Question:- What is data leakage? How will you detect and prevent it?
Answer:- Data leak is nothing but data knowledge getting out of the organization in an unauthorized manner. Data will get leaked through numerous ways in which – emails, prints, laptops obtaining lost, unauthorized transfer of data to public portals, removable drives, pictures, etc. Security of data is very important nowadays so there are varied controls that may be placed to make sure that the info doesn’t get leaked, many controls will be limiting upload on web websites, following an internal encryption answer, limiting the emails to the interior network, restriction on printing confidential data, etc.
Question:- What are the hacking stages? Explain each stage.
Answer:- Hacking, or targeting on a machine, should have the following 5 phases : • Surveillance : This is the principal stage where the hacker endeavours to gather as much data as possible about the target • Scanning : This stage includes exploiting the data accumulated amid Surveillance stage and utilizing it to inspect the casualty. The hacker can utilize computerized devices amid the scanning stage which can incorporate port scanners, mappers and vulnerability scanners. • Getting access : This is where the real hacking happens. The hacker attempts to exploit data found amid the surveillance and Scanning stage to get access. • Access Maintenance : Once access is gained, hackers need to keep that access for future exploitation and assaults by securing their exclusive access with backdoors, rootkits and Trojans. • Covering tracks : Once hackers have possessed the capacity to pick up and maintain access, they cover their tracks and to keep away from getting detected. This likewise enables them to proceed with the utilization of the hacked framework and keep themselves away from legitimate activities.
Question:- What are the tools used for ethical hacking?
Answer:- There are several moral hacking tools out there within the marketing for different purposes, they are: • NMAP – NMAP stands for Network plotter. It’s an associate degree open-source tool that’s used widely for network discovery and security auditing. • Metasploit – Metasploit is one of the most powerful exploit tools to conduct basic penetration tests. • Burp Suit – Burp Suite could be a widespread platform that’s widely used for playing security testing of internet applications. • Angry IP Scanner – Angry information processing scanner could be a lightweight, cross-platform information processing address and port scanner. • Cain & Abel – Cain & Abel is a password recovery tool for Microsoft operational Systems. • Ettercap – Ettercap stands for local area network Capture. It is used for a Man-in-the-Middle attack using a network security tool.
Question:- What is MAC Flooding?
Answer:- MAC Flooding is a kind of a technique wherever the protection of given network switch is compromised. In MAC flooding the hacker floods the switch with sizable amounts of frames, than what a switch can handle. This makes switch behaving as a hub and transmits all packetsto all the ports existing. Taking the advantage of this the attacker can attempt to send his packet within the network to steal the sensitive information.
Question:- What is sniffing? Explain its types in Ethical Hacking.
Answer:- Sniffing in Ethical Hacking is a method implemented for monitoring all the data packets that pass through a particular network. Sniffers are primarily used to oversee and troubleshoot network traffic, and Network/System Administrators are responsible for this role. Sniffers can be installed in the system in the form of software or hardware. However, attackers can misuse sniffers to gain access to data packets that contain sensitive information, such as account information, passwords, etc. Packet sniffers on a network can give a malicious hacker the opportunity to intrude and access all of the network traffic. There are two types of sniffing: • Active sniffing: Sniffing in a point-to-point network device called the switch is referred to as active sniffing. The switch is responsible for the regulation of the data flow between its ports. This is done through the active monitoring of the MAC address on each port, which enables the passing of data only to the intended target. To activate the sniffing of the traffic between targets, sniffers have to inject traffic into the LAN. • Passive sniffing: Passive sniffing happens when the sniffing is done through the hub. The traffic that goes through the unbridged network or the non-switched segment is transparent to all machines in that segment. Here, sniffers work at the network’s data link layer. This is called passive sniffing as sniffers set up by the attackers passively wait for the data to capture them when they are sent.
Question:- What is an intrusion detection system (IDS)?
Answer:- An intrusion detection system, or IDS for short, is a software application or device that monitors a network for the detection of malicious activities or policy violations. Any detected malicious activity or violation is reported or collected centrally with the help of a security information and event management system. An IDS that can respond to intrusions upon discovery is classified as an intrusion prevention system (IPS).
Question:- What is Defense in Depth?
Answer:- Defense in Depth (DiD) in Cybersecurity involves a series of defensive mechanisms that are layered for the purpose of securing valuable data and information. In case one mechanism fails, another one will start to work immediately to thwart unprecedented attacks. DiD’s multi-layered approach, which is also referred to as the castle approach, tightens up the security of a system.
Question:- What is a security operations center (SOC)?
Answer:- A security operations center (SOC) as a facility houses the information security team. This team is set in place to continuously monitor and analyze an organization’s security. The SOC team’s responsibility includes detection, analysis, and immediate response to Cybersecurity incidents through the implementation of various technology solutions and a set of processes. The team may include Security Analysts, Engineers, and Managers who work closely with the incident response team.
Question:- What is penetration testing? Mention some popular penetration testing tools.
Answer:- A penetration test or a pen test is the simulation of a cyberattack on a computer to check for potential vulnerabilities in the system. It is commonly implemented to augment a web application firewall (WAF). It can involve a simulated attack on any number of application systems such as APIs, frontend servers, and backend servers to discover any vulnerabilities present. The insights gained through this kind of testing can be used to tighten the WAF security policies and fix the detected issues. Following are a few popular tools used for penetration testing: • Netsparker • Wireshark • Metasploit • BeEF • Aircrack
Question:- What is network traffic monitoring and analysis?
Answer:- Network traffic monitoring and analysis is a security analytical technique and tool used by Network Security Administrators for the detection of issues that can affect accessibility, functionality, and network traffic security in connected devices.
Question:- What is the difference between RPO and RTO?
Answer:- The recovery point objective (RPO) deals with the backup frequency and the recovery time objective (RTO) with the recovery timeline. During a system outage, RPO and RTO can determine the impact of the downtime on business operations. RPO is a measure of how frequently you take backups and indicates the amount of data that will be lost or needed to be reentered after an outage. RTO, on the other hand, is the amount of downtime a business can afford. It determines how long it might take for a system to recover after a business disruption.
Question:- Explain how you can stop your website getting hacked?
Answer:- By adapting following methodology you’ll be able to stop your web site from obtaining hacked • Using Firewall : Firewall may be accustomed drop traffic from suspicious information processing address if attack may be an easy DOS • Encrypting the Cookies : Cookie or Session poisoning may be prevented by encrypting the content of the cookies, associating cookies with the consumer information processing address and temporal arrangement out the cookies once it slow • Validating and confirmative user input : This approach is prepared to stop the type tempering by confirmative and verifying the user input before processing it • Header Sanitizing and validation : This technique is beneficial against cross website scripting or XSS, this method includes verifying and sanitizing headers, parameters passed via the address, type parameters and hidden values to cut back XSS attacks.
Question:- What is Burp Suite? What tools does it contain?
Answer:- Burp Suite is an integrated platform used for attacking net applications. It contains all the tools a hacker would need for attacking any application. a number of these functionalities are • Proxy • Spider • Scanner • Intruder • Repeater • Decoder • Comparer • Sequencer
Question:- What is SQL injection and its types?
Answer:- If the application doesn’t sanitize the user input then the SQL injection happens. Thus a malicious hacker would inject SQL queries to gain unauthorized access and execute administration operations on the database. SQL injections may be classified as follows: • Error-based SQL injection • Blind SQL injection • Time-based SQL injection
