VAPT Interview Questions and Answers
VAPT Interview Questions and Answers
VAPT Interview Questions and Answers
This group of questions will cover the basics of penetration testing, focused on the following
areas:
• A definition of pentesting
• The purpose and goals of pentesting
• The difference between vulnerability testing and pentesting
• The types of pentesting methodologies
• The teams that are required to conduct a pentesting exercise
• The certs that are required in order to demonstrate deep skills and knowledge in
pentesting
• How a pentester should explain the results of a pentest to a C-level executive
Let’s ask the people in the know. Cloudflare.com says the following: “Penetration testing (or
pentesting) is a security exercise where a cybersecurity expert attempts to find and exploit
vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak
spots in a system’s defenses which attackers could take advantage of.”
The main purpose of a pentest is to conduct a “deep dive” into the IT Infrastructure of a business
or a corporation with the primary intention of gaining access to any (and if possible, all) of the
electronic based assets that exist. It is important to note that the goal of the pentester is not to
attempt to strike a hard blow right at the very beginning; rather, they escalate the intensity of the
cyber-attack over a period of time.
• To test adherence to the security policies that have been crafted and implemented by the
organization
• To test for employee proactiveness and awareness of the security environment that they
are in
• To fully ascertain how a business entity can face a massive security breach, and how
quickly they react to it and restore normal business operations after being hit.
With vulnerability testing, one is simply scanning for any weaknesses that may reside in any
component of the IT Infrastructure. In a pentest, a full-scale cyber-attack or series of cyber-
attacks is launched with explicit permission from the client (or whoever is requesting it) in order
to specifically find any types or kinds of gaps that have not yet been discovered by the IT
security staff.
• Black-Box Testing
• White-Box Testing
• Gray-Box Testing
Black-Box Testing
In some instances, the cyber-attacker may know nothing about their intended target. So in an
effort to try to break through the lines of defense, the cyber-attacker will carry an all-out attack,
also known as a brute-force Attack. In a black-box scenario, the pentester will not have any
knowledge whatsoever about the target(s) they are going to hit. As a result, this kind of pentest
can take a very long time to conduct, and automated tools are heavily relied upon. This kind of
exercise is also known as a trial-and-error approach.
White-Box Testing
This kind of pentest is also known as clear-box testing. In these instances, the pentester has
advanced knowledge to some degree about the Web application that they are about to hit and its
underlying source code. This kind of attack takes a shorter amount of time to launch when
compared to the black-box test.
Gray-Box Testing
This kind of pentesting is a combination of both of black-box and white-box testing. This simply
means that the pentester has some advanced knowledge on the targets they plan to attack. This
kind of exercise requires both the use of automated and manual tools. When compared to the
other two tests, this one offers the highest chances of discovering unknown security holes and
weaknesses.
This group of pentesters acts like the actual cyber-attack. That means this team is the one that
launches the actual threat, in order to break down the lines of defense of the business or
corporation and attempt to further exploit any weaknesses that are discovered.
These are the pentesters that act like the actual IT staff in an organization. Their main objective
is to thwart any cyber-attacks that are launched by the Red Team. They assume a mindset of
being proactive as well as maintaining a strong sense of security consciousness.
This is a combination of both the Red Team and the Blue Team. For example, they have the
security arsenal that is used by the Blue Team and possess a working knowledge of what the Red
Team is planning to attack. It is the primary job of the Purple Team to help out both these teams
out. Because of that, the pentesters of the Purple team cannot be biased in any regard and have to
maintain a neutral point of view.
There is no doubt that in the cybersecurity field, there an endless number of certs one can pursue.
But if a pentester is to be recognized as the top in their field, the following certs are a must-have:
• The Certified Ethical Hacker (aka CEH – this is administered by the EC Council)
• The Offensive Security Certified Professional (aka OSCP – this is administered by
Offensive Security)
10.The results of a pentesting exercise have to be made available not only to the
IT staff, but also to the C-level executives. The latter may not possess a strong
technical knowledge like their IT staff does. How would you explain the results to
them?
The C-suite can understand results when they are explained to them in terms of financial impact.
Thus, a pentesting report should also include a risk analysis which demonstrates the benefit
versus the cost of any of the vulnerabilities that are discovered and not fixed. It should also have
financial calculations demonstrating the impacts of a security breach.
Level 2 Questions
In this section, we’ll look at some intermediate-level questions about penetration testing
concepts. These will focus on the following:
• Cross-site scripting
• Data packet sniffing
• Various abbreviations that are used in pentesting
• Common network security vulnerabilities
• Pentesting techniques
• The various network ports
• SQL injection attacks
• Asymmetric/symmetric cryptography
• SSL/TLS
This is a type of cyber-attack where malicious pieces of code, or even scripts, can be covertly
injected into trusted websites. These kinds of attacks typically occur when the attacker uses a
vulnerable Web-based application to insert the malicious lines of code. This can occur on the
client side or the browser side of the application. As a result, when an unsuspecting victim runs
this particular application, their computer is infected and can be used to access sensitive
information and data. A perfect example of this is the contact form, which is used on many
websites. The output that is created when the end user submits their information is often not
encoded, nor is it encrypted.
12.What exactly is data packet sniffing, and what are some of the most widely
used tools?
Data packet sniffing is a specific process in which network traffic can be captured ether across
the entire IT Infrastructure, or just certain parts of it. Once this has been accomplished, then a
deep analysis of the data packets in question can then be made.
For example, if a business or a corporation is hit by a cyber-attack, examining the network traffic
and the data packets that were associated with it at the time of the security breach occurred
becomes extremely crucial, especially from the standpoint of forensics. Even if no attack is
imminent, it is still very crucial for the IT staff to conduct a check on their network traffic in
order to determine if there is any sort of anomaly that is present. There are many data packet
sniffing tools that are available today, but probably the most widely-used one is Wireshark.
13.Please provide the exact names of the following abbreviations that are
commonly used in pentesting: 2FA, 2S2D, 2VPCP, 3DES, 3DESE, 3DESEP.
14.What are some of the most common network security vulnerabilities that a
pentester comes across?
Of course, there are countless numbers of issues that can impact the network infrastructure of an
organization, and you probably have your own stories about what you’ve encountered. The
following vulnerabilities are some of the most prevalent:
• The usage of extremely weak passwords in the network security tools themselves, which
include the routers, firewalls, network intrusion devices and so on. Very often, business
entities are in a rush to deploy these kinds of technologies, and they forget to create a
robust and secure password. This leads to them using the insecure default one set up by
the vendor
• Implementing security patches on the wrong servers and related network components.
There are also times when a security patch is installed on the right machine but not
configured properly, thus leaving it wide open to a cyber-attack
• The misconfiguration of network devices, as described previously
• The use of infected portable media devices (primarily USB drives) and inserting them
into a server and other related network components
• The lack of a coherent network security policy; even if one was implemented, compliance
is still a huge issue
This is a method in which malicious SQL code is inserted into the database or the back end of
the Web-based application. These are typically deployed into an entry-level field so that the
malicious code can be executed. This kind of attack is used primarily for heavy data-driven
applications in which multiple security vulnerabilities can be found and exploited. It should be
noted that although SQL injection attacks are primarily used to hit Web-based applications, the
attacker can also target the SQL database just by itself as well.
Only one type of key is used in symmetric cryptography, and this key is known as the Private
Key. Although the main advantage of this is that this type of system is relatively easy to deploy,
the primary disadvantage of it is that if the Private Key falls outside the reach of the sending and
receiving parties, the cyber-attacker can easily capture the ciphertext and decrypt it very easily.
With asymmetric cryptography, two keys are used: the Public Key and the Private Key. The
advantage of this system is that it offers far greater levels of security as opposed to just using a
Private Key, but it requires considerably more processing power resources. An example of an
asymmetric cryptography system is Public Key Infrastructure, also known as PKI.
19.What are the permutations required for a robust SSL connection to take
place?
SSL stands for “Secure Sockets Layer.” This is the de facto standard to keep all Internet
connections safe and secure. You will know that a particular website can be safely accessed
when it has “HTTPS” in its URL address. SSLs are used most in e-commerce-based applications,
in which credit card and other personal information and data is transmitted to the online
merchant.
TSL stands for “Transport Layer Security” and is actually a much more updated and advanced
version of SSL. It is important to note that with TSL, it can come with three types of encryption:
• Elliptical Curve Cryptography (ECC)
• Rivest–Shamir–Adleman (RSA)
• Digital Signature Algorithm (DSA)
Enroll in an upcoming live online boot camp and earn your certification, guaranteed.
Level 3 Questions
This section covers advanced-level questions about penetration testing, focusing on the
following:
• On the client side, the end user enters a URL address into their Web browser. This then
initiates the SSL/TLS connection by transmitting a particular message to the server on
which the website resides
• This server then returns a Public Key (or even a certificate) back to the end user’s Web
browser
• The browser then closely inspects this Public Key, and if all looks good, a Symmetric
Key is transmitted back to the server. If there are anomalies detected from within the
Public Key, the communications are instantly cut off
• Once the server gets the Symmetric Key, it then sends the encrypted webpage that is
being requested back to the end user’s Web browser
• The browser then decrypts the content into a form that can be easily understood by the
end user
It is important to note that this entire process can also be referred to as the SSL/TSL Handshake.
This was actually one of the first Public Key protocols to be put into place, and it is a
methodology that can be utilized to securely exchange Public Keys over an open network line of
communications. A pentest can be done here in order to determine and ascertain any kind of
weak/TLS services that are associated with this exchange process.
24.After a pentest is conducted, what are some of the top network controls you
would advise your client to implement?
• Only use those applications and software tools that are deemed “whitelisted”
• Always implement a regular firmware upgrade and software patching schedule, and make
sure that your IT staff sticks with the prescribed timetable
• With regards to the last point, it is absolutely imperative that the operating systems(s) you
utilize are thoroughly patched and upgraded
• Establish a protocol for giving out administrative privileges only on an as-needed basis,
and only to those individuals that absolutely require them
25.How does traceout/tracert exactly work?
This is used to determine exactly the route of where the data packets are exactly going. For
example, this method can be used to ascertain if data packets are being maliciously redirected,
they take too long to reach their destination, as well as the number of hops it takes for the data
packets to go from the point of origination to the point of destination.
This is a type of specific service that can help to perform network-based audits or even
automated pentesting of an entire network infrastructure. It can give the pentesting team detailed
information and data as to how the cyber-attacker can gain access to your network-based digital
assets. It can also be used to help mitigate any form of threat that is launched by a malicious third
party.
All types of network infrastructures can be pentested, and up to a thousand total vulnerabilities
can be detected with this particular service.
It is also important to note that there are three types of threat models that a pentesting team can
use, and they are as follows:
• Digital Asset-Centric
• Cyber-Attacker-Centric
• Software Application-Centric.
• Persistent/Stored XSS: This is where the malicious input is stored onto the target server,
such as a database, and is reflected at the page where the end user entered in their
information (such as a “Contact Us” form)
• Reflected XSS: Any form of malicious user input is instantaneously returned by the
Web-based application as an “Error Message.” As a result, this data is deemed to be
unsafe by the Web browser, and it is not stored in any fashion
• DOM-based XSS: This will actually for any type or kind of client scripting language
(such as Java) to access and maliciously modify the end user input. It can also covertly
alter the content, structure and even the particular style of a webpage. The types of
objects that can be manipulated include the following:
o Document.URL
o Document.location
o Document.referrer
30.What exactly is CSRF and how can it be prevented when executing a pentest
exercise?
This stands for cross-site request forgery, and it takes advantage of the trust levels that are
established in an authenticated user session. For example, in these scenarios, Web-based
applications typically do not conduct any form of verification tests that a specific request actually
came from an authenticated user; rather, the only form of verification is sent by the particular
Web browser that the end user is utilizing. There are two ways to avoid this scenario:
Enroll in an upcoming live online boot camp and earn your certification, guaranteed.
Conclusion
Overall, we’ve looked at some of the interviews that you could be asked if you are applying for a
pentesting job. These questions can also be asked of a pentester if they are currently employed in
this field.
It is important to keep in mind that although answering these questions will demonstrate to the
interviewer your in-depth knowledge of pentesting, it takes other qualitative skills as well in
order to become a successful pentester. For instance, you must have the ability to work well with
others in a team-oriented fashion and work long hours.
Pentesting also requires you to have a great deal of patience on your part, as it these kinds of
exercises do not happen in just one day. A successful pentest can take weeks or even months to
accomplish.
Finally, you must also have the ability to take all of the techno-jargon that is associated with the
results you have obtained and bring it down to a level that your client can understand and
implement. You will be gauged on these qualitative factors as well in your interview.
SSH (TCP port 22) is a secure connection used on many different systems and dedicated
appliances. Routers, switches, SFTP servers and unsecure programs being tunneled through this
port all can be used to help harden a connection against eavesdropping. Despite the fact that most
times when you hear about somebody “SSHing” into a box it involves Linux, the SSH protocol
itself is actually implemented on a wide variety of systems — though not by default on most
Windows systems. Programs like PuTTY, Filezilla and others have Windows ports available,
which allow Windows users the same ease-of-use connectivity to these devices as do Linux
users.
To boil down an extremely complicated topic into a few short words, symmetric encryption uses
the same key to encrypt and decrypt, while asymmetric uses different keys for encryption and
decryption. Symmetric is usually much faster, but is difficult to implement most times due to the
fact that you would have to transfer the key over an unencrypted channel. Therefore many times
an asymmetric connection will be established first, then create the symmetric connection. This
leads us into the next topic …
SSL is identity verification, not hard data encryption. It is designed to be able to prove that the
person you are talking to on the other end is who they say they are. SSL and its big brother TLS
are both used almost everyone online, but the problem is because of this it is a huge target and is
mainly attacked via its implementation (the Heartbleed bug for example) and its known
methodology. As a result, SSL can be stripped in certain circumstances, so additional protections
for data-in-transit and data-at-rest are very good ideas.
POST is one of the best tools available when a system will not boot. Normally, through the use
of either display LEDs in more modern systems, or traditionally through audio tones, these
specific codes can tell you what the system doesn’t like about its current setup. Because of how
rare these events can be, unless you are on a tech bench day in and day out, reference materials
such as the motherboard manual and your search engine of choice can be tremendous assets. Just
remember to make sure that everything is seated correctly, you have at least the minimum
required components to boot, and most importantly, that you have all of your connections on the
correct pins.
10. What is the difference between a black hat and a white hat?
This particular question can lead into a major philosophical debate about freedom of information,
and if something is implemented in a deliberately broken way it isn’t actually breaking into it,
etc. The one I’ve heard the most is the classic Jedi example — same tools, different ideologies.
Personally, the people I know that have worked on both sides of the line it comes down to this —
the difference between a black hat and a white hat is who is signing the check.
While BIOS itself has been superseded by UEFI, most systems still follow the same
configuration for how they keep the settings in storage. Since BIOS itself is a pre-boot system, it
has its own storage mechanism for its settings and preferences. In the classic scenario, simply
popping out the CMOS (complementary metal-oxide-semiconductor) battery will be enough to
have the memory storing these settings lose its power supply, and as a result it will lose its
settings. Other times, you need to use a jumper or a physical switch on the motherboard. Still
other times, you need to actually remove the memory itself from the device and reprogram it in
order to wipe it out. The simplest way by far however is this: if the BIOS has come from the
factory with a default password enabled, try “password”.
Cross-site scripting is the nightmare of Javascript. Because Javascript can run pages locally on
the client system as opposed to running everything on the server side, this can cause headaches
for a programmer if variables can be changed directly on the client’s webpage. There are a
number of ways to protect against this, the easiest of which is input validation.
13. How would you login to Active Directory from a Linux or Mac box?
While it may sound odd, it is possible to access Active Directory from a non-Windows system.
Active Directory uses an implementation of the SMB protocol, which can be accessed from a
Linux or Mac system by using the Samba program. Depending on the version, this can allow for
share access, printing and even Active Directory membership.
14. What are salted hashes?
Salt at its most fundamental level is random data. When a properly protected password system
receives a new password, it will create a hashed value for that password, create a new random
salt value and then store that combined value in its database. This helps defend against dictionary
attacks and known hash attacks. For example, if a user uses the same password on two different
systems, if they used the same hashing algorithm, they could end up with the same hash value.
However, if even one of the systems uses salt with its hashes, the values will be different.
Enroll in an upcoming live online boot camp and earn your certification, guaranteed.
15. What do you think of social networking sites such as Facebook and
LinkedIn?
This is a doozy, and there are an enormous number of opinions for this question. Many think
they are the worst thing that ever happened to the world, while others praise their existence. In
the realm of security, they can be the source of extreme data leaks if handled in their default
configurations. It is possible to lock down permissions on social networking sites, but in some
cases this isn’t enough due to the fact that the backend is not sufficiently secured. This also
doesn’t help if somebody else’s profile you have on your list gets compromised. Keeping
important data away from these kinds of sites is a top priority, and only connecting with those
you trust is also extremely helpful.
Something they know (password), something they have (token), and something they are
(biometrics). Two-factor authentication often uses a password and token setup, although in some
cases this can be a PIN and thumbprint.
17. How would you judge if a remote server is running IIS or Apache?
Error messages oftentimes give away what the server is running, and many times if the website
administrator has not set up custom error pages for every site, it can give it away as simply as
just entering a known bad address. Other times, just using telnet can be enough to see how it
responds. Never underestimate the amount of information that can be gained by not getting the
right answer but by asking the right questions.
When data is protected while it is just sitting there in its database or on its hard drive — it can be
considered at rest. On the other hand, while it is going from server to client, it is in-transit. Many
servers do one or the other — protected SQL databases, VPN connections, etc. However, there
are not many that do both, primarily because of the extra drain on resources. It is still a good
practice to do both. Even if it does take a bit longer.
19. You see a user logging in as root to perform basic functions. Is this a
problem?
A Linux admin account (root) has many powers that are not permitted for standard users. That
being said, it is not always necessary to log all the way off and log back in as root in order to do
these tasks. For example, if you have ever used the “run as admin” command in Windows, then
you will know the basic concept behind “sudo” or “superuser (root) do” for whatever it is you
want it to do. It’s a very simple and elegant method for reducing the amount of time you need to
be logged in as a privileged user. The more time a user spends with enhanced permissions, the
more likely it is that something is going to go wrong — whether accidentally or intentionally.
This is another opinion question. There are a lot of different ways to protect a wireless access
point: using WPA2, not broadcasting the SSID and using MAC address filtering are the most
popular among them. There are many other options, but in a typical home environment, those
three are the biggest.
21. What is an easy way to configure a network to allow only a single computer
to login on a particular jack?
Sticky ports are one of the network admin’s best friends and worst headaches. They allow you to
set up your network so that each port on a switch only permits one (or a number that you specify)
computer to connect on that port by locking it to a particular MAC address. If any other
computer plugs into that port, the port shuts down and you receive a call that they can’t connect
anymore. If you were the one that originally ran all the network connections then this isn’t a big
issue, and likewise, if it is a predictable pattern, then it also isn’t an issue. However, if you’re
working in a hand-me-down network where chaos is the norm, then you might end up spending a
while toning out exactly what they are connecting to.
22. You are remoted in to a headless system in a remote area. You have no
physical access to the hardware and you need to perform an OS installation.
What do you do?
There are a couple of different ways to do this, but the most like scenario you will run into is
this: What you would want to do is setup a network-based installer capable of network-booting
via PXE (if you’ve ever seen this during your system boot and wondering what it was for, tada).
Environments that have very large numbers of systems more often than not have the capability of
pushing out images via the network. This reduces the amount of hands-on time that is required
on each system, and keeps the installs more consistent.
23. On a Windows network, why is it easier to break into a local account than an
AD account?
Windows local accounts have a great deal of baggage tied to them, running back a long long way
to keep compatibility for user accounts. If you are a user of passwords longer than 13 characters,
you may have seen the message referring to this fact. However, Active Directory accounts have a
great deal of security tied onto them, not the least of which is that the system actually doing the
authenticating is not the one you are usually sitting at when you are a regular user. Breaking into
a Windows system if you have physical access is actually not that difficult at all, as there are
quite a few dedicated utilities for just such a purpose. However, that is beyond the scope of what
we’ll be getting into here.
Both acronyms are intrusion detection systems. However, the first is a host intrusion detection
system whereas the second is a network intrusion detection system. An HIDS runs as a
background utility the same as an antivirus program, for instance, while a NIDS sniffs packets as
they go across the network looking for things that aren’t quite ordinary. Both systems have two
basic variants: signature based and anomaly based. Signature based is very much like an
antivirus system, looking for known values of known “bad things,” while anomaly looks more
for network traffic that doesn’t fit the usual pattern of the network. This requires a bit more time
to get a good baseline, but in the long term can be better on the uptake for custom attacks.
26. You find out that there is an active problem on your network. You can fix it,
but it is out of your jurisdiction. What do you do?
This question is a biggie. The true answer is that you contact the person in charge of that
department via email — make sure to keep that for your records — along with CCing your
manager. There may be a very important reason why a system is configured in a particular way,
and locking it out could mean big trouble. Bringing up your concerns to the responsible party is
the best way to let them know that you saw a potential problem, are letting them know about it,
and covering yourself at the same time by having a timestamp on it.
27. You are an employee for a tech department in a non-management position. A
high-level executive demands that you break protocol and allow him to use his
home laptop at work. What do you do?
You would be amazed how often this happens, even more so in the current BYOD environment.
Still, the easiest way out of this one is to contact your manager again and have them give a yay
or nay. This puts the authority and decision where it needs to be and gives you assistance if the
department needs to push back. Stress can be a real killer in position where you have to say “no”
to people that don’t like hearing it, so passing the buck can be a friend.
A lot of people would say that they are the same thing, and in a sense they would be right.
However, one is a potential problem while the other is an active problem. Think of it like this:
You have a shed with a broken lock where it won’t latch properly. In some areas such as major
cities, that would be a major problem that needs to be resolved immediately, while in others like
rural areas its more of a nuisance that can be fixed when you get around to it. In both scenarios it
would be a vulnerability, while the major cities shed would be an example of an exploit — there
are people in the area, actively exploiting a known problem.
Considering how infected these typically are, I wouldn’t touch one with a ten-foot pole. That
being said, a USB keylogger is easy to fit into the back of these systems without much notice. An
autorun program would be able to run quickly and quietly leaving behind software to do the dirty
work. In essence, it’s open season on exploits in this type of environment.
31. What is worse in firewall detection, a false negative or a false positive? And
why?
Far and away is a false negative. A false positive is annoying, but easily dealt with — calling a
legitimate piece of traffic bad. A false negative is a piece of malicious traffic being let through
without incident — definitely bad.
32. What’s better, a red team or a blue team?
Another opinion question, more along the lines of where your interests lie. In penetration testing
scenarios, a red team is trying to break in while a blue team is defending. Red teams typically are
considered the “cooler” of the two, while the blue team is usually the more difficult. The usual
rules apply like in any defense game: the blue team has to be good every time, while the red team
only has to be good once. That’s not entirely accurate given the complexities at work in most
scenarios, but it’s close enough to explain the idea.
33. What’s the difference between a white box test and a black box test?
The difference is information given by the person commissioning the test. A white box test is
one where the pentesting team is given as much information as possible regarding the
environment, while a black box test is … well … a black box. They don’t know what’s inside.
Information protection is just what it sounds like — protecting information through the use of
encryption, security software and other methods designed to keep it safe. Information assurance
on the other hand deals more with keeping the data reliable — RAID configurations, backups,
non-repudiation techniques, etc.
Another opinion question, and as usual a lot of different potential answers. The baseline for these
though would be three key elements: an anti-malware application, a remote wipe utility and full-
disk encryption. Almost all modern mobile devices regardless of manufacturer have anti-
malware and remote wipe available for them, and very few systems now do not come with full-
disk encryption available as an option directly within the OS.
Yet another opinion question. Closed-source is a typical commercially developed program. You
receive an executable file which runs and does its job without the ability to look far under the
hood. Open-source, however, provides the source code to be able to inspect everything it does, as
well as be able to make changes yourself and recompile the code. Both have arguments for and
against them, most have to do with audits and accountability. Closed-source advocates claim that
open-source causes issues because everybody can see exactly how it works and exploit
weaknesses in the program. Open-source counter saying that because closed-source programs
don’t provide ways to fully check them out, its difficult to find and troubleshoot issues in the
programs beyond a certain level.
38. What is the three-way handshake? How can it be used to create a DOS
attack?
The three-way handshake is a cornerstone of the TCP suite: SYN, SYN/ACK, ACK. SYN is the
outgoing connection request from client to server. SYN/ACK is the acknowledgement of the
server back to the client, saying that yes I hear you, let’s open a connection. ACK is the final
connection, and allows the two to speak. The problem is that this can be used as a very basic type
of denial-of-service attack. The client opens up the SYN connection, the server responds with the
SYN/ACK, but then the client sends another SYN. The server treats this as a new connection
request and keeps the previous connection open. As this is repeated over and over many times
very quickly, the server quickly becomes saturated with a huge number of connection requests,
eventually overloading its ability to connect to legitimate users.
39. Why would you bring in an outside contractor to perform a penetration test?
Much like getting a fresh set of eyes on a problem, sometimes you have people that don’t want to
see or don’t want to admit to an issue. Bringing in extra help as an audit can really help eliminate
problems your team isn’t able to resolve on their own. Granted they may cost a small fortune, but
they are extremely good at what they do.
40. If you were going to break into a database-based website, how would you do
it?
And here’s other side of the coin: learning to break into your own systems so that you can
pentest them yourself. While the exact methods are different for each type of database server and
programming language, the easiest attack vector to test for first is an SQL injection technique.
For example, if the input fields are not sterilized, just entering a specific set of symbols into a
form field may be enough to get back data. Alternatively, depending again on how the site is
written, using a specially crafted URL may be enough to get back data as well. Footprinting the
server ahead of time can help in this task if it isn’t one you built yourself.
41. Why are internal threats oftentimes more successful than external threats?
When you see something day in and day out, even if it shocks you at first, you tend to get used to
it. This means that if you see somebody that pokes around day after day, month after month, you
might get used to the fact that he’s just curious. You let your guard down, and don’t react as
quickly to possible threats. On the other hand, say you have an annoyed employee that is soon to
be fired and wants to show his soon to be former employer that he can bring them down. So he
sells his still active credentials and key card to a local group that specializes in white-collar
crime. Still other infiltrators dress up as delivery people and wander around aimlessly in office
buildings, getting information off of post-it notes and papers lying around. External threats do
not have access to near this level of information about the company, and more often than not do
not get in as far as somebody that spent 20 bucks on a knock-off UPS uniform.
I’m going to let Ed Norton answer this one: “A new car built by my company leaves somewhere
traveling at 60 mph. The rear differential locks up. The car crashes and burns with everyone
trapped inside. Now, should we initiate a recall? Take the number of vehicles in the field, A,
multiply by the probable rate of failure, B, multiply by the average out-of-court settlement, C. A
times B times C equals X. If X is less than the cost of a recall, we don’t do one.” Residual risk is
what is left over after you perform everything that is cost effective to increase security, but to go
further than that is a waste of resources. Residual risk is what the company is willing to live with
as a gamble in the hopes that it won’t happen.
43. Why is deleted data not truly gone when you delete it?
When you press delete on a file, it doesn’t actually go anywhere. A bit on the file is flipped
telling the operating system that that file is no longer needed and it can be overwritten as is
required. Until that happens, the file can still be restored no matter if it’s in a Recycling Bin or
not. There are ways around this, such as using file shredders and disk wipers, but both of these
take quite a bit of time to finish their jobs to a reasonable degree.
When keeping track of data or equipment for use in legal proceedings, it needs to remain in a
pristine state. Therefore, documenting exactly who has had access to what for how long is vital
when dealing with this situation. Any compromise in the data can lead to legal issues for the
parties involved and can lead to a mistrial or contempt depending on the scenario.
45. How would you permanently remove the threat of data falling into the wrong
hands?
If data is on physical media such as a diskette, CD or even paper, there are shredders, pulverizers
and destroyers that can turn plastic and paper into confetti. For hard disks however, that becomes
a bit more tricky. Most locations will turn to a two-fold method for ensuring a disk’s destruction.
First, they’ll use a specially made disc-wiping program and take apart the hard drive, remove the
platters and scratch them up beyond recognition. Then they’ll degauss them with a high-powered
magnet. This ensures that the data cannot be recovered through conventional means.
Infiltration is the method by which you enter or smuggle elements into a location. Exfiltration is
just the opposite: getting sensitive information or objects out of a location without being
discovered. In an environment with high security, this can be extremely difficult but not
impossible. Again we turn to our friends in the fake delivery uniforms wandering around the
building, and see that, yes, there are ways to get in and out without a lot of issues.
47. I run an SMB. I have four people in my entire company and a web-based
store. I don’t have the time, patience or manpower to have a computer guy. Why
should I care about exploits and computer jibberish?
This is a classic catch-22 situation: a company doesn’t have enough money to secure their
networks, but by the same token they can’t afford a payout if they get compromised. At the same
time, they really can’t afford to have a dedicated computer technician, let alone a security
consultant. If you are able to explain (in words that don’t make it sound like you’re just
fearmongering), an SMB will acknowledge what they need to do to keep their store secure and
keep receiving payments, since following the money will tend to help move things along.
48. I’m the CEO of a Fortune 500 company. I make more in an afternoon than
you make in a year. I don’t care about this stupid security stuff. It just costs time
and money and slows everything down. Why should I care about this junk?
This one is significantly harder — they are used to having people lie, cheat and steal from them
on a regular basis, and when somebody comes in saying that the company is going to lose all this
money unless you pay for this, they’re probably going to say no. Therefore, having done your
homework and having the support of the local IT team instead of alienating them is vital.
Performing site assessments, creating executive summaries and line-by-line breakdowns of what
goes where can help them to better understand what is going to be done and keep the project
going.
49. I’m the legal council for a large corporation. We have requirements to
document assets and code changes. We have a very limited budget for this task.
How would you resolve this?
This is actually one of the easier ones. You have an informed party, asking for assistance to
something that is important. They have money for the project (albeit not much), but it is better
than nothing. At the very bottom of the spectrum, this could be accomplished in nothing more
than Excel with a lot of time and data entry, moving all the way up the chain to automated
network scanners documenting everything they find to a database and programs that check-in
and out programs with versioning and delta files. It all depends on how big the project is, and
how big the company is.
50. I’m the new guy. I used to be a coder at my old job and my manager wants
me to create some custom programs. I need domain administrator rights for this
task. My boss said it’s alright, and you either give me what I need or you’re fired
and I’ll find somebody that will. How do you respond?
Unfortunately, you will run into the hardball guy at least once in your career. In this case though,
like others we have run into, it’s time to move it up the chain to the manager. They will be able
to give the yay or nay depending on exactly what the project is and be able to take the brunt of an
attack if it comes.
• Reconnaissance: This is the first phase where the hacker attempts to collect as much
information as possible about the target.
• Scanning: This stage involves exploiting the information gathered during reconnaissance
phase and using it to examine the victim. The hacker can use automated tools during the
scanning phase which can include port scanners, mappers and vulnerability scanners.
• Gaining access: This is the phase where the real hacking takes place. The hacker now
attempts to exploit vulnerabilities discovered during the reconnaissance and scanning
phase to gain access.
• Maintaining access: Once access is gained, hackers want to keep that access for future
exploitation and attacks by securing their exclusive access with backdoors, rootkits and
trojans.
• Covering tracks: Once hackers have been able to gain and maintain access, they cover
their tracks and traces to avoid detection. This also allows them to continue the use of the
hacked system and avoid legal actions.
• Port scanning
• Vulnerability scanning
• Network scanning
• Open source footprinting: This technique will search for administrator contact
information, which can be later used for guessing the correct password in social
engineering.
• Network enumeration: This is when the hacker attempts to identify the domain names
and network blocks of the targeted
• Scanning: Once the network is known, the second step is to pry on the active IP
addresses on the network.
• Stack fingerprinting: This techinique should be the final footprinting step that takes
place once the port and host are mapped.
• Metasploit
• Wireshark
• NMAP
• Burp Suite
• OWASP ZAP
• Nikto
• SQLmap
• Proxy
• Spider
• Scanner
• Intruder
• Repeater
• Decoder
• Comparer
• Sequencer
Network sniffing is used for ethical as well as unethical purposes. Network administrators use
these as network monitoring and analysis tools to diagnose and prevent network-related
problems such as traffic bottlenecks. Cybercriminals use these tools for dishonest purposes such
as identity usurpation, email, sensitive data hijacking and more.
Enroll in an upcoming live online boot camp and earn your certification, guaranteed.
• Use packet filtering: Packet filters can filter out and block packets with conflicting source
address information.
• Avoid trust relationship: Organizations should develop a protocol that relies on trust
relationship as little as possible.
• Use ARP spoofing detection software: Some programs inspect and certify data before it
is transmitted and blocks data that is spoofed.
• Use cryptographic network protocols: ARP spoofing attacks can be mitigated by the use
of secure protocols such as SSH, TLS and HTTPS which send data encrypted before
transmission and after reception.
A sender or recipient publishes his public key. You use the public key to encrypt content and
your private key to sign the content. This is the standard form of communication with encryption
and signing.
Ping uses the ICMP protocol, which is a layer 3 protocol. Ping doesn’t use a port, so you will
want to note this is a trick question if asked.
This question is more of a preference, but many network security professionals know Linux
works well with security. For instance, Linux is better to know when working with routers. Be
honest with your answer and give pros and cons that relate to which one you prefer.
HTTP does not handle state natively. HTTP applications use cookies to handle the state of an
application. The developer can also store data in the web server’s session.
Cross-site scripting occurs when an attacker is able to inject executable code within JavaScript.
This is done through a hacked database or poorly scrubbed querystring variables.
Cross-site scripting has two types of attacks: reflected and stored. A stored XSS hack allows the
attacker to store malicious code within the database. The database content is served to the user
from the database and can be used in private pages behind a secure login to gain access to site
private data. The next is reflected, and this comes from the hacker sending the user a link that
runs JavaScript code within the pages directly from the querystring.
8. What are some ways that the company can defend against XSS?
First, programmers should defend against JavaScript added to a querystring. Also, remove
JavaScript from any input variables sent through online forms and stored in a database.
You can create a lockout policy that locks accounts when a user has too many login attempts.
Phishing is usually done through email, so you can block some SMTP servers and senders, and
educate users on phishing attempts.
An access control list. It is a list used to grant users and processes access to system resources.
It is used to control network traffic by determining what type of packets are allowed to pass
through.
A host based IDS (intrusion detection system) is used to monitor malicious activity. It is placed
on an individual host computer instead of a server.
Mandatory access control, discretionary access control and role-based access control. MAC uses
the operating system to prevent a user from accessing a particular target. DAC restricts access to
an object based on a user’s identity or group. RBAC denies or grants access based on a user’s
role.
Tunneling.
A software tool used for monitoring and examining contents of the network traffic.
A type of access control model which grants or denies access to resources based on ACL entries.
1) What is cybersecurity?
Cybersecurity refers to the protection of hardware, software, and data from attackers. The
primary purpose of cyber security is to protect against cyberattacks like accessing, changing, or
destroying sensitive information.
• Information security
• Network security
• Operational security
• Application security
• End-user education
• Business continuity planning
• It protects the business against ransomware, malware, social engineering, and phishing.
• It protects end-users.
• It gives good protection for both data as well as networks.
• Increase recovery time after a breach.
• Cybersecurity prevents unauthorized users.
4) Define Cryptography.
It is a technique used to protect information from third parties called adversaries. Cryptography
allows the sender and recipient of a message to read its details.
5) Differentiate between IDS and IPS.
Intrusion Detection System (IDS) detects intrusions. The administrator has to be careful while
preventing the intrusion. In the Intrusion Prevention System (IPS), the system finds the intrusion
and prevent it.
6) What is CIA?
7) What is a Firewall?
It is a security system designed for the network. A firewall is set on the boundaries of any system
or network which monitors and controls network traffic. Firewalls are mostly used to protect the
system or network from malware, worms, and viruses. Firewalls can also prevent content
filtering and remote access.
8) Explain Traceroute
It is a tool that shows the packet path. It lists all the points that the packet passes through.
Traceroute is used mostly when the packet does not reach the destination. Traceroute is used to
check where the connection breaks or stops or to identify the failure.
SSL stands for Secure Sockets Layer. It is a technology creating encrypted connections between
a web server and a web browser. It is used to protect the information in online transactions and
digital payments to maintain data privacy.
Data leakage is an unauthorized transfer of data to the outside world. Data leakage occurs via
email, optical media, laptops, and USB keys.
It is a trial-and-error method to find out the right password or PIN. Hackers repetitively try all
the combinations of credentials. In many cases, brute force attacks are automated where the
software automatically works to login with credentials. There are ways to prevent Brute Force
attacks. They are:
It is the technique for identifying open ports and service available on a specific host. Hackers use
port scanning technique to find information for malicious purposes.
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Black hat hackers are people who have a good knowledge of breaching network security. These
hackers can generate malware for personal financial gain or other malicious reasons. They break
into a secure network to modify, steal, or destroy data so that the network can not be used by
authorized network users.
White hat hackers or security specialist are specialized in penetration testing. They protect the
information system of an organization.
Grey hat hackers are computer hacker who sometimes violate ethical standards, but they do not
have malicious intent.
There are various ways to reset BIOS password. Some of them are as follows:
It is a protocol used for finding MAC address associated with IPv4 address. This protocol work
as an interface between the OSI network and OSI link layer.
It's a number of internet-connected devices like servers, mobile devices, IoT devices, and PCs
that are infected and controlled by malware.
TFA stands for Two Factor Authentication. It is a security process to identify the person who is
accessing an online account. The user is granted access only after presenting evidence to the
authentication device.
Symmetric encryption requires the same key for encryption and decryption. On the other hand,
asymmetric encryption needs different keys for encryption and decryption.
WAF stands for Web Application Firewall. WAF is used to protect the application by filtering
and monitoring incoming and outgoing traffic between web application and the internet.
A Hacker is a person who finds and exploits the weakness in computer systems, smartphones,
tablets, or networks to gain access. Hackers are well experienced computer programmers with
knowledge of computer security.
Network sniffing is a tool used for analyzing data packets sent over a network. This can be done
by the specialized software program or hardware equipment. Sniffing can be used to:
• Capture sensitive data such as password.
• Eavesdrop on chat messages
• Monitor data package over a network
Yong domains are easily infected with malicious software. You need to use DNS monitoring
tools to identify malware.
Salting is that process to extend the length of passwords by using special characters. To use
salting, it is very important to know the entire mechanism of salting. The use of salting is to
safeguard passwords. It also prevents attackers testing known words across the system.
For example, Hash("QxLUF1bgIAdeQX") is added to each and every password to protect your
password. It is called as salt.
SSH stands for Secure Socket Shell or Secure Shell. It is a utility suite that provides system
administrators secure way to access the data on a network.
SSL verifies the sender's identity, but it does not provide security once the data is transferred to
the server. It is good to use server-side encryption and hashing to protect the server against a data
breach.
• Black box testing: It is a software testing method in which the internal structure or
program code is hidden.
• White box testing: A software testing method in which internal structure or program is
known by tester.
Vulnerabilities refer to the weak point in software code which can be exploited by a threat actor.
They are most commonly found in an application like SaaS (Software as a service) software.
It is a process used in a network to make a connection between a local host and server. This
method requires the client and server to negotiate synchronization and acknowledgment packets
before starting communication.
39) Define the term residual risk. What are three ways to deal with risk?
It is a threat that balances risk exposure after finding and eliminating threats.
1. Reduce it
2. Avoid it
3. Accept it.
Data exfiltration refers to the unauthorized transfer of data from a computer system. This
transmission may be manual and carried out by anyone having physical access to a computer.
It is the process of checking exploitable vulnerabilities on the target. In web security, it is used to
augment the web application firewall.
Following are the common cyber-attacks which can be used by hackers to damage network:
• Malware
• Phishing
• Password attacks
• DDoS
• Man in the middle
• Drive-by downloads
• Malvertising
• Rogue software
In order to authenticate users, they have to provide their identity. The ID and Key can be used to
confirm the user's identity. This is an ideal way how the system should authorize the user.
46) Name the protocol that broadcast the information across all the devices.
Internet Group Management Protocol or IGMP is a communication protocol that is used in game
or video streaming. It facilitates routers and other communication devices to send packets.
Use cipher algorithm to protect email, credit card information, and corporate data.
Public Wi-Fi has many security issues. Wi-Fi attacks include karma attack, sniffing, war-driving,
brute force attack, etc.
Public Wi-Fi may identify data that is passed through a network device like emails, browsing
history, passwords, and credit card data.
Data encryption is a technique in which the sender converts the message into a code. It allows
only authorized user to gain access.
Diffie-Hellman is a protocol used while exchanging key between two parties while RSA is an
algorithm that works on the basis two keys called private and public key.
Remote Desktop Protocol (RDP) is developed by Microsoft, which provides GUI to connect two
devices over a network.
The user uses RDP client software to serve this purpose while other device must run RDP server
software. This protocol is specifically designed for remote management and to access virtual
PCs, applications, and terminal server.
Forward Secrecy is a security measure that ensures the integrity of unique session key in event
that long term key is compromised.
54) Explain the difference between stream cipher and block cipher.
• RCx
• Blowfish
• Rijndael (AES)
• DES
The full form of ECB is Electronic Codebook, and the full form of CBC is Cipher Block
Chaining.
Buffer overflow attack is an attack that takes advantage of a process that attempts to write more
data to a fixed-length memory block.
Spyware is a malware that aims to steal data about the organization or person. This malware can
damage the organization's computer system.
A virus is a malicious software that is executed without the user's consent. Viruses can consume
computer resources, such as CPU time and memory. Sometimes, the virus makes changes in
other computer programs and insert its own code to harm the computer system.
Microsoft Baseline Security Analyzer or MBSA is a graphical and command-line interface that
provides a method to find missing security updates and misconfigurations.
Ethical hacking is a method to improve the security of a network. In this method, hackers fix
vulnerabilities and weakness of computer or network. Ethical hackers use software tools to
secure the system.
67) Explain social engineering and its attacks.
Social engineering is the term used to convince people to reveal confidential information.
There are mainly three types of social engineering attacks: 1) Human-based, 2) Mobile-based,
and 3) Computer-based.
• Human-based attack: They may pretend like a genuine user who requests higher authority
to reveal private and confidential information of the organization.
• Computer-based attack: In this attack, attackers send fake emails to harm the computer.
They ask people to forward such email.
• Mobile-based attack: Attacker may send SMS to others and collect important
information. If any user downloads a malicious app, then it can be misused to access
authentication information.
IP Address is the acronym for Internet Protocol address. An internet protocol address is used to
uniquely identify a computer or device such as printers, storage disks on a computer network.
MAC Address is the acronym for Media Access Control address. MAC addresses are used to
uniquely identify network interfaces for communication at the physical layer of the network.
• Tcpdump
• Kismet
• Wireshark
• NetworkMiner
• Dsniff
Antivirus is software tool that is used to identify, prevent, or remove the viruses present in the
computer. They perform system checks and increase the security of the computer regularly.
• Protocol Sniffing
• Web password sniffing
• Application-level sniffing
• TCP Session stealing
• LAN Sniffing
• ARP Sniffing
It is an attack in which multiple computers attack website, server, or any network resource.
TCP session hijacking is the misuse of a valid computer session. IP spoofing is the most
common method of session hijacking. In this method, attackers use IP packets to insert a
command between two nodes of the network.
Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in
computer systems, web applications, servers, and networks. There are varieties of such tools
available on the market. Some of them are open source, while others are a commercial solution.
Honeypot is classified into two categories: 1) Production honeypot and 2) Research honeypot.
• RSA
• Twofish
• AES
• Triple DES
It is not right to send login credentials through email because if you send someone userid and
password in the mail, chances of email attacks are high.
This rule is based on the percentage of network traffic, in which 80% of all network traffic
should remain local while the rest of the traffic should be routed towards a permanent VPN.
It is a method used for a security breach in wireless networks. There are two types of WEP
cracking: 1) Active cracking and 2) Passive cracking.
• Aircrack
• WebDecrypt
• Kismet
• WEPCrack
Security auditing is an internal inspection of applications and operating systems for security
flaws. An audit can also be done via line by line inspection of code.
It is a technique used to obtain a username, password, and credit card details from other users.
Nano encryption is a research area which provides robust security to computers and prevents
them from hacking.
Security Testing is defined as a type of Software Testing that ensures software systems and
applications are free from any vulnerabilities, threats, risks that may cause a big loss.
Security scanning involves identifying network and system weaknesses and later provides
solutions for reducing these risks. This scanning can be performed for both Manual as well as
Automated scanning.
• Acunetix
• WebInspect
• Probably
• Netsparker
• Angry IP scanner:
• Burp Suite
• Savvius
• Financial sectors like stock trading exchanges, investment banking, want their data to be
secured, and penetration testing is essential to ensure security.
• In case if the software system is already hacked and the organization would like to
determine whether any threats are still present in the system to avoid future hacks.
Security threat is defined as a risk which can steal confidential data and harm computer systems
as well as organization.
A physical threat is a potential cause of an incident that may result in loss or physical damage to
the computer systems.
Trojan is a malware employed by hackers and cyber-thieves to gain access to any computer.
Here attackers use social engineering techniques to execute the trojan on the system.
It is an attack that poisons malicious SQL statements to database. It helps you to take benefit of
the design flaws in poorly designed web applications to exploit SQL statements to execute
malicious SQL code. In many situations, an attacker can escalate SQL injection attack in order to
perform other attack, i.e. denial-of-service attack.
98) List security vulnerabilities as per Open Web Application Security Project (OWASP).
Security vulnerabilities as per open web application security project are as follows:
• SQL Injection
• Cross-site request forgery
• Insecure cryptographic storage
• Broken authentication and session management
• Insufficient transport layer protection
• Unvalidated redirects and forwards
• Failure to restrict URL access
An access token is a credential which is used by the system to check whether the API should be
granted to a particular object or not.
ARP (Address Resolution Protocol) Poisoning is a type of cyber-attack which is used to convert
IP address to physical addresses on a network device. The host sends an ARP broadcast on the
network, and the recipient computer responds back with its physical address.
ARP poisoning is sending fake addresses to the switch so that it can associate the fake addresses
with the IP address of a genuine computer on a network and hijack the traffic.
• Trojans
• Adware
• Worms
• Spyware
• Denial of Service Attacks
• Distributed Denial of Service Attacks
• Virus
• Key loggers
• Unauthorized access to computer systems resources
• Phishing
Nmap is a tool which is used for finding networks and in security auditing.
EtterPeak is a network analysis tool that is used for sniffing packets of network traffic.
There are two types of cyberattacks: 1) Web-based attacks, 2) System based attacks.
Some web-based attacks are: 1) SQL Injection attacks, 2) Phishing, 3) Brute Force, 4) DNS
Spoofing, 4) Denial of Service, and 5) Dictionary attacks.
• Virus
• Backdoors
• Bots
• Worm
There are four types of cyber attackers. They are: 1) cybercriminals, 2) hacktivists, 3) insider
threats, 4) state-sponsored attackers.
They are threats that are accidently done by organization employees. In these threats, an
employee unintentionally deletes any file or share confidential data with outsiders or a business
partner going beyond the policy of the company.
Answer: Security testing can be considered as the most important in all types of software testing.
Its main objective is to find vulnerabilities in any software (web or networking) based
application and protect their data from possible attacks or intruders.
As many applications contain confidential data and need to be protected from being leaked.
Software testing needs to be done periodically on such applications to identify threats and to take
immediate action on them.
Answer: Vulnerability can be defined as the weakness of any system through which intruders or
bugs can attack the system.
If security testing has not been performed rigorously on the system then chances of
vulnerabilities get increased. Time to time patches or fixes is required to prevent a system from
the vulnerabilities.
Answer: Intrusion detection is a system which helps in determining possible attacks and deal
with it. Intrusion detection includes collecting information from many systems and sources,
analysis of the information and finding the possible ways of the attack on the system.
• Possible attacks
• Any abnormal activity
• Auditing the system data
• Analysis of different collected data, etc.
Answer: SQL Injection is one of the common attacking techniques used by hackers to get
critical data.
Hackers check for any loophole in the system through which they can pass SQL queries, bypass
the security checks, and return back the critical data. This is known as SQL injection. It can
allow hackers to steal critical data or even crash a system.
SQL injections are very critical and need to be avoided. Periodic security testing can prevent this
kind of attack. SQL database security needs to be defined correctly and input boxes and special
characters should be handled properly.
1. Authentication
2. Authorization
3. Confidentiality
4. Availability
5. Integrity
6. Non-repudiation
7. Resilience
Answer: XSS or cross-site scripting is a type of vulnerability that hackers used to attack web
applications.
It allows hackers to inject HTML or JAVASCRIPT code into a web page that can steal the
confidential information from the cookies and returns to the hackers. It is one of the most critical
and common techniques which needs to be prevented.
SSL session can be defined as an association between client and server generally created by the
handshake protocol. There are a set of parameters defined and it may be shared by multiple SSL
connections.
The main purpose of this testing is to prevent a system from any possible attacks. Penetration
testing can be done in two ways –White Box testing and Black box testing.
In white-box testing, all the information is available with the testers whereas in black box testing,
testers don’t have any information and they test the system in real-world scenarios to find out the
vulnerabilities.
• Security breaches and loopholes in the systems can be very costly as the threat of attack
is always possible and hackers can steal important data or even crash the system.
• It is impossible to protect all the information all the time. Hackers always come with new
techniques to steal important data and it is necessary for testers as well to perform
periodical testing to detect the possible attacks.
• Penetration testing identifies and protects a system by the above-mentioned attacks and
helps organizations to keep their data safe.
Q #10) Name the two common techniques used to protect a password file?
Answer: Two common techniques to protect a password file is- hashed passwords and a salt
value or password file access control.
Answer: ISO/IEC 17799 is originally published in the UK and defines best practices for
Information Security Management. It has guidelines for all organizations small or big for
Information security.
Q #13) List down some factors that can cause vulnerabilities?
1. Design flaws: If there are loopholes in the system that can allow hackers to attack the
system easily.
2. Passwords: If passwords are known to hackers they can get the information very easily.
Password policy should be followed rigorously to minimize the risk of password steal.
3. Complexity: Complex software can open doors on vulnerabilities.
4. Human Error: Human error is a significant source of security vulnerabilities.
5. Management: Poor management of the data can lead to the vulnerabilities in the system.
Q #15) List down the seven main types of security testing as per Open Source Security
Testing methodology manual?
Answer: The seven main types of security testing as per the Open Source Security Testing
methodology manual are:
Answer: SOAP or Simple Object Access Protocol is an XML-based protocol through which
applications exchange information over HTTP. XML requests are sent by web services in SOAP
format then a SOAP client sends a SOAP message to the server. The server responds back again
with a SOAP message along with the requested service.
Web Services Description Language (WSDL) is an XML formatted language used by UDDI.
“Web Services Description Language describes Web services and how to access them”.
Answer: This kind of attack uses forceful browsing with the URL manipulation attack. Hackers
can manipulate the parameters in URL string and can get the critical data which generally does
not open for the public such as achieved data, old version or data which is under development.
Q #19) List the benefits that can be provided by an intrusion detection system?
Answer: HIDS or Host Intrusion Detection system is a system in which a snapshot of the
existing system is taken and compared with the previous snapshot. It checks if critical files were
modified or deleted then an alert is generated and sent to the administrator.
1. Cardholder
2. Merchant
3. Issuer
4. Acquirer
5. Payment gateway
6. Certification authority
Answer: URL manipulation is a type of attack in which hackers manipulate the website URL to
get the critical information. The information is passed in the parameters in the query string via
HTTP GET method between client and server. Hackers can alter the information between these
parameters and get the authentication on the servers and steal the critical data.
In order to avoid this kind of attack security testing of URL manipulation should be done.
Testers themselves can try to manipulate the URL and check for possible attacks and if found
they can prevent these kinds of attacks.
Answer: Secure Sockets Layer protocol or SSL is used to make secure connections between
clients and computers.
Answer: Ports are the point where information goes in and out of any system. Scanning of the
ports to find out any loopholes in the system is known as Port Scanning. There can be some
weak points in the system to which hackers can attack and get the critical information. These
points should be identified and prevented from any misuse.
Answer: A cookie is a piece of information received from a web server and stored in a web
browser which can be read anytime later. A cookie can contain password information, some
auto-fill information and if any hackers get these details it can be dangerous
• Session Cookies – These cookies are temporary and last in that session only.
• Persistent cookies – These cookies stored on the hard disk drive and last till its expiry or
manual removal of it.
Answer: Honeypot is a fake computer system that behaves like a real system and attracts
hackers to attack it. Honeypot is used to find out loopholes in the system and to provide a
solution for these kinds of attacks.
1. Session identifier
2. Peer certificate
3. Compression method
4. Cipher spec
5. Master secret
6. Is resumable
Ans: In simple words, Information Security is a practice to secure information from any
unauthorized access. ISO/IEC 27000:2009 defined this term as “Preservation of confidentiality,
integrity, and availability of information. Note: Also, other properties, such as authenticity,
accountability, non-repudiation, and reliability, can also be involved.”
Ans: Penetration Testing is important for identifying vulnerabilities in an IT system from outside
the network. Generally, It is an activity done after vulnerability assessment. In simple words, you
can say, by doing Penetration testing, security analysts are attempting to gain access to resources
without knowledge of usernames, passwords, and other normal means of access. You can only
differentiate hackers from security experts is the permission given by the organization.
Ans: As explained by OWASP, “Cross-Site Scripting (XSS) attacks are a type of injection, in
which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks
occur when an attacker uses a web application to send malicious code, generally in a browser-
side script, to a different end-user. Flaws that allow these attacks to succeed are quite widespread
and occur anywhere a web application uses input from a user within the output it generates
without validating or encoding it.”
Ans: The major difference between symmetric and asymmetric cryptography is using the single
key for encryption and decryption in case of symmetric cryptography during the use of the public
and private key for encryption and decryption in case of asymmetric cryptography.
Ans: Vulnerability is a term that every information security expert wants to eradicate from the IT
system. If someone exploited those vulnerabilities, it might result in an intentional or
unintentional compromise of a system.
Q7. Discuss a recent project of pen test which you have done?
Ans: To answer this question, you can start with the last project you have done in a pen test
field. Also, mention your approach, which tools you have used, which vulnerabilities you have
found, and how you help the developer to fix those issues.
Q8. What are the strengths and differences between Windows and Linux?
Ans:
Linux Windows
Price Available Free Paid
Ease Of Use Little difficult for beginners User-friendly
Reliability more reliable and secure less reliable and secure
less reliable software available for install both
available for install both paid and free
and secure paid and free
mostly commercial software
Software Cost most software available for free
available
In beginning, hardware compatibility was
Hardware compatibility never an
Hardware an issue. But now, the majority of physical
issue for Windows
appliance support Linux
As this OS used by the novice user,
Security Highly secure Operating System
it is vulnerable to hackers
Microsoft support available online
Community support available online for
Support and also many books published to
rectifying any issue
diagnosed any issue.
Used mainly by novice users,
Used mainly by corporate, scientific and
Use Cases gamers, corporates etc. where more
educational institute
skills are not required
Showing 1 to 9 of 9 entries
PreviousNext
Q9. What kind of penetration can be done with the Diffie Hellman exchange?
Q10. What type of tools are there out there for packet sniffing?
Ans: Packet Sniffing is a process of capture network traffic and able to see traffic on an entire
network or only a certain segment of it with the help of packet sniffing tool, depending on how
the network switches are configured, placed, etc. The most popular packet sniffing tool available
free is Wireshark.
Q11. How will you protect the data during and after Penetration Testing?
Ans: Pen Tester clearly specified policy regarding the finding of user data while testing. The
policy tells what to do if any data encountered during and after testing. However, Backup is a
must to avoid any loss of data.
Ans: Intrusion Detection, as the name suggests, it protects IT infrastructure from any cyber
attack. It identifies security breaches from both outsides and within a network. Intrusion
Detection performs a wide variety of functions, including monitoring and analyzing traffic,
recognizing the pattern of attack, checking the integrity of files in servers, checking if any policy
violation happens, etc.
Q14. List down some factors that can cause security vulnerabilities.
Ans: There are many factors involved in security vulnerabilities. Some of them are listed below:
• The web application is not doing input validation
• Weak passwords
• The session id is not changing after login
• Sensitive data stored in clear text
• Errors reveal sensitive information about infrastructure
• Software installed not updated
Ans: The session identifier, peer certificate, compression method, cipher spec, master secret, and
Is resumable are the parameters that define SSL session connection.
Q16. List the benefits that can be provided by an intrusion detection system.
Ans: It is an attack in which an attacker inserts untrusted data in the application that results in
revealing sensitive information of the database.
Ans: SSL/TLS layer provides confidentiality and integrity while data is transmitting from source
to destination.
Steps involved:
1. The user initiates the connection by typing the website address. The browser initiates
SSL/TLS communication by sending a message to the website’s server.
2. The website’s server sends back the public key or certificate to the user’s browser.
3. User’s browser checks for public key or certificate. If it is ok, it creates a symmetric key
and sends it back to the website’s server. If the certificate is not ok, the communication
fails.
4. On receiving the symmetric key, the website’s server sent the key and encrypted the
requested data.
5. The user’s browser decrypts the content using a symmetric key, which completes the
SSL/TLS handshake. The user can see content as now connection is established.
Q19. What is the difference between Vulnerability Scan, Risk Analysis, and Penetration
Test?
Ans:
Show
entries
Vulnerability
Parameter Penetration Testing Risk Analysis
Scan
Test for exploitability of Analysis of cost/benefit if the
Check for known vulnerabilities and test for how vulnerability is not fixed. It
Activity vulnerabilities in much data leak if an attacker also involves calculation of
configuration successfully exploits the loss incurred on any security
vulnerability. breach.
It requires a skilled person
Minimal as many Difficult to find all possible
Skill who knows IT, statistics,
tools available vulnerabilities and exploit them
finance, and probabilities.
Major Nikto, Nessus,
Metaspoilt, Qualys Difficult to automate
tools OpenVAS
PreviousNext
Q20. What network controls would you recommend to strengthen the network security of
an organization?
Ans: These top network controls help in strengthing network security of an organization:
Ans: As a penetration tester, you need to use the high processing computer system and many
penetration testing tools. Use virtual machines on your desktop and install operating systems
such as Windows XP, Windows Server 2008, Windows Server 2012, Ubuntu, etc. to test the
configurations. I am listing some tools below, which we can use for penetration testing.
• Usage of default or weak passwords in network components such as the router, firewall,
etc., and different servers.
• Missing security patches in software running on different network components and
different servers.
• Misconfigured network firewall.
• Use of infected USB drives by network professionals in data centers.
• The data backup policy is not implemented properly.
Q23. What are the common ports to focus on during penetration testing?
Ans: You can use the Nmap tool for the port scan. Here is a list of common ports to focus on
during penetration testing:
Q24. Do you hire criminals for a pen test? Aren’t former “black hats” the best penetration
testers?
Ans: This interview question is related to ethics. You can definitely hire a former “black hats”
for penetration testing by doing proper verification checks. An organization can decide regarding
the hiring of individuals based on company policies.
Q26. We received a Penetration Test proposal that was quoted significantly lower than
other proposals we received – why is that?
Ans: Charges of penetration testing varies from company to company. Generally, quotation of
penetration testing charges based on the salary of security tester, charges of tools used, size of
the project, etc. Also, some infosec organization charges less than others based on competition in
the market.
Ans: Here, give information regarding your penetration testing projects which you have
performed in your previous organization. You can also mention the major vulnerabilities and
tools used which you have found.
Ans: It depends on many factors such as the size of the project, skill of penetration tester, the
technology used, etc.
Ans: Here, you can mention your experience in performing penetration testing jobs.
Ans: Every system has some security vulnerability- it may be known or unknown by researchers.
No system is full proof so if proper penetration testing performs, any system can be break by the
security analyst. If the system is more secure, the security analyst will take more time to break
and vice-versa. Time may vary from some days to months.
Ans: Certifications are just additional qualifications of a penetration tester. But certifications are
not proof of skills of the tester. Some professionals don’t have any certification, but still, they are
best in their job. Certifications which are beneficial for penetration tester are EC-Council
Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP) and GIAC
Exploit Researcher & Advanced Penetration Tester (GXPN).
Ans: Even data is stored in the cloud, penetration testing is still essential to see whether your
data is secure or not.
Q34. What types of systems have you performed penetration testing on?
Ans: Penetration testing performed on servers, endpoints, web applications, mobile devices,
wireless networks, network devices, cloud services and other potential targets of exposure.
Q35. How often should an organization have a penetration test performed by a third-
party?
Ans: It depends on the criticality of the organization’s data hosted on the system. If data is more
sensitive, the frequency of penetration testing should be more and vice-versa.
Ans: It may cause disruption of services if penetration tester successfully exploits the
vulnerabilities. To minimize disruption, keep your client informed and also stop the testing if
required.
Ans: Risk management strategy is a process of identifying, accessing, and managing the risk in
the system. Penetration testing is an assessment of the IT system from the perspective of a
hacker. This activity gives confidence to management that the company’s IT assets are secure.
Ans: Penetration testing started only after detailed discussion regarding targets with the
management of the company. The legal agreement also signed between pen-testing agency and
company and mention all IP address which are in the scope of the test.
Q39. We have a firewall in place. Do we still need network penetration testing if we have a
Firewall?
Ans: Firewall is used for analyzing traffic and blocks it based on predetermined configuration.
While penetration testing checks for exploitability of IT assets including the firewall. Penetration
testing is a necessary activity even with all the network components in place.
Ans: Generally organizations have their own security teams to manage the cybersecurity-related
operations. But still, third-party penetration testing is recommended to build confidence in
management and takes advantage of the experience of other organizations in identifying new
vulnerabilities in the system.
Ans: Generally, social engineering is not in the scope of penetration testing. But nowadays
some organizations do consider the social engineering aspect while doing pen-testing.
Q42. Are Denial-of-service attacks also tested?
Ans: Denial-0f-service (DoS) attacks are also within the scope of penetration testing. Many tools
are available to see whether the system is vulnerable to DoS attacks or not.
Q43. Why should not only the network perimeter be tested, but also the internal network?
Ans: Internal network also vulnerable to some type of attack. It is advisable that the scope is not
just internet-facing servers, other internal servers also should be in scope.
Ans: Time estimate depends on the number of IT devices, and experience of the tester, the time
required for fixing of security issues by developers, etc.
Ans: Penetration testing started only when there is an agreement signed by the organization and
pen testing agency. In an agreement, the list of targets explicitly mentioned which are the scope
of pen-testing. Testers advised not to test any other target outside the scope.
Ans: OpenPGP is the most popularly used email encryption standard. Both open source such
as Gpg4win, and many commercial tools available that support the OpenPGP type of encryption.
Ans: Good pen tester generally do a lot of scripting in Python, Perl, shell, etc. to automate tasks.
Ans: Threat model is a process of analyzing the application or IT system in terms of security. In
simple terms, it helps in identify, quantify, and address the security risk available in the system.
Ans: STRIDE is an acronym for the threat modeling system. It helps in categorizing all
cyberattacks into the below techniques:
• Spoofing
• Tampering
• Repudiation
• Information disclosure
• Denial of service (DoS)
• Elevation of privilege
Q50. What is file enumeration?
Ans: File enumeration, also called forced browsing, is a directory traversal technique when a
security analyst access those files and folders which are not linked by an application.
Answer:
Penetration Testing is also called Pen Testing and is a kind of cyber attack on a web application
or a system which can be of good or bad intent. In terms of bad intent, it is a kind of cyber attack
on a system to steal some kind of secure, confidential and sensitive information. In terms of good
intent, it is a kind of checking the strengths and weaknesses of a system to vulnerabilities and
external attacks and the strength of security levels it can handle.
Answer:
This is the common Penetration Testing Interview Questions asked in an interview. The
advantages of performing Penetration Testing on a System are –
1. It will help in detecting the security threats and vulnerabilities of a system or web application.
2. It will help in monitoring the necessary standards to evade some.
3. It is helpful in reducing the downtime of the application in case of diverting large amounts of
traffic to the network by penetrating into the application.
4. It protects the organizations confidential and secured information and maintains the brand
image or value.
5. It is important in securing the application to avoid huge financial losses.
6. Focuses more on business continuity.
7. Maintains trust among the customers.
Answer:
There are different stages of performing penetration testing on a target system or web application
such as Planning and reconnaissance, Scanning, Gaining access, Maintaining access, Analysis
and configuration:
1. Planning and Reconnaissance: In this stage analysis and testing the goals to carry out are
performed and the information is gathered.
2. Scanning: In this stage, any kind of scanning tool is used to test the responsiveness of a target
system in the case of intruder penetration.
3. Gaining Access: In this stage, penetration or intruder attack will be executed and web
applications are attacked to disclose the possible vulnerabilities of the system.
4. Maintaining Access: In this, stage the gained access will be maintained carefully to identify the
vulnerabilities and weakness of the system.
5. Analysis and Configuration: In this stage, the results obtained from the maintained access will
be used to configure Web Application Firewall settings also.
Let us move to the next Penetration Testing Interview Questions.
Answer:
The below is the list of few requirements of Scrum but are not exhausted :
1. It requires User Stories to describe the requirement and track the completion status of the
assigned user story to the team member whereas Use Case is the older concept.
2. A name is required is it describes a sentence as a single line overview to give the simple
explanation of the User Story.
3. A description is required as it gives a high-level explanation of the requirement to be met by the
assignee.
4. Documents or attachments are also required to know about the story. For eg. In the case of any
change in User Interface Screen Layout, that can be easily known only by having a look at the
Wire Frame or Prototype of the Screen model. This can be attached to the board using the
attachment option.
Answer:
The different penetration testing methods are External Testing, Internal Testing, Blind Testing,
Double-Blind Testing, and Targeted Testing. External Testing is a form of testing on the internet
sites those are publicly visible and email applications and DNS servers etc., Internal Testing is a
kind of testing which will penetrate into the internal applications of the system through a form of
phishing or internal attacks. Blind Testing is a form of penetrating into the application based on
its name in the form of a real-time possibility. Double Blind Testing is a form of testing where
even the name of the application is also unknown and even the security professional will be
having any idea in executing on a particular target and Targeted Testing is a form of performing
testing from both the security professional and tester together in the form of targeting on each
other.
Let us now have a look at the advanced Penetration Testing Interview Questions.
Answer:
Cross Site Scripting is a type of attack in the form of injections into a web application or system.
In this case, different types of malicious scripts are injected into a weak system to acquire
confidential information or hack the system without the knowledge of the administrator of the
system.
Q7. What is Intruder Detection?
Answer:
Intruder Detection mechanism will help in detecting the possible attacks those happened by
scanning the existing files in the form of records in the file system of the application. This will
help the organization to detect the attacks early on their system applications.
Answer:
SQL injection is a form of attack in which the attacker injects data into an application which will
result in executing the queries to retrieve the sensitive information from the database that results
in the data breach.
Answer:
This is the popular Penetration Testing Interview Questions asked in an interview. It is Secure
Socket Layer / Transport Layer Security which are standard security protocols to establish
encryption between a web server and a web browser.
Answer:
Following are the different open source penetration testing tools:
1. Wireshark
2. Metasploit.
3. Nikto.
4. NMap.
5. OpenVAS.
Conducting tests such as penetration testing can help a company understand how secure their
information is and fortify loopholes. The security of every info coming in and going out of your
software must be guaranteed before launching it to the general public.
2. Explain the Advantages of Penetration Testing
As briefly explained earlier, penetration testing helps a company stay prepared against hackers
and security breaches by exposing security loopholes and unforeseen errors that were not
identified during the development process. It gives a company extra protection against possible
future attacks.
Penetration testing guarantees all the information within the software by ensuring that the data
bank is secured. Apart from protection against hackers’ attacks, penetration testing helps a
company quickly identify other errors such as bugs, viruses, glitches, etc.
Firstly, encryption is changing the order of data’s appearance from its original format to keep out
intrusion from those who do not have the clearance to access the data. Symmetric encryption
involves the use of a single encryption and decryption pass key. One password can both encrypt
and decrypt the data in such cases, and both the owner and end-user share the same key.
In asymmetric encryption, the software owners have a private passkey while the end-users have a
public pass key. This is to segregate high-level data that the public cannot access from available
data.
In some cases, individuals without ulterior motives may stumble upon such vulnerabilities, and
they may mistakenly expose intellectual properties, private information, or merely the data bank.
A vulnerable software must undergo penetration testing to ascertain all the vulnerabilities.
It is important not to push the candidate to reveal any non-disclosure agreement signed with a
previous employer. The candidate’s experience level should give you an idea of what he/ she will
bring to your company if hired.
12. Explain the Tools You Will Use for Penetration Testing
Penetration testing requires high-level computer systems, operating systems, graphic cards, and
certain software that can be used for high-level hacking. Some of the effective tools every
penetration tester should have include:
• Burp suite (both the free and commercial versions are available);
• Nessus (both free and commercial versions are available); Wireshark (open source);
• Metasploit (open source);
• NMap (open source);
• OpenVAS (open source);
• Nikto (open source);
• OWASP ZAP (open source).
Some of these tools require extensive training, and some come with certifications.
Although, in some cases, certifications can be an added advantage; however, further inquiries
have proved that many candidates without any certification can be better than those with
certificates. It is better to dwell on asking a candidate for more details concerning carrying out
actual tests. If the candidate has some certifications, you can then probe deeper by asking him/
her more questions concerning the certificate to know if it will add value to your intended
penetration test.
Source: DataFlair
Of course! The fact that all your data is in the cloud does not mean that they cannot be hacked
into. No matter how secure you feel that your software is, you have to put it through rigorous
penetration testing. Ethical hackers have to mimic the fraudulent hackers out there to prepare and
fortify your software against the worst possible attack. The most recent hacks are taking place
via the cloud. Thus, online storage can also be vulnerable.
Anything that can be hacked can and should go through penetration testing to attain a higher
level of security. In the course of this article, we may use the term system, software, or product
when describing platforms on which penetration testing can be carried out.
Change is constant, and therefore the dangers posed today might not be the dangers faced
tomorrow, this is why penetration testing should be carried out routinely. It’s a continuous
process that never ends as long as the product remains active.
Penetration testing involves various effective techniques. One of the most effective tactics
involves the following phases:
Vulnerability (weakness) is a gap in the protection efforts of a system, a threat is an attacker who
exploits that weakness. Risk is the measure of potential loss when that the vulnerability is
exploited by the threat e.g. Default username and password for a server – An attacker can easily
crack into this server and compromise it (Here's a resource that will navigate you through cyber
security attacks).
2. What is the difference between Asymmetric and Symmetric encryption and which one is
better?
TIP: Keep the answer simple as this is a vast topic.
Symmetric encryption uses the same key for both encryption and decryption, while Asymmetric
encryption uses different keys for encryption and decryption.
Symmetric is usually much faster but the key needs to be transferred over an unencrypted
channel.
Asymmetric on the other hand is more secure but slow. Hence, a hybrid approach should be
preferred. Setting up a channel using asymmetric encryption and then sending the data using
symmetric process.
IDS is an intrusion detection system whereas an IPS is an intrusion prevention system. IDS will
just detect the intrusion and will leave the rest to the administrator for further action whereas an
IPS will detect the intrusion and will take further action to prevent the intrusion. Another
difference is the positioning of the devices in the network. Although they work on the same basic
concept but the placement is different.
Cross site scripting is a JavaScript vulnerability in the web applications. The easiest way to
explain this is a case when a user enters a script in the client side input fields and that input gets
processed without getting validated. This leads to untrusted data getting saved and executed on
the client side.
Countermeasures of XSS are input validation, implementing a CSP (Content security policy) etc
(Also consider checking out this career guide for cissp certification).
TIP: Know the different types of XSS and how the countermeasures work.
Point 1: Encryption is reversible whereas hashing is irreversible. Hashing can be cracked using
rainbow tables and collision attacks but is not reversible.
Although this is not something an information security guy is expected to know but the
knowledge of HTML, JavaScript and Python can be of great advantage. HTML and JavaScript
can be used in web application attacks whereas python can be used to automate tasks, exploit
development etc. A little knowledge of the three can be of great advantage - both in the interview
and on the floor.
7. What is CSRF?
Cross Site Request Forgery is a web application vulnerability in which the server does not check
whether the request came from a trusted client or not. The request is just processed directly. It
can be further followed by the ways to detect this, examples and countermeasures.
Black hat hackers are those who hack without authority. White hat hackers are authorised to
perform a hacking attempt under signed NDA. Grey hat hackers are white hat hackers which
sometimes perform unauthorised activities.
A firewall is a device that allows/blocks traffic as per defined set of rules. These are placed on
the boundary of trusted and untrusted networks.
11. How do you keep yourself updated with the information security news?
TIP: Just in case you haven't followed any: the hacker news, ThreatPost, Pentest mag etc.
Be sure to check and follow a few security forums so that you get regular updates on what is
happening in the market and about the latest trends and incidents.
12. The world has recently been hit by ……. Attack/virus etc. What have you done to
protect your organisation as a security professional?
Different organisations work in different ways, the ways to handle incident is different for all.
Some take this seriously and some not. The answer to this should be the process to handle an
incident. Align this with one you had and go on… just don’t exaggerate.
Port scanning is process of sending messages in order to gather information about network,
system etc. by analysing the response received.
17. What are the objects that should be included in a good penetration testing report?
A VAPT report should have an executive summary explaining the observations on a high level
along with the scope, period of testing etc. This can be followed by no of observations, category
wise split into high, medium and low. Also include detailed observation along with replication
steps, screenshots of proof of concept along with the remediation.
Keep this simple and relevant, getting a security certification can be one personal achievement.
Explain how it started and what kept you motivated. How you feel now and what are your next
steps.
In case you can’t ping the final destination, tracert will help to identify where the connection
stops or gets broken, whether it is firewall, ISP, router etc.
DDoS stands for distributed denial of service. When a network/server/application is flooded with
large number of requests which it is not designed to handle making the server unavailable to the
legitimate requests. The requests can come from different not related sources hence it is a
distributed denial of service attack. It can be mitigated by analysing and filtering the traffic in the
scrubbing centres. The scrubbing centres are centralized data cleansing station wherein the traffic
to a website is analysed and the malicious traffic is removed.
WAF stands for web application firewall. It is used to protect the application by filtering
legitimate traffic from malicious traffic. WAF can be either a box type or cloud based.
A basic web architecture should contain a front ending server, a web application server, a
database server.
Patch should be managed as soon as it gets released. For windows – patches released every
second Tuesday of the month by Microsoft. It should be applied to all machines not later than 1
month. Same is for network devices, patch as soon as it gets released. Follow a proper patch
management process.
Various security objects are governed with the help of KPI (Key Performance Indicators). Let us
take the example of windows patch, agreed KPI can be 99%. It means that 99% of the PCs will
have the latest or last month’s patch. On similar lines various security objects can be managed.
As security policy defines the security objectives and the security framework of an organisation.
A process is a detailed step by step how to document that specifies the exact action which will be
necessary to implement important security mechanism. Guidelines are recommendations which
can be customised and used in the creation of procedures.
Check the policy for the AV and then the alert. If the alert is for a legitimate file then it can be
whitelisted and if this is malicious file then it can be quarantined/deleted. The hash of the file can
be checked for reputation on various websites like virustotal, malwares.com etc. AV needs to be
fine-tuned so that the alerts can be reduced.
When the device generated an alert for an intrusion which has actually not happened: this is false
positive and if the device has not generated any alert and the intrusion has actually happened,
this is the case of a false negative.
False positives are more acceptable. False negatives will lead to intrusions happening without
getting noticed.
Software testing just focuses on the functionality of the software and not the security aspect. A
penetration testing will help identify and address the security vulnerabilities.
33. What are your thoughts about Blue team and red team?
Red team is the attacker and blue team the defender. Being on the red team seems fun but being
in the blue team is difficult as you need to understand the attacks and methodologies the red team
may follow.
Both are fine, just support your answer like Bug Bounty is decentralised, can identify rare bugs,
large pool of testers etc.
Web server hardening is filtering of unnecessary services running on various ports and removal
of default test scripts from the servers. Although web server hardening is a lot more than this and
usually organisations have a customised checklist for hardening the servers. Any server getting
created has to be hardened and hardening has to be re-confirmed on a yearly basis. Even the
hardening checklist has to be reviewed on a yearly basis for new add-ons.
37. What is data leakage? How will you detect and prevent it?
Data leak is when data gets out of the organisation in an unauthorised way. Data can get leaked
through various ways – emails, prints, laptops getting lost, unauthorised upload of data to public
portals, removable drives, photographs etc. There are various controls which can be placed to
ensure that the data does not get leaked, a few controls can be restricting upload on internet
websites, following an internal encryption solution, restricting the mails to internal network,
restriction on printing confidential data etc.
Data needs to be segregated into various categories so that its severity can be defined, without
this segregation a piece of information can be critical for one but not so critical for others. There
can be various levels of data classification depending on organisation to organisation, in broader
terms data can be classified into:
• Top secret – Its leakage can cause drastic effect to the organisation, e.g. trade secrets etc.
• Confidential – Internal to the company e.g. policy and processes.
• Public – Publically available, like newsletters etc.
39. In a situation where a user needs admin rights on his system to do daily tasks, what
should be done – should admin access be granted or restricted?
Users are usually not provided with admin access to reduce the risk, but in certain cases the users
can be granted admin access. Just ensure that the users understand their responsibility. In case
any incident happens, the access should be provided for only limited time post senior
management approval and a valid business justification.
41. What are the various ways by which the employees are made aware about information
security policies and procedures?
• Employees should undergo mandatory information security training post joining the
organisation. This should also be done on yearly basis, and this can be either a classroom
session followed by a quiz or an online training.
• Sending out notifications on regular basis in the form of slides, one pagers etc. to ensure
that the employees are kept aware.
42. In a situation where both Open source software and licensed software are available to
get the job done. What should be preferred and why?
TIP: Think from a security perspective and not from the functionality point.
For an enterprise, it is better to go for the licensed version of the software as most of the software
have an agreement clause that the software should be used for individual usage and not for
commercial purpose. Plus, the licensed version is updated and easy to track in an organisation. It
also helps the clients develop a confidence on the organisations’ software and practices.
There is no fixed time for reviewing the security policy but all this should be done at least once a
year. Any changes made should be documented in the revision history of the document and
versioning. In case there are any major changes the changes need to be notified to the users as
well.
44. What all should be included in a CEO level report from a security standpoint?
Risk can be reported but it needs to be assessed first. Risk assessment can be done in 2 ways:
Quantitative analysis and qualitative analysis. This approach will cater to both technical and
business guys. The business guy can see probable loss in numbers whereas the technical guys
will see the impact and frequency. Depending on the audience, the risk can be assessed and
reported.
Not sure if the data is secure or not but users can take steps from their end to ensure safety.
For legal cases the data/device (evidence) needs to be integrated, hence any access needs to be
documented – who, what when and why. Compromise in this process can cause legal issues for
the parties involved.
Gone are the times when there used to be files and cabinets which held data over the years. This
phase was long followed by archiving data over magnetic tapes and storing the tapes. There is
another overhead for the maintenance and safety of the tapes. These are few conventional
approaches, but the world is slightly moving to the cloud storage architecture. The only hurdle is
the data privacy. Companies are not very sure about handing the critical data. This will actually
take time but securely configured and managed cloud can be one of the best options.
There is no correct answer for this but just ensure that whatever side you are on, justify it with
examples, scenarios and logic.
Although there is no defined scope and end to the questions, but having a strong foundation of
the basic concepts and awareness about the latest trends will give you an upper hand in the
interview.
1. What is Cryptography?
Cryptography is the practice and study of techniques for securing information and communication
mainly to protect the data from third parties that the data is not intended for.
Basis of
Symmetric Encryption Asymmetric Encryption
Comparison
Same key for encryption & Different keys for encryption &
Encryption key
decryption decryption
Encryption is fast but more Encryption is slow due to high
Performance
vulnerable computation
Algorithms DES, 3DES, AES and RC4 Diffie-Hellman, RSA
Often used for securely exchanging
Purpose Used for bulk data transmission
secret keys
3. What is the difference between IDS and IPS?
IDS is Intrusion Detection System and it only detects intrusions and the administrator has to take
care of preventing the intrusion. Whereas, in IPS i.e., Intrusion Prevention System, the system
detects the intrusion and also takes actions to prevent the intrusion.
CIA stands for Confidentiality, Integrity, and Availability. CIA is a model that is designed to
guide policies for Information Security. It is one of the most popular models used by organizations.
Confidentiality
The information should be accessible and readable only to authorized personnel. It should not be
accessible by unauthorized personnel. The information should be strongly encrypted just in case
someone uses hacking to access the data so that even if the data is accessed, it is not readable or
understandable.
Integrity
Making sure the data has not been modified by an unauthorized entity. Integrity ensures that data
is not corrupted or modified by unauthorized personnel. If an authorized individual/system is
trying to modify the data and the modification wasn’t successful, then the data should be reversed
back and should not be corrupted.
Availability
The data should be available to the user whenever the user requires it. Maintaining of Hardware,
upgrading regularly, Data Backups and Recovery, Network Bottlenecks should be taken care of.
Both Encryption and Hashing are used to convert readable data into an unreadable format. The
difference is that the encrypted data can be converted back to original data by the process of
decryption but the hashed data cannot be converted back to original data.
A Firewall is a network security system set on the boundaries of the system/network that monitors
and controls network traffic. Firewalls are mainly used to protect the system/network from viruses,
worms, malware, etc. Firewalls can also be to prevent remote access and content filtering.
Penetration Testing is the process of finding vulnerabilities on the target. In this case, the
organization would have set up all the security measures they could think of and would want to
test if there is any other way that their system/network can be hacked.
1. The client sends a SYN(Synchronize) packet to the server check if the server is up or has
open ports
2. The server sends SYN-ACK packet to the client if it has open ports
3. The client acknowledges this and sends an ACK(Acknowledgment) packet back to the
server
9. What are the response codes that can be received from a Web Application?
Let us now go ahead and take a look at some of the other Cybersecurity Interview Questions
Traceroute is a tool that shows the path of a packet. It lists all the points (mainly routers) that the
packet passes through. This is used mostly when the packet is not reaching its destination.
Traceroute is used to check where the connection stops or breaks to identify the point of failure.
HIDS(Host IDS) and NIDS(Network IDS) are both Intrusion Detection System and work for the
same purpose i.e., to detect the intrusions. The only difference is that the HIDS is set up on a
particular host/device. It monitors the traffic of a particular device and suspicious system activities.
On the other hand, NIDS is set up on a network. It monitors traffic of all device of the network.
12. What are the steps to set up a firewall?
Secure servers use the Secure Sockets Layer (SSL) protocol for data encryption and decryption to
protect data from unauthorized interception.
Step 1: Make sure you have a secure password for your root and administrator users
Step 2: The next thing you need to do is make new users on your system. These will be the users
you use to manage the system
Step 4: The next step is to configure your firewall rules for remote access
Data Leakage can be prevented by using tools, software, and strategies known as DLP(Data
Leakage Prevention) Tools.
Following are some common cyber attacks that could adversely affect your system.
1. Malware
2. Phishing
3. Password Attacks
4. DDoS
5. Man in the Middle
6. Drive-By Downloads
7. Malvertising
8. Rogue Software
17. What is a Brute Force Attack? How can you prevent it?
Brute Force is a way of finding out the right credentials by repetitively trying all the permutations
and combinations of possible credentials. In most cases, brute force attacks are automated where
the tool/software automatically tries to login with a list of credentials. There are various ways to
prevent Brute Force attacks. Some of them are:
• Password Length: You can set a minimum length for password. The lengthier the
password, the harder it is to find.
• Password Complexity: Including different formats of characters in the password makes
brute force attacks harder. Using alpha-numeric passwords along with special characters,
and upper and lower case characters increase the password complexity making it difficult
to be cracked.
• Limiting Login Attempts: Set a limit on login failures. For example, you can set the limit
on login failures as 3. So, when there are 3 consecutive login failures, restrict the user from
logging in for some time, or send an Email or OTP to use to log in the next time. Because
brute force is an automated process, limiting login attempts will break the brute force
process.
Port Scanning is the technique used to identify open ports and service available on a host. Hackers
use port scanning to find information that can be helpful to exploit vulnerabilities. Administrators
use Port Scanning to verify the security policies of the network. Some of the common Port
Scanning Techniques are:
1. Ping Scan
2. TCP Half-Open
3. TCP Connect
4. UDP
5. Stealth Scanning
An OSI model is a reference model for how applications communicate over a network. The
purpose of an OSI reference is to guide vendors and developers so the digital communication
products and software programs can interoperate.
Following are the OSI layers:
Physical Layer: Responsible for transmission of digital data from sender to receiver through the
communication media,
Data Link Layer: Handles the movement of data to and from the physical link. It is also
responsible for encoding and decoding of data bits.
Network Layer: Responsible for packet forwarding and providing routing paths for network
communication.
Transport Layer: Responsible for end-to-end communication over the network. It splits the data
from the above layer and passes it to the Network Layer and then ensures that all the data has
successfully reached at the receiver’s end.
Session Layer: Controls connection between the sender and the receiver. It is responsible for
starting, ending, and managing the session and establishing, maintaining and synchronizing
interaction between the sender and the receiver.
Presentation Layer: It deals with presenting the data in a proper format and data structure instead
of sending raw datagrams or packets.
Application Layer: It provides an interface between the application and the network. It focuses
on process-to-process communication and provides a communication interface.
•
o Ensure strong and unique password
o Avoid sharing confidential information online, especially on social media
o Shop from known and trusted websites
o Use the latest version of the browsers
o Install advanced malware and spyware tools
o Use specialized security solutions against financial data
o Always update your system and the software
o Protect your SSN (Social Security Number)
23. What are black hat, white hat and grey hat hackers?
Black hat hackers are known for having vast knowledge about breaking into computer networks.
They can write malware which can be used to gain access to these systems. This type of hackers
misuse their skills to steal information or use the hacked system for malicious purpose.
White hat hackers use their powers for good deeds and so they are also called Ethical Hackers.
These are mostly hired by companies as a security specialist that attempts to find and fix
vulnerabilities and security holes in the systems. They use their skills to help make the security
better.
Grey hat hackers are an amalgamation of a white hat and black hat hacker. They look for system
vulnerabilities without the owner’s permission. If they find any vulnerabilities, they report it to the
owner. Unlike Black hat hackers, they do not exploit the vulnerabilities found.
Since BIOS is a pre-boot system it has its own storage mechanism for settings and preferences. A
simple way to reset is by popping out the CMOS battery so that the memory storing the settings
lose its power supply and as a result, it will lose its setting.
• Use VPN
• Use strong WEP/WPA encryption
• Use Intrusion Detection Systems
• Force HTTPS
• Public Key Pair Based Authentication
1. Flooding attacks: In this type, the hacker sends a huge amount of traffic to the server
which the server can not handle. And hence, the server stops functioning. This type of
attack is usually executed by using automated programs that continuously send packets to
the server.
2. Crash attacks: In this type, the hackers exploit a bug on the server resulting in the system
to crash and hence the server is not able to provide service to the clients.
Address Resolution Protocol (ARP)is a protocol for mapping an Internet Protocol address (IP
address) to a physical machine address that is recognized in the local network.
When an incoming packet destined for a host machine on a particular local area network arrives at
a gateway, the gateway asks the ARP program to find a physical host or MAC address that matches
the IP address.
The ARP program looks in the ARP cache and, if it finds the address, provides it so that the packet
can be converted to the right packet length and format and sent to the machine.
If no entry is found for the IP address, ARP broadcasts a request packet in a special format to all
the machines on the LAN to see if one machine knows that it has that IP address associated with
it.
Restricting the users from accessing a set of services within the local area network is called port
blocking.
Stopping the source to not to access the destination node via ports. As the application works on
the ports, so ports are blocked to restricts the access filling up the security holes in the network
infrastructure.
A Botnet is a number of devices connected to the internet where each device has one or more bots
running on it. The bots on the devices and malicious scripts used to hack a victim. Botnets can be
used to steal data, send spams and execute a DDOS attack.
Salt is a random data. When a properly protected password system receives a new password, it
creates a hash value of that password, a random salt value, and then the combined value is stored
in its database. This helps to defend against dictionary attacks and known hash attacks.
Example: If someone uses the same password on two different systems and they are being used
using the same hashing algorithm, the hash value would be same, however, if even one of the
system uses salt with the hashes, the value will be different.
SSL is meant to verify the sender’s identity but it doesn’t search for anything more than that. SSL
can help you track the person you are talking to but that can also be tricked at times.
TLS is also an identification tool just like SSL, but it offers better security features. It provides
additional protection to the data and hence SSL and TLS are often used together for better
protection.
Requires not only a password and username but also something that only, and only, that user has
on them, i.e. a piece of information only they should know or have immediately to hand – such as
a physical token.
Authenticator apps replace the need to obtain a verification code via text, voice call or email.
Self-learning security systems use data mining, pattern recognition, and natural language
processing to simulate the human brain, albeit in a high-powered computer model.
VPN VLAN
Helps to group workstations that are not
within the same locations into the same Related to remote access to the network of a company
broadcast domain
Means to logically segregate networks
Used to connect two points in a secured and encrypted
without physically segregating them
tunnel
with various switches
Does not involve any encryption technique but it is
Saves the data from prying eyes while
only used to slice up your logical network into
in transit and no one on the net can
different sections for the purpose of management and
capture the packets and read the data
security
• Don’t enter sensitive information in the webpages that you don’t trust
• Verify the site’s security
• Use Firewalls
• Use AntiVirus Software that has Internet Security
• Use Anti-Phishing Toolbar
SQL Injection (SQLi) is a code injection attack where an attacker manipulates the data being sent
to the server to execute malicious SQL statements to control a web application’s database server,
thereby accessing, modifying and deleting unauthorized data. This attack is mainly used to take
over database servers.
You can prevent SQL Injection attacks by using the following practices:
To create space for more users we’re deleting all inactive email accounts. Here’s what you have
to send to save your account from getting deleted:
If we don’t receive the above information from you by the end of the week, your email account
will be terminated.
This email is a classic example of “phishing” – trying to trick you into “biting”. The justification
is the generalized way of addressing the receiver which is used in mass spam emails.
Above that, a corporate company will never ask for personal details on mail.
They want your information. Don’t respond to email, instant messages (IM), texts, phone calls,
etc., asking you for your password or other private information.
You should never disclose your password to anyone, even if they say they work for UCSC, ITS,
or other campus organizations.
2. A friend of yours sends an e-card to your mail. You have to click on the
attachment to get the card.
• Some attachments contain viruses or other malicious programs, so just in general, it’s risky
to open unknown or unsolicited attachments.
• Also, in some cases just clicking on a malicious link can infect a computer, so unless you
are sure a link is safe, don’t click on it.
• Email addresses can be faked, so just because the email says it is from someone you know,
you can’t be certain of this without checking with the person.
• Finally, some websites and links look legitimate, but they’re really hoaxes designed to steal
your information.
3. One of the staff members in XYZ subscribes to many free magazines. Now, to
activate her subscriptions one of the magazines asked for her month of birth,
second asked for her year of birth, the other one asked for her maiden name.
All three newsletters probably have the same parent company or are distributed through the same
service. The parent company or service can combine individual pieces of seemingly-harmless
information and use or sell it for identity theft
It is even possible that there is a fourth newsletter that asks for a day of birth as one of the activation
questions
Often questions about personal information are optional. In addition to being suspicious about
situations like the one described here, never provide personal information when it is not
legitimately necessary, or to people or companies, you don’t personally know.
4. In our computing labs, print billing is often tied to the user’s login. Sometimes
people call to complain about bills for printing they never did only to find out that
the bills are, indeed, correct.
This is an issue with shared or public computers in general. If you don’t log out of the computer
properly when you leave, someone else can come in behind you and retrieve what you were doing,
use your accounts, etc. Always log out of all accounts, quit programs, and close browser windows
before you walk away.
5. There is this case that happened in my computer lab. A friend of mine used their
yahoo account at a computer lab on campus. She ensured that her account was not
left open before she left the lab. Someone came after her and used the same
browser to re-access her account. and they started sending emails from it.
The first person probably didn’t log out of her account, so the new person could just go to history
and access her account.
Another possibility is that she did log out, but didn’t clear her web cache. (This is done through
the browser menu to clear pages that the browser has saved for future use.)
Office #1 emails the correct account and deposit information to office #2, which promptly fixes the
problem.
The employee confirms with the bank that everything has, indeed, been straightened out.
Account and deposit information is sensitive data that could be used for identity theft. Sending this
or any kind of sensitive information by email is very risky because email is typically not private
or secure. Anyone who knows how can access it anywhere along its route.
As an alternative, the two offices could have called each other or worked with ITS to send the
information a more secure way.
7. The mouse on your computer screen starts to move around on its own and click
on things on your desktop. What do you do?
f) Run anti-virus
This is definitely suspicious. Immediately report the problem to your supervisor and the ITS
Support Center: itrequest.ucsc.edu, 459-HELP (4357), [email protected] or Kerr Hall room 54, M-F
8AM-5PM
Also, since it seems possible that someone is controlling the computer remotely, it is best if you
can disconnect the computer from the network (and turn off wireless if you have it) until help
arrives. If possible, don’t turn off the computer.
A. @#$)*&^%
B. akHGksmLN
C.UcSc4Evr!
D.Password1
Answer is UcSc4Evr!
This is the only choice that meets all of the following UCSC requirements:
Contains at least 3 of the following 4 types of characters: lower case letters, upper case letters,
numbers, special characters
9. You receive an email from your bank telling you there is a problem with your
account. The email provides instructions and a link so you can log into your
account and fix the problem.
What should you do?
Delete the email. Better yet, use the web client (e.g. gmail, yahoo mail, etc.) and report it as spam
or phishing, then delete it.
Any unsolicited email or phone call asking you to enter your account information, disclose your
password, financial account information, social security number, or other personal or private
information is suspicious – even if it appears to be from a company you are familiar with. Always
contact the sender using a method you know is legitimate to verify that the message is from them.
10. A while back, the IT folks got a number of complaints that one of our campus
computers was sending out Viagra spam. They checked it out, and the reports were
true: a hacker had installed a program on the computer that made it automatically
send out tons of spam email without the computer owner’s knowledge.
This was actually the result of a hacked password. Using passwords that can’t be easily guessed,
and protecting your passwords by not sharing them or writing them down can help to prevent this.
Passwords should be at least 8 characters in length and use a mixture of upper and lower case
letters, numbers, and symbols.
Even though in this case it was a hacked password, other things that could possibly lead to this
are:
Ans. Cryptography is a method to transform and transmit confidential data in an encoded way to
protect the information from third parties for whom data is not authorized.
• Threat: Someone with the potential to cause harm by damaging or destroying the official data
to a system or organization.
• Vulnerability: It refers to weaknesses in a system that makes threat outcomes more possible
and even more dangerous.
Ans. Cross-Site Scripting is also known as a client-side injection attack, which aims at executing
malicious scripts on a victim’s web browser by injecting malicious code.
Ans.
It needs a human or another system to look at the It needs a regularly updated database with the
results. latest threat data.
A Botnet is a group of internet-connected devices such as servers, PCs, mobile devices, etc., that
are affected and controlled by malware.
It is used for stealing data, sending spam, performing distributed denial-of-service attack (DDoS
attack), and more, and also to enable the user to access the device and its connection.
Ans. CIA (confidentiality, integrity, and availability) triad is a model designed to handle policies
for information security within an organization.
Ans.
Ans. A firewall is a security system used to control and monitor network traffic. It is used for
protecting the system/network from malware, viruses, worms, etc., and secures unauthorized
access from a private network.
The steps required to set up and configure the firewall are listed below:
Ans.
• The terms Vulnerability assessment and penetration testing are both different, but serve an
essential function of protecting network environment.
• Vulnerability Assessment: It’s a process to define, detect, and prioritize the vulnerabilities in
computer systems, network infrastructure, applications, etc., and gives the organization with
the required information to fix the flaws.
• Penetration Testing: It is also called as pen testing or ethical hacking. It’s a process of testing a
network, system, application, etc.to identify vulnerabilities that attackers could exploit. In the
context of web application security, it is most widely used to augment a web application firewall
(WAF).
Ans.
• Stored XSS Attacks - The attacks where the injected scripts are stored on the target servers
permanently. In this, the victim retrieves the malicious script from the server when requests the
stored information.
• Reflected XSS Attacks - In this, the user has to send the request first, then it will start running on
the victim’s browser and reflects results from the browser to the user who sent the request.
Ans. A three-way handshake process is used in TCP (Transmission Control Protocol) network
for transmission of data in a reliable way between the host and the client.
It’s called a three-way handshake because three segments are exchanged between the server and
the client.
• SYN: The client wants to establish a connection with the server, and sends a segment with
SYN(Synchronize Sequence Number) to the server if the server is up and has open ports.
• SYN + ACK: The server responds to the client request with SYN-ACK signal bits set if it has open
ports.
• ACK: The client acknowledges the response of a server and sends an ACK(Acknowledgment)
packet back to the server.
Ans. HTTP response codes display whether a particular HTTP request has been completed.
• 1xx (Informational) - The request has been received, and the process is continuing.
• 2xx (Success) - The request was successfully received and accepted.
• 3xx (Redirection) - Further action must be taken to complete it.
• 4xx (Client Error) - Request cannot be fulfilled or has incorrect syntax.
• 5xx (Server Error) - The server fails to fulfil the request.
Q16) What are the techniques used in preventing a Brute Force Attack?
Ans. Brute Force Attack is a trial and error method that is employed for application programs
to decode encrypted data such as data encryption keys or passwords using brute force rather than
using intellectual strategies. It’s a way to identify the right credentials by repetitively attempting
all the possible methods.
• Malware
• SQL Injection Attack
• Cross-Site Scripting (XSS)
• Denial-of-Service (DoS)
• Man-in-the-Middle Attacks
• Credential Reuse
• Phishing
• Session Hijacking
Ans. Data Leakage refers to the illegal transmission of data to an external destination or
unauthorized entity within an organization. It can transfer data either physically or electronically.
It usually occurs via the web, emails, and mobile data storage devices.
Ex: An entity may choose the wrong recipient while sending confidential data.
2. The Disgruntled or ill-intentioned Employee - The authorized entity sends confidential data
to an unauthorized body.
3. Electronic Communications with Malicious Intent - The problem is all the electronic
mediums are capable of file transferring and external access sources over the internet.
Ans. A Traceroute is a network diagnostic tool, used for tracking the pathway of an IP network
from source to destination. It records the period of each hop the packet makes while its route to
its destination.
Ans. CSRF is referred to as Cross-site Request Forgery, where an attacker tricks a victim into
performing actions on their behalf.
• Employing the latest antivirus software which helps in blocking malicious scripts.
• While authenticating to your banking site or performing any financial transactions on any other
website do not browse other sites or open any emails, which helps in executing malicious scripts
while being authenticated to a financial site.
• Never save your login/password within your browser for financial transactions.
• Disable scripting in your browser.
Ans. A port scanning is an application designed for identifying open ports and services
accessible on a host network. Security administrators mostly utilize it for exploiting
vulnerabilities, and also by hackers for targeting victims.
Some of the most popular port scanning techniques are listed below:
• Ping scan
• TCP connect
• TCP half-open
• Stealth scanning – NULL, FIN, X-MAS
• UDP
Ans.
• DNS (Domain Name System) is a service that is used for converting user-friendly domain names
into a computer-friendly IP address. It allows websites under a particular domain name which is
easy to remember.
• DNS monitoring is nothing but monitoring DNS records to ensure does it route traffic properly to
your website, electronic communication, services, and more.
Ans.
• Hashing is majorly used for authentication and is a one-way function where data is planned to a
fixed-length value.
• Salting is an extra step for hashing, where it adds additional value to passwords that change the
hash value created.
• Have a stronger WAP/WEP Encryption on wireless access points avoids unauthorized users.
• Use a VPN for a secure environment to protect sensitive information. It uses key-based
encryption.
• Public key pair based authentication must be used in various layers of a stack for ensuring
whether you are communicating the right things are not.
• HTTPS must be employed for securely communicating over HTTP through the public-private key
exchange.
Q25) What are the common methods of authentication for network security?
Ans.
• Biometrics - It is a known and registered physical attributes of a user specifically used for
verifying their identity.
• Token - A token is used for accessing systems. It makes more difficult for hackers to access
accounts as they have long credentials.
• Transaction Authentication - A one time pin or password is used in processing online
transactions through which they verify their identity.
• Multi-Factor Authentication - It’s a security system that needs more than one method of
authentication.
• Out-of-Band Authentication - This authentication needs two different signals from two different
channels or networks. It prevents most of the attacks from hacking and identity thefts in online
banking.
•
• Q26) Which is more secure SSL or HTTPS?
Ans.
• SSL (Secure Sockets Layer) is a secure protocol which provides safer conversations between two
or more parties across the internet. It works on top of the HTTP to provide security.
• HTTPS (Hypertext Transfer Protocol Secure) is a combination of HTTP and SSL to provide a safer
browsing experience with encryption.
• In terms of security, SSL is more secure than HTTPS.
Q27) What is the difference between black hat, white hat, and grey hat
hackers?
Ans.
• Black-hat hacker is a person who tries to obtain unauthorized access into a system or a network
to steal information for malicious purposes.
• White-hat hackers are also known as ethical hackers; they are well-versed with ethical hacking
tools, methodologies, and tactics for securing organization data. They try to detect and fix
vulnerabilities and security holes in the systems. Many top companies recruit white hat hackers.
• Grey hat hacker is a computer security expert who may violate ethical standards or rules
sometimes, but do not have malicious intent of black hat hacker.
Self-learning security systems use pattern recognition, natural language processing, and data
mining to mimic the human brain.
Ans. SQL Injection (SQLi) is a type of code injection attack where it manages to execute
malicious SQL statements to control a database server behind a web application. Attackers
mostly use this to avoid application security measures and thereby access, modify, and delete
unauthorized data.
The following ways will help you to mitigate or prevent SQL injection attacks:
Q31) How will you keep yourself updated with the latest cybersecurity news?
Ans. The following ways will help you to keep up with the latest cybersecurity updates:
Q32) What is a DDOS attack and how to stop and prevent them?
The following methods will help you to stop and prevent DDOS attacks:
Ans.
Ans.
• The purpose of patch management is to keep updating various systems in a network and protect
them against malware and hacking attacks.
• Many enterprise patch management tools manage the patching process by installing or
deploying agents on a target computer, and they provide a link between centralized patch
servers and computers to be patched.
Q35) What is the difference between a false positive and false negative in IDS?
Ans.
• A false positive is considered to be a false alarm and false negative is considered to be the most
complicated state.
• A false positive occurs when an IDS fires an alarm for legitimate network activity.
• A false negative occurs when IDS fails to identify malicious network traffic.
Compared to both, a false positive is more acceptable than false-negative as they lead to
intrusions without getting noticed.
Q36) what is the difference between the Red team and Blue team?
Ans.
• Red team and blue team refers to cyberwarfare. Many organizations split the security team into
two groups as red team and blue team.
• The red team refers to an attacker who exploits weaknesses in an organization's security.
• The blue team refers to a defender who identifies and patches vulnerabilities into successful
breaches.
Ans.
• Generally, system hardening refers to a combination of tools and techniques for controlling
vulnerabilities in systems, applications, firmware, and more in an organization.
• The purpose of system hardening is to decrease the security risks by reducing the potential
attacks and condensing the system’s attack surface.
1. Database hardening
2. Operating system hardening
3. Application hardening
4. Server hardening
5. Network hardening
Ans. A cybersecurity risk assessment refers to detecting the information assets that are prone to
cyber-attacks(including customer data, hardware, laptop, etc.) and also evaluates various risks
that could affect those assets.
Ans. There are many ways to reset or remove the BIOS password:
Ans. ARP is a protocol specifically used to map IP network addresses to physical addresses,
such as Ethernet addresses.
It translates 32-bits addresses to 48-bits addresses and vice versa. This is needed because the
most common level of internet protocol(IP) we use today is 32-bits long and MAC addresses are
48-bits long.
Ans.
Ans. The key indicators of compromise that organizations should monitor are listed below:
Ans.
• RDP (Remote Desktop Protocol) is a Microsoft protocol specifically designed for application data
transfer security and encryption between client devices, users, and a virtual network server.
• It allows administrators to remotely evaluate and resolve issues individual subscribers
encounter.
• It supports up to 64,000 separate data channels with a provision for multipoint transmission.
Ans.
• Diffie-Helman: It’s a key exchange protocol where two parties exchange a shared key that either
one can use to encrypt/decrypt messages between them.
• RSA: It’s asymmetric key encryption where it has two different keys. The public key can be given
to anyone and decrypted with another, which is kept private.
Ans.
• Forward secrecy is a feature of specific key agreement protocols which gives assurance that
even if the private key of the server is compromised the session keys will not be compromised. It
is also known as perfect forward secrecy(PFS).
• The Algorithm that helps in achieving this is called "Diffie–Hellman key exchange".
Ans.
• Active reconnaissance is a kind of computer attack where an intruder engages the target system
for collecting data about vulnerabilities.
• The attackers mostly use port scanning to identify vulnerable ports and then exploit the
vulnerabilities of services that are associated with open ports.
Ans.
• Information protection: It protects the data using encryption, security software, etc., from
unauthorized access.
• Information Assurance: It keeps the data reliable by ensuring availability, authentication,
confidentiality, etc.