Question:- Explain phishing. How to prevent it?
Answer:- In phishing, an attacker masquerades as a trusted entity (as a legitimate person/company) to obtain sensitive information by manipulating the victim. It is achieved by any kind of user interaction, such as asking the victim to click on a malicious link and to download a risky attachment, to get confidential information such as credit card information, usernames, passwords, and network credentials. The following are some of the ways to prevent phishing: 1. Install firewalls 2. Rotate passwords frequently 3. Do not click on or download from unknown sources 4. Get free anti-phishing tools 5. Do not provide your personal information on an unsecured/unknown site
Question:- Explain SQL injection. How to prevent it?
Answer:- SQL injection is an injection attack where an attacker executes malicious SQL commands in the database server, including MySQL, SQL Server, or Oracle, that runs behind a web application. The intent is to gain unauthorized access to sensitive data such as client information, personal information, intellectual property details, and so on. In this attack, the attacker can add, modify, and delete records in the database, which results in the data integrity loss of an organization. Ways to prevent SQL injection: 1. Limit providing read access to the database 2. Sanitize data with the limitation of special characters 3. Validate user inputs 4. Use prepared statements 5. Check for active updates and patches
Question:- You get an e-card in your mail from a friend. It asks you to download an attachment to view the card. What will you do? Justify your answer.
Answer:- 1. Do not download the attachment as it may have malicious viruses, malware, or bugs, which might corrupt your system. 2. Do not visit any links as it might redirect you to an unintended page. 3. As fake email addresses are common and easy to create, you should not perform any action like clicking/downloading any links, unless you confirm it with the actual person. 4. Many websites masquerade as a legitimate site to steal sensitive information, so you should be careful not to fall into the wrong hands.
Question:- A staff member in a company subscribes to various free magazines. To activate the subscription, the first magazine asks her for her birth month, the second magazine asks for her birth year, and the third magazine asks for her maiden name. What do you deduce from the above situation? Justify your answer.
Answer:- It is highly likely that the above-mentioned three newsletters are from a parent company, which are distributed through different channels. It can be used to gather essential pieces of information that might look safe in the user’s eyes. However, this can be misused to sell personal information to carry out identity theft. It might further ask the user for the date of birth for the activation of the fourth newsletter. In many scenarios, questions that involve personal details are unnecessary, and you should not provide them to any random person, company, or website unless it is for a legitimate purpose.
Question:- To print billing, you have to provide your login credentials in your computing labs. Recently, people started to get a bill for the print, which was never done by them. When they called to complain, the bill turned out to be correct. How do you explain the above situation?
Answer:- To avoid this situation, you should always sign out of all accounts, close the browser, and quit the programs when you use a shared or public computer. There are chances that an illegitimate user can retrieve your authorized data and perform actions on behalf of you without your knowledge when you keep the accounts in a logged-in state.
Question:- In our campus computer lab, one of my friends logged into her Yahoo account. When she left the lab, she made sure that the account was not left open. Later, she came to realize that someone re-accessed her account from the browser, which she has used to send emails, by impersonating her. How do you think this happened?
Answer:- There are two possible scenarios: 1. The attacker can visit the browser’s history to access her account if she hasn’t logged out. 2. Even if she has logged out but has not cleared the web cache (pages a browser saves to gain easy and quick access for the future)
Question:- An employee’s bank account faces an error during a direct deposit. Two different offices need to work on it to straighten this out. Office #1 contacts Office #2 by email to send the valid account information for the deposit. The employee now gives the bank confirmations that the error no longer exists. What is wrong here?
Answer:- Any sensitive information cannot be shared via email as it can lead to identity theft. This is because emails are mostly not private and secure. Sharing or sending personal information along the network is not recommended as the route can be easily tracked. In such scenarios, the involved parties should call each other and work with ITS as a secure way of sending the information.
Question:- You see an unusual activity of the mouse pointer, which starts to move around on its own and clicks on various things on the desktop. What should you do in this situation? A. Call any of the co-workers to seek help B. Disconnect the mouse C. Turn your computer off D. Inform the supervisor E. Disconnect your computer from the network F. Run anti-virus G. Select all the options that apply? Which options would you choose?
Answer:- The answer is (D) and (E). This kind of activity is surely suspicious as an unknown authority seems to have the access to control the computer remotely. In such cases, you should immediately report it to the respective supervisor. You can keep the computer disconnected from the network till help arrives.
Question:- Check out the list of passwords below, which are pulled out from a database: A. Password1 B. @#$)*&^% C. UcSc4Evr! D. akHGksmLN Choose the passwords that are in line with the UCSC’s password requirements.
Answer:- The answer is C (UcSc4Evr!). As per the UCSC requirements, a password should be: Minimum of 8 characters in length Having any of the three from these four types of characters: lower case, upper case, numbers, and special characters.
Question:- The bank sends you an email, which says it has encountered a problem with your account. The email is provided with instructions and also a link to log in to the account so that you can fix it. What do you infer from the above situation? Explain.
Answer:- It appears to be an unsolicited email. You should report it as spam and move the email to the trash immediately in the respective web client you use (Yahoo Mail, Gmail, etc.). Before providing any bank-related credentials online, you should call the bank to check if the message is legitimate and is from the bank.
Question:- In your IT company, employees are registering numerous complaints that the campus computers are delivering Viagra spam. To verify it, you check the reports, and it turns out to be correct. The computer program is automatically sending tons of spam emails without the owner’s knowledge. This happened because a hacker had installed a malicious program into the system. What are the reasons you think might have caused this incident?
Answer:- This type of attack happens when the password is hacked. To avoid this, whenever you set a password, always use a proper standard, i.e., use passwords that are at least 8-character length and have a combination of upper case/lower case letters, symbols/special characters, and numbers. Other scenarios of the above attack could be: 1. Dated antivirus software or the lack of it 2. Dated updates or security patches
Question:- Compare MongoDB with Cassandra.
Answer:- • MongoDB • Document • Read • Multi-indexed • Cassandra • Bigtable like • Write • Using Key or Scan
Question:- What makes MongoDB the best?
Answer:- MongoDB is considered to be the best NoSQL database because of its following features: • Document-oriented (DO) • High performance (HP) • High availability (HA) • Easy scalability • Rich query language
Question:- How to do transactions/locking in MongoDB?
Answer:- MongoDB does not use conventional locking with reduction as it is planned to be light, high-speed, and knowable in its presentation. It can be considered as parallel to the MySQL MyISAM auto entrust sculpt. With the simplest business sustain, performance is enhanced, particularly in a structure with numerous servers.
