to prevent this. Passwords should be at least 8 characters in length and use
a mixture of upper- and lower-case letters, numbers, and symbols.
Even though in this case it was a hacked password, other things that could possibly lead
to this are: