Question:- Mention the steps to set up a firewall.
Answer:- Following are the steps you have to follow to set up a firewall: 1. Username/password: Alter the default password of a firewall device. 2. Remote Administration: Always disable the Remote Administration feature. 3. Port Forward: For the web server, FTP, and other applications to work properly, configure appropriate ports. 4. DHCP Server: Disable the DHCP server when you install a firewall to avoid conflicts. 5. Logging: Enable logs to view the firewall troubleshoots and to view logs. 6. Policies: Configure strong security policies with the firewall.
Question:- What is SSL encryption?
Answer:- Secure Socket Layer is a security protocol that is used for the purpose of encryption. It ensures privacy, data integrity, and authentication in the network like online transactions. The following are the steps for setting up an SSL encryption: 1. A browser connects to an SSL-secured web server. 2. The browser requests the server’s public key in exchange for its own private key. 3. If it is trustworthy, the browser requests to establish an encrypted connection with the web server. 4. The web server sends the acknowledgment to start an SSL encrypted connection. 5. SSL communication starts to take place between the browser and the web server.
Question:- What steps will you take to secure a server?
Answer:- A server that is secured uses the Secure Socket Layer (SSL) protocol to encrypt and decrypt data to protect it from unauthorized access. Below are the four steps to secure a server: Step 1: Secure the root and administrator users with a password Step 2: Create new users who will manage the system Step 3: Do not give remote access to administrator/default root accounts Step 4: Configure firewall rules for remote access
Question:- What is the difference between HIDS and NIDS?
Answer:- • Host Intrusion Detection System • Detects the attacks that involve hosts • Analyzes what a particular host/application is doing • Discovers hackers only after the machine is breached • Network Intrusion Detection System • Detects attacks that involve networks • Examines the network traffic of all devices • Discovers hackers at the time they generate unauthorized attacks
Question:- Mention the difference between symmetric and asymmetric encryption.
Answer:- • Symmetric Encryption • Only one key to encrypt and decrypt a message • Encryption is faster and simple • RC4, AES, DES, and 3DES • For the transmission of large chunks of data • Asymmetric Encryption • Two different keys (public and private keys) to encrypt and decrypt the message • Encryption is slower and complicated • RSA, Diffie-Hellman, and ECC • For smaller transmission to establish a secure connection prior to the actual data transfer
Question:- What is the difference between IDS and IPS?
Answer:- • Intrusion Detection System • A network infrastructure to detect intrusion by hackers • Flags invasion as threads • Detects port scanners, malware, and other violations • Intrusion Prevention System • A network infrastructure to prevent intrusions by hackers • Denies the malicious traffic from threads • Does not deliver malicious packets if the traffic is from known threats in databases
Question:- What are the different layers of the OSI model?
Answer:- OSI model was introduced by the International Organization for Standardization for different computer systems to communicate with each other using standard protocols. Below are the various layers of the OSI model: • Physical layer: This layer allows the transmission of raw data bits over a physical medium. • Datalink layer: This layer determines the format of the data in the network. • Network layer: It tells which path the data will take. • Transport layer: This layer allows the transmission of data using TCP/UDP protocols. • Session layer: It controls sessions and ports to maintain the connections in the network. • Presentation layer: Data encryptions happen in this layer, and it ensures that the data is in a usable/presentable format. • Application layer: This is where the user interacts with the application.
Question:- What is a VPN?
Answer:- VPN stands for virtual private network. It is a private network that gives you online anonymity and privacy from a public Internet connection. VPN helps you protect your online activities, such as sending an email, paying bills, or shopping online. How does a VPN work? When you make a VPN connection, your device routes the Internet connection to the VPN’s private server, instead of your Internet Service Provider (ISP). During this transmission, your data is encrypted and sent through another point on the Internet. When it reaches the server, the data is decrypted. The response from the server reaches the VPN where it is encrypted, and it will be decrypted by another point in the VPN. At last, the data, which is decrypted, reaches you.
Question:- What do you understand by risk, vulnerability, and threat in a network?
Answer:- • Threat: A cyber security threat can cause potential harm to an organization’s assets by exploiting a vulnerability. It can be intentional or accidental. • Vulnerability: A vulnerability is a weakness or a gap in the security system that can be taken advantage of by a malicious hacker. • Risk: A risk happens when the threat exploits a vulnerability. It results in loss, destruction, or damage to the asset.
Question:- How do you prevent identity theft?
Answer:- To prevent identity theft, you can take the following measures: 1. Protect your personal records. 2. Avoid online sharing of confidential information. 3. Protect your Social Security Number. 4. Use strong passwords, and change them at regular intervals. 5. Do not provide your bank information on untrustworthy websites. 6. Protect your system with advanced firewall and spyware tools. 7. Keep your browsers, system, and software updated.
Question:- Who are White Hat, Grey Hat, and Black Hat Hackers?
Answer:- • Black Hat Hackers A Black Hat Hacker uses his/her hacking skills to breach confidential data without permission. With the obtained data, the individual performs malicious activities such as injecting malware, viruses, and worms. • White Hat Hackers A White Hat Hacker uses his/her hacking skills to break into a system but with the permission of the respective organizations. They are professionals known as Ethical Hackers. They hack the system to identify its vulnerability and to fix it before a hacker takes advantage of it. • Grey Hat Hackers A Grey Hat Hacker has the characteristics of both a Black Hat Hacker and a White Hat Hacker. Here, the system is violated with no bad intention, but they do not have the essential permission to surf the system, so it might become a potential threat at any time.
Question:- When should you do patch management, and how often?
Answer:- Patch management has to be done immediately once the updates to the software is released. All the network devices in the organization should get patch management in less than a month.
Question:- What are the ways to reset a password-protected BIOS configuration?
Answer:- BIOS being hardware, setting it up with a password locks the operating system. There are three ways to reset the BIOS password: 1. you need to unplug the PC and remove the CMOS battery in the cabinet for 15–30 minutes. Then, you can put it back. 2. You can use third-party software such as CmosPwd and Kiosk. 3. You can run the below commands from the MS-DOS prompt with the help of the debug tool. For this method to work, you need to have access to the OS installed.
Question:- Explain the MITM attack. How to prevent it?
Answer:- In the Man-in-the-Middle attack, the hacker eavesdrops on the communication between two parties. The individual then impersonates another person and makes the data transmission look normal for the other parties. The intent is to alter the data, steal personal information, or get login credentials for sabotaging communication. These are a few ways to prevent a MITM attack: 1. Public key pair based authentication 2. Virtual private network 3. Strong router login credentials 4. Implement a well-built Intrusion Detection Systems (IDS) like firewalls. 5. Strong WEP/WPA encryption on access points
