Cyber Security Interview Questions and Answers
Question - 91 : - Define an access token.
Answer - 91 : -
An access token is a credential which is used by the system to check whether the API should be granted to a particular object or not.
Question - 92 : - Explain ARP Poisoning
Answer - 92 : -
ARP (Address Resolution Protocol) Poisoning is a type of cyber-attack which is used to convert IP address to physical addresses on a network device. The host sends an ARP broadcast on the network, and the recipient computer responds back with its physical address.
ARP poisoning is sending fake addresses to the switch so that it can associate the fake addresses with the IP address of a genuine computer on a network and hijack the traffic.
Question - 93 : - Name common types of non-physical threats.
Answer - 93 : -
Following are various types of non-physical threats:
- Trojans
- Adware
- Worms
- Spyware
- Denial of Service Attacks
- Distributed Denial of Service Attacks
- Virus
- Key loggers
- Unauthorized access to computer systems resources
- Phishing
Question - 94 : - Explain the sequence of a TCP connection.
Answer - 94 : -
The sequence of a TCP connection is SYN-SYN ACK-ACK.
Question - 95 : - Define hybrid attacks.
Answer - 95 : -
Hybrid attack is a blend of dictionary method and brute force attack. This attack is used to crack passwords by making a change of a dictionary word with symbols and numbers.
Question - 96 : - What is Nmap?
Answer - 96 : -
Nmap is a tool which is used for finding networks and in security auditing.
Question - 97 : - What is the use of EtterPeak tool?
Answer - 97 : -
EtterPeak is a network analysis tool that is used for sniffing packets of network traffic.
Question - 98 : - What are the types of cyber-attacks?
Answer - 98 : -
There are two types of cyberattacks: 1) Web-based attacks, 2) System based attacks.
Question - 99 : - List out web-based attacks
Answer - 99 : -
Some web-based attacks are: 1) SQL Injection attacks, 2) Phishing, 3) Brute Force, 4) DNS Spoofing, 4) Denial of Service, and 5) Dictionary attacks.
Question - 100 : - Give examples of System-based attacks
Answer - 100 : -
Examples of system-based attacks are: