Top 50 Network Security Interview Questions
Q1. The Plain Text To Be Trmitted Has A Cyclic Redundancy Check (crc) Value Calculated, Which Is A Check Sum Based On The Contents Of The Text. Wep Calls This The ____ And Append It To The End Of The Text
Correct Answer: integrity test value (ICV)
Q2. What Is Another Name For Unsolicited E-mail Messages?
Unsolicited mail
Q3. What Is Kerberos Protocol?
Kerberos is an authentication protocol, it is known as after a canine who is in keeping with the Greek mythology, - is said to stand at the gates of Hades.In the terms of laptop networking it's miles a group of software program utilized in big networks to authenticate and set up a consumer's claimed identification. It is developed via MIT and using a mixture of encryption in addition to dispensed databases in order that the consumer can log in begin a consultation.
It has some dangers although. As I said Kereberos have been advanced by way of MIT below the undertaking Athena, - Kerberos is designed to authenticate the cease customers on the servers.
Q4. Why Does Active Ftp Not Work With Network Firewalls?
When a person initiates a connection with the FTP server, TCP connections are mounted. The 2d TCP connection (FTP information connection) is initiated and set up from the FTP server. When a firewall is among the FTP consumer and server, the firewall might block the connection initiated from the FTP server considering it is a connection initiated from outside. To clear up this, Passive FTP can be used or the firewall rule can be modified to add the FTP server as depended on.
Q5. How Often Are Logs Reviewed?
Logs have to be reviewed each day. This consists of IDS logs, gadget logs, control station logs, etc. Not reviewing the logs is one of the largest mistakes an organisation could make. Events of hobby must be investigated every day. It may be a completely tedious mission for a unmarried character to do that job as their handiest mission (unless they truly revel in it). It is higher to have a log evaluation rotation device among the safety team.
Q6. What Is An Ip Grabber?
An ip grabber is a software a good way to locate the ip cope with of any other laptop. Often used by hackers.
Q7. Where Is Your Organization's Security Policy Posted And What Is In It?
There have to be an general policy that establishes the direction of the agency and its safety task as well as roles and duties. There also can be machine-specific rules to deal with for character structures. Most importantly, the regulations have to cope with an appropriate use of computing assets. In addition, regulations can address a number of protection controls from passwords and backups to proprietary facts. There ought to be clear methods and techniques to observe for each policy. These regulations ought to be included inside the worker handbook and posted on a readily handy intranet website online.
Q8. How Does Symmetric Key Encryption Work?
Symmetric encryption requires that both events (sender and receiver) understand and have the precise same encryption key. This secret's used each for encrypting and decrypting the data. Using the same encryption algorithm me that simplest those people that understand or have the equal key might be capable of examine any messages encrypted by the symmetric key.
Q9. A(n) ____ Finds Malicious Traffic And Deals With It Immediately?
IPS
Q10. What Is The Difference Between Network Security And Cryptography?
Cryptography is the deliberate try to difficult to understand or scramble the statistics so that best a certified receiver can see the message. Network security might also employ cryptography, but has many other tools to at ease a community, consisting of firewalls, auditing, Intrusion Detection Systems, and so on. Cryptography could be used simplest when looking to preserve messages secret whilst sending them across a community or keeping facts mystery in a file.
Q11. What Is Your Organization's Password Policy?
A password policy need to require that a password:
Be at least 8 characters lengthy
Contain each alphanumeric and special characters
Change every 60 days
Cannot be reused after each 5 cycles
Is locked out after three failed tries In addition, you must be performing everyday password auditing to check the power of passwords; this have to additionally be documented inside the password coverage.
Q12. A ____ Is A Cumulative Package Of All Security Updates Plus Additional Features.
Provider p.C.
Q13. What Are The Tolerable Levels Of Impact Your Systems Can Have?
An enterprise need to recognize how an outage should effect the capacity to retain operations. For instance, you should determine how lengthy systems may be down, the impact on coins drift, the impact on carrier level agreements, and the important thing assets that ought to be kept walking.
Q14. A ____ Is A Single, Dedicated Hard Disk-based totally File Storage Device That Provides Centralized And Consolidated Disk Storage Available To Lan Users Through A Standard Network Connection?
NAS
Q15. A ____ Virus Can Interrupt Almost Any Function Executed By The Computer Operating System And Alter It For Its Own Malicious Purposes?
Resident
Q16. What Applications And Services Are Specifically Denied By Your Organization's Security Policy?
Your company’s security coverage must specify packages, services, and sports which are prohibited. These can encompass, amongst others:
Viewing inappropriate fabric
Spam
Peer-to-peer file sharing
Instant messaging
Unauthorized wi-fi gadgets
Use of unencrypted far off connections which includes Telnet and FTP
Q17. A(n) ____ Is A Computer Programming Language That Is Typically Interpreted Into A Language The Computer Can Understand?
Scripting language
Q18. How Did Early Computer Security Work?
It become pretty easy- just passwords to defend one's pc. With the innovation of the net, however, computer systems have multiplied security with firewalls and hundreds of anti-virus programs.
Q19. Which Protocol Does Https Uses At The Trport Layer For Sending And Receiving Data?
TCP
Q20. A(n) ____ Attack Makes A Copy Of The Trmission Before Sending It To The Recipient?
Replay
Q21. A ____ Virus Infects The Master Boot Record Of A Hard Disk Drive?
Boot
Q22. Targeted Attacks Against Financial Networks, Unauthorized Access To Information, And The Theft Of Personal Information Is Sometimes Known As ____?
Cybercrime
Q23. ____ Typically Involves Using Client-aspect Scripts Written In Javascript That Are Designed To Extract Information From The Victim And Then Pass The Information To The Attacker?
Correct Answer: Cross website online scripting (XSS)
Q24. ____ Enables The Attacker's Computer To Forward Any Network Traffic It Receives From Computer A To The Actual Router?
IP forwarding.
Q25. How Are Subnets Used To Improve Network Security?
Subnets enhance community security and performance via arranging hosts into distinct logical agencies. Subnetting is needed while one community cope with wishes to be distributed throughout more than one network segments. Subnetting is required whilst a corporation makes use of or more styles of network technologies like Ethernet and Token Ring.
Q26. Difference Between Network And Operating System Security?
Network safety concentrates on the packets of facts flowing among laptop systems. Operating System protection controls get entry to to resources on the server itself. Therefore, the 2 are searching at different things in phrases of safety.
Q27. Encryption Under The Wpa2 Personal Security Model Is Accomplished By ____?
AES-CCMP
Q28. Explain In Mobile And Computer And Home Is It Possible That We See And Listen Person Voice And Activity Carefully For Destroying Their Privacy?
Yes, it could be feasible by 0.33 birthday celebration software program in pc and 3g in cell.In laptop 1/3 software like skype can be better media of communication method.
Q29. How Does An Encryption Help Security Of An Network?
One of the important thing targets of computer security is confidentiality - statistics is most effective available to folks that are presupposed to have get right of entry to to it. Encryption enables guard confidentiality of records trmitted over a community through (if it works as supposed) making it hard or impossible for a person who isn't always legal to have the information to make experience of it if they intercept the information in trit. In instances of statistics stored on a network, if it's miles stored in encrypted shape, it may make it tough or impossible for an attacker to get whatever useful from the encrypted file.
Q30. What Is The Difference Between An Exploit And Vulnerability In Information Security?
A vulnerability is a vulnerable factor in a device. This implies a hazard, especially to exclusive statistics. An take advantage of is a me of taking advantage of the vulnerability and using it to take gain of a machine or community. Just due to the fact some thing has been identified as a vulnerability does not suggest that it has been used to compromise a device. The presence of the make the most me a person has effectively used that weak spot and taken advantage of it.
Q31. With Operating System Virtualization, A Virtual Machine Is Simulated As A Self-contained Software Environment By The ____ System (the Native Operating System To The Hardware)?
Host
Q32. What Does Your Network/protection Architecture Diagram Look Like?
The first element you need to recognise to shield your community and systems is what you're protecting. You must understand:
The bodily topologies
Logical topologies (Ethernet, ATM, 802.11, VoIP, and many others.)
Types of running systems
Perimeter protection measures (firewall and IDS placement, and many others.)
Types of devices used (routers, switches, and so forth.)
Location of DMZs
IP deal with tiers and subnets
Use of NAT In addition, you should realize in which the diagram is saved and that it's far regularly up to date as adjustments are made.
Q33. Under The _____ , Healthcare Enterprises Must Guard Protected Health Information And Implement Policies And Procedures To Safeguard It, Whether It Be In Paper Or Electronic Format?
HIPAA.
Q34. A Computer ____ Is A Program That Secretly Attaches Itself To A Legitimate "service," Such As A Document Or Program, And Then Executes When That Document Is Opened Or Program Is Launched?
Virus
Q35. What Resources Are Located On Your Dmz?
Only systems that are semi-public ought to be saved at the DMZ. This consists of external net servers, outside mail servers, and outside DNS. A cut up-structure can be used wherein internal net, mail, and DNS are also placed on the inner network.
Q36. What Are The Three Legs Of Network Security?
The three predominant tenets of safety overall area: Confidentiality Availability Integrity.
Q37. Which Feature On A Cisco Ios Firewall Can Be Used To Block Incoming Traffic On A Ftp Server?
Extended ACL.
Q38. What Is Srm (protection Reference Monitor)?
The Security Reference Monitor is the kernel mode aspect that does the actual get entry to validation, as well as audit technology
Q39. What Is Sam (protection Account Manager)?
SAM stands for Security Account Manager and is the only who maintains the safety database, saved within the registry below HKLMSAM. It serves the Local Security Authority (LSA) with SIDs. The SAM maintains the consumer account database.
Q40. How Is Your Wireless Infrastructure Secured?
Wireless get entry to must as a minimum use WEP with 128-bit encryption. Although this offers a few safety, it isn't very strong, which is why your wi-fi network have to now not be used for sensitive records. Consider transferring to the 802.11i wellknown with AES encryption while it's miles finalized
Q41. Explain How Does Trace Route Work? Now How Does Trace Route Make Sure That The Packet Follows The Same Path That A Previous (with Ttl - 1) Probe Packet Went In?
First of all see traceroute works using ICMP packets. First source sends an ICMP packet with Time to Live (TTL) area as 1 to the vacation spot deal with. Now intermediate router receives the packet and sees that TTL subject has expired, so it sends a ICMP TTL expired respond. Now the supply machine again sends the ICMP packet with TTL subject as @This time 2d intermediate router replies. This method is repeated till destination is reached. That way the source can get the whole route upto destination.
Q42. ____, Also Called Add-ons, Represent A Specific Way Of Implementing Activex And Are Sometimes Called Activex Applications?
ActiveX controls.
Q43. The ____ Is The Link Between The Cellular Network And The Wired Telephone World And Controls All Trmitters And Base Stations In The Cellular Network?
MTSO
Q44. Instead Of The Web Server Asking The User For The Same Information Each Time She Visits That Site, The Server Can Store That User-specific Information In A File On The User's Local Computer And Then R
cookie
Q45. How Do You Prevent Ddos Attack?
You do not have a lot desire, only successfully configured firewall/iptables (which isn't a trivial challenge to do) let you to save you it. But there is no 100%
Q46. ____ Work To Protect The Entire Network And All Devices That Are Connected To It?
NIPS
Q47. An Attacker Could Alter The Mac Address In The Arp Cache So That The Corresponding Ip Address Would Point To A Different Computer, Which Is Known As ____?
ARP poisoning.
Q48. Are You Performing Content Level Inspections?
In addition to the content stage inspection carried out by way of the IDS, unique content material inspections should additionally be accomplished on internet server traffic and different application traffic. Some attacks evade detection via containing themselves in the payload of packets, or by altering the packet in some manner, including fragmentation. Content level inspection at the net server or application server will protect against assaults along with those which might be tunneled in legitimate communications, attacks with malicious records, and unauthorized software utilization.
Q49. What Is Included In Your Disaster Recovery Plan?
Your disaster recovery plan (DRP) have to include recuperation of facts centers and recovery of commercial enterprise operations. It must also encompass recovery of the accrual physical business area and restoration of the business tactics vital to renew regular operations. In addition, the DRP ought to cope with change working websites.
Q50. How Often Is Your Disaster Recovery Plan Tested?
The plan is no exact until it is tested at the least as soon as a year. These checks will iron out problems in the plan and make it greater green and successful if/whilst it is wished. Testing can encompass walkthroughs, simulation, or a complete out implementation.
