170 likes | 190 Views
This presentation on cybersecurity interview questions part 4 will focus on questions and answers based on various cyberattacks. Here, we will look at questions related to phishing, ransomware, spoofing, etc. So, let's get started!<br><br>Start learning today's most in-demand skills for FREE. Visit us at https://www.simplilearn.com/skillup-f... Choose over 300 in-demand skills and get access to 1000 hours of video content for FREE in various technologies like Data Science, Cybersecurity, Project Management & Leadership, Digital Marketing, and much more. <br><br>Start learning today's most in-demand skills for FREE. Visit us at https://www.simplilearn.com/skillup-f... <br>Choose over 300 in-demand skills and get access to 1000 hours of video content for FREE in various technologies like Data Science, Cybersecurity, Project Management & Leadership, Digital Marketing, and much more. <br><br>Post Graduate Program in Cyber Security:<br>This Post Graduate Program in Cyber Security is designed to equip you with the skills required to become an expert in the rapidly growing field of Cyber Security. This cyber security course aims to help you stay abreast all the latest trends in cyber security as well. This Post Graduate Program in Cyber Security will help you learn comprehensive approaches to protecting your infrastructure and securing your data, including risk analysis and mitigation, cloud-based security, and compliance. You will receive foundational to advanced security skills through industry-leading certification courses that are part of the program.<br><br>Key Features:<br>u2705 Simplilearn Post Graduate Certificate<br>u2705 Masterclasses from MIT Faculty<br>u2705 Featuring Modules from MIT SCC and EC-Council<br>u2705 150 hours of Applied Learning<br>u2705 Get noticed by the top hiring companies<br>u2705 EC-Council learning kit<br>u2705 Industry case studies in cyber security<br>u2705 MIT SCC Professional Learning Community<br>u2705 Capstone project in 3 domains<br>u2705 25 hands-on projects<br><br>Learn more at: http://bit.ly/37Cf1SK
E N D
31 What is SQL injection? As the name suggests, an SQL injection vulnerability allows an attacker to inject malicious input into an SQL statement Types of SQL injection are:
32 What is spoofing? • In spoofing, an attacker pretends to be some other person or organization and sends you an email that appears to be a legitimate email Example: You get a mail from your manager Hi Bill, I got the information that your computer system has been compromised. Please share the password of your computer in this email so that we can secure your system. Thanks Watson Manager ABC company
33 What is distributed denial of service attack (DDoS)? DDoS is an attack used to restrict user to access the resources by flooding the traffic that is used to access resources Botnet controller Resource E.g. facebook.com Attacker Servers User
34 How to avoid ARP poisoning? Packet filters will filter out and block packets that have same source address data Keeping away from trust relationships Utilize ARP spoofing software Using packet filtering • Organizations develop protocols that do not depend on trust relationships ARP spoofing software assesses the information before transmission and blocks the information that is spoofed
35 What is ransomware? Ransomware is a type of malware that blocks victim to access personal files and demands ransom to regain access. There are 3 categories in ransomware Scareware is a form of malware which uses social engineering to cause anxiety, or the perception of a threat to manipulate users into buying unwanted software Scareware Screen lockers Encrypting ransomware
35 What is ransomware? Ransomware is a type of malware that blocks victim to access personal files and demands ransom to regain access. There are 3 categories in ransomware Scareware Locking users' computers by preventing them from logging in and displaying an official-looking message Screen lockers Encrypting ransomware
35 What is ransomware? Ransomware is a type of malware that blocks victim to access personal files and demands ransom to regain access. There are 3 categories in ransomware Scareware Screen lockers The ransomware displays a message demanding payment in return for the private asymmetric key, which is needed to decrypt the symmetric keys for encrypted file Encrypting ransomware
What is the difference between an active and passive cyber attack? 36 In an active attack the intruder attempts to disrupt a network’s normalcy, modifies data and tries to alter the system resources 1234 9292 Sender Receiver Hacker modifies it to 1234 and sends it Attacker receives 9292 Attacker
What is the difference between an active and passive cyber attack? 36 Whereas, in a passive attack, the intruder intercepts data traveling through a network. Here, the intruder eavesdrops but does not modify the message 9292 9292 Sender Receiver Message is read by the intruder Attacker
37 What is a social engineeringattack? It is the art of manipulating people so that they end up giving their confidential information. This attack has three categories: 2. Spear Phishing Attack 1. Phishing Attack 3. Whaling Phishing Attack Here, the user opens the mail with the attachment and unknowingly downloads the virus Whaling Phishing attack is a type of attack that specifically targets wealthy, powerful and prominent individuals This is a variation of Phishing. Here, the attacker targets a specific individual or a group of people
38 What is man in the middle attack? Here, the attacking computer takes the IP address of the client. Unaware of this, the server continues to communicate with the attacker Client-server communication Client Server
38 What is man in the middle attack? Here, the attacking computer takes the IP address of the client. Unaware of this, the server continues to communicate with the attacker Attacker Client Attacker comes in between the client server communication Server
39 Who are black hat hackers and white hat hackers? White Hat Hackers are also known as Ethical Hackers. They are individuals who discover vulnerabilities in a computer network. Such a hacker works to defend organizations and governments Black hat hackers are highly skilled individuals who illegally hack into a system. The motive behind such an attack is mostly for monetary gain. These individuals are also known as security crackers
40 What are honeypots? Honeypots are computer systems which are used to lure attackers. It is used to deceive attackers and defend the real network from any attack Attacks honeypot thinking its victim’s network Honeypot Attacker Real network is safeguarded Internet Real network Firewall
Join us to learn more! simplilearn.com UNITED STATES Simplilearn Solutions Pvt. Limited 201 Spear Street, Suite 1100 San Francisco, CA 94105 Phone: (415) 741-3319 INDIA Simplilearn Solutions Pvt. Limited #53/1C, 24th Main, 2nd Sector HSR Layout, Bangalore 560102 Phone: +91 8069999471 UNITED STATES Simplilearn Solutions Pvt. Limited 801 Corporate Center Drive, Suite 138 Raleigh, NC 27607 Phone: (919) 205-5565