- CyberSecurity
- WebApp-Security
- MobileApp-Security
- Api-Security
- Cloud-Security
- Network-Security
- IOT-Security
- Secure-Code-Review
- Scenario-based-questions
- What is Cryptography?
- What is CIA?
- What is the difference between Symmetric and Asymmetric encryption?
- What is the difference between IDS and IPS?
- Explain CIA triad.
- How is Encryption different from Hashing?
- What is a Firewall and why is it used?
- What is the difference between VA(Vulnerability Assessment) and PT(Penetration Testing)?
- What is a three-way handshake?
- What are the response codes that can be received from a Web Application?
- What is traceroute? Why is it used?
- What is the difference between HIDS and NIDS?
- What are the steps to set up a firewall?
- Explain SSL Encryption
- What steps will you take to secure a server?
- Explain Data Leakage
- What are some of the common Cyberattacks?
- What is a Brute Force Attack? How can you prevent it?
- What is Port Scanning?
- What are the different layers of the OSI model? Explain about the different layers?
- What is a VPN?
- What do you understand by Risk, Vulnerability & Threat in a network?
- How can identity theft be prevented?
- What are black hat, white hat and grey hat hackers?
- How often should you perform Patch management?
- How would you reset a password-protected BIOS configuration?
- Explain MITM attack and how to prevent it?
- Explain DDOS attack and how to prevent it?
- Explain XSS attack and how to prevent it?
- What is an ARP and how does it work?
- What is port blocking within LAN?
- What protocols fall under TCP/IP internet layer?
- What is a Botnet?
- What are salted hashes?
- Explain SSL and TLS
- What is data protection in transit vs data protection at rest?
- What is 2FA and how can it be implemented for public websites?
- What is Cognitive Cybersecurity?
- What is the difference between VPN and VLAN?
- Explain Phishing and how to prevent it?
- Explain SQL Injection and how to prevent it?
- What is cybersecurity?
- What are the elements of cybersecurity?
- What are the advantages of cyber security?
- Explain the difference between asymmetric and symmetric encryption.
- Explain WAF
- What is network sniffing?
- What is the importance of DNS monitoring?
- What is SSH?
- Is SSL protocol enough for network security
- What is black box testing and white box testing?
- Define the term residual risk. What are three ways to deal with risk?
- Define Exfiltration.
- What do you mean by penetration testing?
- What is exploit in network security?
- How to make the user authentication process more secure?
- What are the risks associated with public Wi-Fi?
- What is Data Encryption? Why it is important in network security?
- Give some examples of a symmetric encryption algorithm.
- Explain a buffer overflow attack.
- Define Spyware.
- Explain the main difference between Diffie-Hellman and RSA.
- What is a remote desktop protocol?
- Define Forward Secrecy.
- Explain the concept of IV in encryption.
- Explain the difference between stream cipher and block cipher.
- What is impersonation?
- What do you mean by SRM?
- What do you mean by Authenticode?
- Define CryptoAPI
- What is Microsoft Baseline Security Analyzer?
- Explain social engineering and its attacks.
- Discuss security-related aspects between C, C++, and Java
- What is static and dynamic testing?
- What is use-case testing?
- What is a distributed denial-of-service attack (DDoS)
- Explain the concept of session hijacking.
- Explain honeypot and its Types.
- Define WEP cracking.
- What are the types of threats a company can face?
- What is a security auditing?
- Explain phishing.
- What is Nano-scale encryption?
- How does email work?
- Explain the sequence of a TCP connection.
- Define hybrid attacks.
- What is the use of EtterPeak tool?
- What is virtual memory?
- Define accidental threats
- What do you mean by Chain of Custody?
- What are the various types of operating systems?
- What is the difference between microkernel and macrokernel?
- Which shells are used in Linux?
- What is ransomware?
- What are HTTP response codes?
- Which is more secure SSL or HTTPS?
- What is an active reconnaissance?
ANDROID
- Tools Used For Mobile app Pentesting?
- List OWASP top 10 for mobile application testing
- What is Static Analysis?
- What is Dynamic Analysis?
- Explain SSL Pinning?
- What are the possible ways to bypass SSL Pinning?
- How will you hide root from an apk ?
- What is the difference between a false positive and a false negative in IDS?
- what is nmap?
- Explain ARP Poisoning
- What are various WEP cracking tools?
- List out the types of sniffing attacks.
- What is IP and MAC Addresses?
- Name some tools used for packet sniffing.
- Define Unicasting, Multicasting, and Broadcasting.
- What is DNS?
- What is Data encapsulation in networking?
- What is the difference between Domain and Workgroup?
-
Here’s a situation- You receive the following email from the help desk: Dear XYZ Email user, To create space for more users we’re deleting all inactive email accounts. Here’s what you have to send to save your account from getting deleted: Name (first and last): Email Login: Password: Date of birth: Alternate email If we don’t receive the above information from you by the end of the week, your email account will be terminated.
This email is a classic example of “phishing” – trying to trick you into “biting”. The justification is the generalized way of addressing the receiver which is used in mass spam emails.Above that, a corporate company will never ask for personal details on mail.They want your information. Don’t respond to email, instant messages (IM),
texts,phone calls, etc., asking you for your password or other private information.You should never disclose your password to anyone, even if they say they work for UCSC,
ITS, or other campus organizations. -
A friend of yours sends an e-card to your mail. You have to click on the attachment to get the card.
There are four risks here: Some attachments contain viruses or other malicious programs, so just in general, it’s risky to open unknown or unsolicited attachments. Also, in some cases just clicking on a malicious link can infect a computer, so unless you are sure a link is safe, don’t click on it. Email addresses can be faked, so just because the email says it is from someone you know, you can’t be certain of this without checking with the person. Finally, some websites and links look legitimate, but they’re really hoaxes designed to steal your information.
-
One of the staff members in XYZ subscribes to many free magazines. Now, to activate her subscriptions one of the magazines asked for her month of birth, second asked for her year of birth, the other one asked for her maiden name.
All three newsletters probably have the same parent company or are distributed through the same service. The parent company or service can combine individual pieces of
seemingly-harmless information and use or sell it for identity theft It is even possible that there is a fourth newsletter that asks for a day of birth as one of the activation questions Often questions about personal information are optional. In addition to being suspicious about situations like the one described here, never provide personal information
when it is not legitimately necessary, or to people or companies, you don’t personally know. -
In our computing labs, print billing is often tied to the user’s login. Sometimes people call to complain about bills for printing they never did only to find out that the bills are, indeed, correct.
Sometimes they realize they loaned their account to a friend who couldn’t remember his/her password, and the friend did the printing. Thus the charges. It’s also possible
that somebody came in behind them and used their account This is an issue with shared or public computers in general. If you don’t log out of the computer properly when you leave, someone else can come in behind you and retrieve what you were doing, use your accounts, etc. Always log out of all accounts, quit programs, and close browser windows before you walk away. -
There is this case that happened in my computer lab. A friend of mine used their yahoo account at a computer lab on campus. She ensured that her account was not left open
before she left the lab. Someone came after her and used the same browser to re-access her account. and they started sending emails from it.The first person probably didn’t log out of her account, so the new person could just go to history and access her account. Another possibility is that she did log out, but didn’t clear her web cache. (This is done through the browser menu to clear pages that the browser has saved for future use
-
Two different offices on campus are working to straighten out an error in an employee’s bank account due to a direct deposit mistake. Office #1 emails the correct account and deposit information to office #2, which promptly fixes the problem. The employee confirms with the bank that everything has, indeed, been straightened out.
Account and deposit information is sensitive data that could be used for identity theft. Sending this or any kind of sensitive information by email is very risky because
email is typically not private or secure. Anyone who knows how can access it anywhere along its route. As an alternative, the two offices could have called each other or worked with ITS to send the information a more secure way. -
The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do? a) Call your co-workers over so they can see b) Disconnect your computer from the network c) Unplug your mouse d) Tell your supervisor e) Turn your computer off f) Run anti-virus g) All of the above Select all the options that apply.
This is definitely suspicious. Immediately report the problem to your supervisor and the ITS Support Center: itrequest.ucsc.edu, 459-HELP (4357), [email protected] or Kerr Hall room 54, M-F 8AM-5PM. Also, since it seems possible that someone is controlling the computer remotely, it is best if you can disconnect the computer from the network (and turn off wireless if you have it) until help arrives. If possible, don’t turn off the computer.
-
Below is a list of passwords pulled out a database. A. @#$)*&^% B. akHGksmLN C. USc4Evr! D. Password1 Which of the following passwords meets UCSC’s password requirements?
This is the only choice that meets all of the following UCSC requirements: At least 8 characters in length.Contains at least 3 of the following 4 types of characters: lower case letters, upper case letters, numbers, special characters. Not a word preceded or followed by a digit
-
You receive an email from your bank telling you there is a problem with your account. The email provides instructions and a link so you can log into your account and fix the problem.
Delete the email. Better yet, use the web client (e.g. gmail, yahoo mail, etc.) and report it as spam or phishing, then delete it. Any unsolicited email or phone call asking you to enter your account information, disclose your password, financial account information, social security number, or other personal or private information is suspicious – even if it appears to be from a company you are familiar with. Always contact the sender using a method you know is legitimate to verify that the message is from them.
-
A while back, the IT folks got a number of complaints that one of our campus computers was sending out Viagra spam. They checked it out, and the reports were true: a hacker had installed a program on the computer that made it automatically send out tons of spam email without the computer owner’s knowledge. Cybersecurity Interview Questions.
This was actually the result of a hacked password. Using passwords that can’t be easily guessed, and protecting your passwords by not sharing them or writing them down can help to prevent this. Passwords should be at least 8 characters in length and use a mixture of upper and lower case letters, numbers, and symbols. Even though in this case it was a hacked password, other things that could possibly lead to this are: Out of date patches/updates No anti-virus software or out of date anti-virus software
-
What are the consequences if private keys of a Root CA gets compromised?
If you have rogue certificates of a well-known company, as an attacker, how can you use it for you own benefit? As a security threat analyst, what will be your approach to respond to this incident? Securing Infra, servers and people! Answer
-
How would you check the signature of a binary and restrict any unsigned binaries to run on a machine(Win/Linux/Mac) Answer Answer2
-
How can I restrict the normal user to run only limited set of commands in Linux? Answer
-
Interviewer gives you an obfuscated Powershell script and asks details what can you extract from this? Answer answer