Q. Define protocol.
Ans. It is a set of rules that
govern all aspects of information communication.
Q. What are the different layers
of OSI?
Ans. The different layers of OSI are:
Ø Data
Link layer
Ø Transport
layer
Ø Application
layer
Ø Session
layer
Ø Presentation
layer
Q. What is the difference between
a wired LAN and a wireless LAN?
Ans. Wired LAN used Ethernet
devices like router, hub, and switch, while wireless LAN uses devices like MiFi
router and WLAN router.
Q. Name some user support layers.
Ans. Some of the user support
layers are:
Ø Application
layer
Ø Presentation
layer
Ø Session
layer
Q. What is the use of TCP in the
IP packets?
Ans. TCP is an acronym of the
transmission control protocol. It is used as a communications protocol in a
private network.
Q. Name the types of errors in
data communication over a network.
Ans. There are two types of
errors:
- Single bit
error
- Burst
error
Q. What is ALOHA?
Ans. ALOHA is a system for
coordinating and arbitrating access to a shared communication network channel.
It is often used to solve the channel allocation issue. Two types of ALOHA are:
- Pure Aloha
- Slotted
Aloha
Q. Which protocols use the
application layer?
Ans. The protocols that use the
application layer are:
Ø SMTP
Ø DNS
Ø TELNET
Ø FTP
Q. What is an intranet?
Ans. It is a private network
based on TCP/IP protocols accessible only by the company’s members or someone
with authorization.
Q.
Explain pipelining.
Ans. When a task has begun
before the previous task has ended is called Pipelining.
Q. What is the difference between
hub and switch?
Ans. A hub is a networking
device that connects multiple computers together, while a switch is a control
unit that turns the flow of electricity in a circuit.
Q. Which layers are referred to
as network support layers?
Ans. The following layers are
referred to as network support layers
Ø Data
Link layer
Ø Physical
layer
Ø Network
layer
Q. Define simplex with an
example.
Ans. A type of communication in
which data is transmitted in one direction is known as simplex. Example:
Monitor
Q. What is RIP?
Ans. RIP stands for Routing
Information Protocol, which is a simple protocol used to exchange information
between the routers.
Q. What are the factors that
affect the performance of the network?
Ans. The factors that affect the
performance of the network are:
Ø Type
of transmission media
Ø Software
Ø Number
of users
Ø Hardware
Q. What are the steps involved in
creating the checksum?
Ans. The following steps are
involved in creating the checksum:
Ø Divide
the data into sections
Ø Add
the sections together using 1’s complement arithmetic
Ø Take
the complement of the final sum
Q. What are the different types
of network security tools?
Ans. The different types of
network security tools are:
- Access
control
- Antivirus
and antimalware software
- Application
security
- Data Loss
Prevention (DLP)
- Email
security
- Firewalls
- Intrusion
prevention systems
- Mobile
device security
- Host-based
Intrusion Detection System (HIDS)
- Network
Intrusion Detection System (NIDS)
- Behavioral
analytics
- Network
segmentation
- Virtual
Private Network (VPN)
- Web
security
- Wireless
security
Q. Explain the basic working of
network security.
Ans. Network security is an
activity that is designed to protect the usability and integrity of the network
and data. It includes both hardware and software technologies and targets a
variety of threats. It combines various layers of defenses at the edge and in
the network. Every network security layer implements distinct policies and
controls. While authorized users gain access to network resources, the
malicious or unauthorized agents are blocked from carrying out exploits and
threats.
Q. What is the meaning of AAA in
network security?
Ans. AAA stands for
Authentication, Authorization, and Accounting. It refers to the protocols that
mediate network access. It is a framework to control user access, implement
policies, and keep track of all activities in the network. Two network
protocols provide AAA functionality namely, Radius and Diameter.
Ø Authentication
ascertains whether a user is legitimate to use the system and the network or
not. It requires a login and password.
Ø Authorization
refers to access control rights. It means that every user on the network can
access only certain data and information, depending on his/her level in the
organization.
Ø Accounting
helps in gathering all activity on the network for each use.
Q. What is IPS in network
security?
Ans.
IPS stands for Intrusion Prevention System. It is also known as Intrusion
Detection Prevention System (IDPS). IPS focuses on tracking the network for any
suspicious or malicious activities attempting to exploit a known vulnerability.
It identifies such activity and then either detects and allows (IDS) or
prevents (IPS) the threat. Some of the approaches to prevent intrusions are
signature-based, protocol-based, anomaly-based, and policy-based IPS.
The
IPS reports such events to system administrators and takes preventative action,
such as closing access points and configuring firewalls to prevent future
attacks.
Q. What are the potential
consequences of a network security attack for an organization?
Ans. A network security attack
can result in irreversible damage to the organization. Some of the potential
outcomes of a network security attack are:
Ø Loss
of sensitive information and proprietary data
Ø Reduction
profits
Ø Loss
of value with shareholders
Ø Loss
of reputation
Ø Deterioration
of brand value
Ø Reduced
trust with customers
Q. What are the Administrator
Privileges? Why they are required while trying to install a download?
Ans. Administrative Privileges
refer to the permissions granted by administrators to users. These privileges
enable them to create, delete, and modify items and settings.
Without
administrative privileges, we cannot perform many system modifications, such as
installing software or changing network settings. If we don’t have
administrator privileges, then we may be able to use a program, but not upgrade
it.
Q. What is network encryption?
How does it work?
Ans.
Ø
Network encryption is the process
of encrypting or encoding data and messages transmitted over a computer
network. It includes various tools, techniques, and standards to ensure that
the messages are unreadable they are transmitting between two or more network
nodes.
Ø
Network encryption helps in
maintaining the confidentiality of information transmitted over a network by
making it difficult for unauthorized agents to have the information and
understand it or get anything useful from it if they intercept the information
in transit. Each message is sent in an encrypted form and is decrypted and
converted back into its original form at the recipient’s end using
encryption/decryption keys.
Q. What do you mean by the CIA
Triad?
Ans. CIA stands for
Confidentiality, Integrity, and Availability. CIA or CIA Triad is a popular
model that is designed to maintain privacy policies for information security in
organizations. Security professionals evaluate threats after assessing their
potential impact on the confidentiality, integrity, and availability of the
organization’s assets. A network is secure only when it possesses the
components that constitute the CIA Triad.
Ø Confidentiality refers to an organization’s
efforts to keep its data private or secret. Thus, only those who are authorized
have access to specific assets while those who are unauthorized are prevented
from accessing.
Ø Integrity refers to ensuring that data is
authentic and reliable. Also, it has not been tampered with.
Ø Availability refers to ensuring that systems,
applications, and data are up and running; and authorized users have access to
resources when they are needed.
Q. What are the benefits of a
firewall?
Ans.
The benefits of firewalls are:
Ø Monitors
network traffic
Ø Enhances
Privacy
Ø Stops
Spyware
Ø Prevents
hacking
Ø Inhibits
virus attacks
Q. What is a Proxy firewall?
Ans. A Proxy Firewall is an
early type of firewall device that serves as the gateway from one network to
another for a specific application. It protects network resources by filtering
messages at the application layer. The firewall proxy server operates at the
application layer through the proxy. This is done by creating and running a
process on the firewall that mirrors a service as if it were running on the end
host.
Q. What is a UTM firewall?
Ans. A Unified threat management
(UTM) firewall refers to the hardware or software device that assembles
different security functions, like a proxy, packet filtering, intrusion
detection and prevention systems, protection against malware, application
control, and more.
Q. Explain Stateful Inspection.
Ans. Also known as dynamic
packet filtering, Stateful Inspection is a firewall technology that monitors
the state of active network connections. It keeps a track of all activities
right from the opening of a connection until it is closed. It allows or blocks
traffic based on state, port, and protocol by utilizing the information
regarding active connections.
Q. Why does an Active FTP not
work with network firewalls?
Ans. Initiating a connection
with the FTP server, established two TCP connections. The second TCP connection
(FTP data connection) initiates and establishes from the FTP server. If a
firewall is between the FTP client and server, it would block the connection
initiated from the FTP server because it is a connection initiated from
outside. Thus, Passive FTP can be used or the firewall rule can be modified to
add the FTP server as trusted.
Q. What is a DDoS attack?
Ans. A DDoS or
Distributed-Denial-of-Service attack is a cyber-attack in which the central
server is continuously flooded with frequent data requests. Such attacks intend
to disrupt the target system and business. In a DDoS attack, the hackers make a
network resource (a website or computer system) unavailable to its users by
disrupting the services of a host connected to the Internet. It is done by
flooding or crashing the website with too much traffic.
Q. What are the types of DDoS
attacks?
Ans. There are three basic
categories of DDoS attacks are:
Ø Volume-based
attacks – they use high traffic to overload the network bandwidth
Ø Protocol
attacks – their objective is to exploit server resources
Ø Application
attacks – they focus on web applications and are the most serious type of
attacks
Different
types of attacks fall into categories based on the traffic quantity and the
vulnerabilities being targeted. Here are some popular types of DDoS attacks:
- ICMP
(Ping) Flood
- SYN Flood
- NTP
Amplification
- HTTP Flood
- Zero-day
DDoS attacks
- UDP Flood
- Smurf
Attack
- Fraggle
Attack
- Slowloris
Q. What is Ransomware?
Ans. Ransomware is a type of
malicious software that enables cyber-criminals to block you from accessing
your own data. The victim’s data is encrypted until the attacker is paid a
predetermined ransom, which is usually in the form of cryptocurrency.
Ransomware may be distributed through email phishing and exploit kits. After
its distribution, the ransomware encrypts selected files and notifies the
victim of the required payment.
Q. How does Ransomware work?
Ans. Ransomware may enter your
network in multiple ways. The most common way is by downloading a spam email
attachment. The download will infect your system with the ransomware program.
Some other ways of ransomware include social engineering, downloads of
malicious software, and malvertising.
The
software gets into your network by an executable file that may have been in a
zip folder or any other attachment. The download file will then encrypts your
data, add an extension to your files, and makes them inaccessible.
Q. Name some different types of
ransomware.
Ans. The different types of
ransomware variants are:
- CryptoLocker
- WannaCry
- Bad Rabbit
- Cerber
- Crysis
- CryptoWall
- GoldenEye
- Jigsaw
- TeslaCrypt
- TorrentLocker
- Locky
Q. What is Malware?
Ans. Short for malicious
software, Malware refers to software variants, such as viruses, worms, adware
ransomware, and spyware that are designed to damage and destroy data and
systems or to gain unauthorized access to a network. Malware is usually sent in
the form of a link or file over email. It requires the target to click on the
link or open the file to execute the malware.
Q. What is Spyware?
Ans. Spyware is unwanted
software that gains access to your computer and reports back to a remote user.
It steals your internet usage data and sensitive information. In simple terms,
it is malicious software that gains access to or damages your computer, without
your knowledge. It is mostly used to steal financial or personal
information.
Q. What is Adware?
Ans. Adware is malicious
software designed to collect data on your computer usage and show appropriate
advertisements up on your screen, often within a web browser. Adware may not
always be malicious but in some cases, it can cause issues for your system. It
can redirect your browser to unsafe sites and it can even contain Trojan horses
and spyware.
Q. What is Phishing?
Ans. Phishing is the fraudulent
practice of sending fraudulent emails, calls, or text messages to targets that
appear to come from a reputable source. It is a cybercrime that tricks the
target into sharing passwords, credit card numbers, and other sensitive information
or installing malware on the victim’s machine by posing as a trusted source. It
is a type of social engineering attack.
Q. How does phishing work?
Ans.
Phishing
is a type of social engineering attack that enables hackers to steal the
victim’s sensitive data, such as login credentials and credit card numbers. It
starts with a fraudulent email or other communication like a text message that
is created to tempt a victim. The communication looks as if it has come from a
trusted source.
The
phishers dupe victims into opening those emails or text messages and the victim
is coaxed into providing confidential information, leading to devastating
results.
Apart
from stealing sensitive data, hackers can infect computers with viruses and
convince victims to participate in money laundering.
Q. What are the different types
of phishing attacks?
Ans. The different types of phishing
attacks are:
1.
Email Phishing: This is the most common
type of Phishing. The phisher will register a fake domain that looks like a genuine
source and send generic requests to obtain confidential information from the
victims. Phishers use the data to steal money or to launch other attacks.
2.
Spear Phishing: It targets specific
individuals instead of a wide group of people after searching the victims on
social media and other sites to customize their communications and appear more
authentic.
3.
Whaling: In this, the attackers go
after those working in senior positions. Attackers spend considerable time
profiling the target to find the best time as well as the means of stealing
their sensitive information.
4.
Smishing and Vishing: In smishing, the victim is
contacted through text messages while vishing involves a telephonic
conversation. The end goal of both is the same as any other kind of phishing
attack.
Q. What does VPN stand for?
Ans. VPN stands for the Virtual
Private Network. It creates a secure network connection over a public network
like the internet.
Q. What is the use of a VPN?
Ans. A VPN or virtual private
network is an encrypted connection over the Internet from a device to a
network. It provides online privacy and anonymity by creating a private network
from a public internet connection. It prevents unauthorized people from spying
on the traffic and allows the user to conduct work remotely.
Q. What are the different types
of VPNs?
Ans. The different types of VPNs
are:
- Remote
access
- Site-to-site
Q. What is Shadow IT?
Ans.
Ø Shadow
IT refers to the use of information technology systems, software, devices,
applications, and services without informing the organization’s IT or security
group. It includes the projects that are managed outside of, and without the
knowledge of the organization’s IT department.
Ø This
practice has grown exponentially lately with the adoption of cloud-based applications
and services. Shadow IT can introduce serious security risks to the
organization through data leaks and potential compliance violations.
Q. What can be
the impact of a computer network attack?
Ø Ans:
Hackers or
attackers target
computer networks to cause irreversible damage to
organizations. Computer networks, when compromised by an attack or hacks, will
result in negative implications to include.
- Loss
of sensitive information and proprietary data
- Loss
of value with shareholders
- Reduced
profits
- The
decline in trust with customers,
- Deterioration
of brand value
- Loss
of reputation
Q. What is the objective of information security
within an organization?
Ans:
Some of the objectives of having a network security program in organizations
include,
Ø Prevent unauthorized network
access
Ø Protect the privacy, integrity and
sensitive information of users in the network
Ø Protect the network from external
attacks hacks and prevent unauthorized users from gaining access to the network
Ø Protect the network from malware
or from different attack types (DDoS, MITM, Eavesdropping, etc.)
Ø Protect all data, stored and
in-transit and to secure all information in the network from being stolen by
malicious users
Ø To ensure the availability of the
network.
Q. What is the
meaning of threat, vulnerability, and risk?
Ans:
In the context of security, threat means the event that can cause harm or
serious damage to computer systems or networks. For example, a virus attack is
viewed as a threat. Threats often result in an attack on computer
networks. Threats are
caused by attackers who attempt to make use of weaknesses in computers in the
network.
Q. What is the
meaning of AAA?
Ans:
AAA stands for Authentication, Authorization,
and Accounting.
Ø Authentication
is the process of determining if a user is legitimate to use the system and the
network. Authentication is usually done using login and password. For example,
you will use a username and password to access your email. The email server
authenticates your username and password and provides further access.
Ø Authorization
refers to access control rights. This implies every user on the network is
allowed access to certain portions of data and information, and applications
according to his/her level in the organization. For example, a marketing person
will not be able to record financial transactions. Hence, a user is authorized
to perform only certain functions on the network system. These authorization
levels are defined by the system administrator who has access to all the
resources and user policies in the network.
Ø Accounting is
known as network accounting which is used to gather all activity on the network
for each use.
Hence, AAA is a framework for network security that is used to control user
access, implement policies, audit usage and keep track of all activities in the
network. AAA helps the system
administrators and security experts to identify any
malicious activity on the network.
2 Comments
Good Questions
ReplyDeleteBest Questions and Answers
ReplyDelete