Cyber Security Sample Questions & Answers

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/40

flashcard set

Earn XP

Description and Tags

Flashcards based on cybersecurity lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

41 Terms

1
New cards

What is cybersecurity?

Cybersecurity refers to the protection of hardware, software, and data from attackers. The primary purpose is to protect against cyberattacks like accessing, changing, or destroying sensitive information.

2
New cards

What are the major elements of cybersecurity?

Information security, Network security, Operational security, Application security, End-user education, and Business continuity planning.

3
New cards

What are the advantages of cybersecurity?

Protects against ransomware, malware, social engineering, and phishing; protects end-users; provides good data and network protection; increases recovery time after breaches; prevents unauthorized users.

4
New cards

Define cryptography.

A technique used to protect information from third parties (adversaries) by allowing only the sender and recipient to read its details.

5
New cards

What is the difference between IDS and IPS?

IDS (Intrusion Detection System) detects intrusions, requiring administrator intervention. IPS (Intrusion Prevention System) detects and prevents intrusions automatically.

6
New cards

What does CIA stand for in cybersecurity?

Confidentiality, Integrity, and Availability. It is a model designed to develop a security policy.

7
New cards

What is a Firewall?

A security system designed for the network that monitors and controls network traffic to protect against malware, worms, and viruses. It can also prevent content filtering and remote access.

8
New cards

Explain Traceroute.

A tool that shows the path a packet takes, listing all the points it passes through. Used to check where a connection breaks or stops.

9
New cards

Differentiate between HIDS and NIDS.

HIDS (Host Intrusion Detection System) monitors suspicious system activities and traffic of a specific device. NIDS (Network Intrusion Detection System) monitors the traffic of all devices on the network.

10
New cards

Explain SSL.

SSL (Secure Sockets Layer) is a technology creating encrypted connections between a web server and a web browser, used to protect information in online transactions and digital payments.

11
New cards

What is data leakage?

An unauthorized transfer of data to the outside world, often occurring via email, optical media, laptops, and USB keys.

12
New cards

Explain the brute force attack and how to prevent it.

A trial-and-error method to find the right password or PIN. Prevention methods include setting password length, increasing complexity, and limiting login failures.

13
New cards

What is port scanning?

A technique for identifying open ports and services available on a specific host, often used by hackers to find information for malicious purposes.

14
New cards

Name the different layers of the OSI model.

Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session Layer, Presentation Layer, Application Layer.

15
New cards

What is a VPN?

VPN (Virtual Private Network) is a network connection method for creating an encrypted and safe connection, protecting data from interference, snooping, and censorship.

16
New cards

Who are black hat hackers?

Individuals with knowledge of breaching network security who generate malware for personal financial gain or other malicious reasons, modifying, stealing, or destroying data.

17
New cards

Who are white hat hackers?

Security specialists specialized in penetration testing who protect the information system of an organization.

18
New cards

Who are grey hat hackers?

Computer hackers who sometimes violate ethical standards but do not have malicious intent.

19
New cards

How to reset a password-protected BIOS configuration?

Remove CMOS battery, utilizing software, utilizing a motherboard jumper, or utilizing MS-DOS.

20
New cards

What is MITM attack?

MITM (Man-in-the-Middle) is a type of attack where an attacker intercepts communication between two persons to access confidential information.

21
New cards

Define ARP and its working process.

A protocol used for finding MAC address associated with IPv4 address and works as an interface between the OSI network and OSI link layer.

22
New cards

Explain botnet.

A number of internet-connected devices (servers, mobile devices, IoT devices, PCs) that are infected and controlled by malware.

23
New cards

What is the main difference between SSL and TLS?

SSL verifies the identity of the sender, while TLS offers a secure channel between two clients.

24
New cards

What is the abbreviation of CSRF?

Cross-Site Request Forgery.

25
New cards

What is 2FA and how to implement it for a public website?

TFA (Two Factor Authentication) is a security process to identify the person accessing an online account, granting access only after presenting evidence to the authentication device.

26
New cards

Explain the difference between asymmetric and symmetric encryption.

Symmetric encryption requires the same key for encryption and decryption, while asymmetric encryption needs different keys for encryption and decryption.

27
New cards

What is the full form of XSS?

Cross-Site Scripting.

28
New cards

Explain WAF

WAF (Web Application Firewall) is used to protect the application by filtering and monitoring incoming and outgoing traffic between web application and the internet.

29
New cards

What is hacking?

A process of finding weakness in computers or private networks to exploit its weaknesses and gain access.

30
New cards

Who are hackers?

A person who finds and exploits the weakness in computer systems, smartphones, tablets, or networks to gain access.

31
New cards

What is network sniffing?

A tool used for analyzing data packets sent over a network to capture sensitive data such as passwords, eavesdrop on chat messages or monitor data packages over a network.

32
New cards

What is the importance of DNS monitoring?

To identify malware on young domains that are easily infected with malicious software.

33
New cards

Define the process of salting and its use

Salting extends the length of passwords by using special characters in order to safeguard passwords and prevent attackers testing known words across the system.

34
New cards

What is SSH?

SSH stands for Secure Socket Shell or Secure Shell. It is a utility suite that provides system administrators secure way to access the data on a network.

35
New cards

Is SSL protocol enough for network security?

SSL verifies the sender's identity, but it does not provide security once the data is transferred to the server. It is good to use server-side encryption and hashing to protect the server against a data breach.

36
New cards

What is Black box testing?

It is a software testing method in which the internal structure or program code is hidden.

37
New cards

What is White box testing?

A software testing method in which internal structure or program is known by tester.

38
New cards

Explain vulnerabilities in network security

Vulnerabilities refer to the weak point in software code which can be exploited by a threat actor. They are most commonly found in an application like SaaS (Software as a service) software.

39
New cards

Explain TCP Three-way handshake.

It is a process used in a network to make a connection between a local host and server. This method requires the client and server to negotiate synchronization and acknowledgment packets before starting communication.

40
New cards

Define the term residual risk. What are three ways to deal with risk?

It is a threat that balances risk exposure after finding and eliminating threats. Three ways to deal with risk are: Reduce it, Avoid it, Accept it.

41
New cards

Define Exfiltration.

Data exfiltration refers to the unauthorized transfer of data from a computer system. This transmission may be manual and carried out by anyone having physical access to a computer.