Cyber Security Q & A by NovaSkillHub
Cyber Security Q & A by NovaSkillHub
"All Q&A banks and important updates related to NovaSkillHub will be shared directly on
our Instagram and Telegram!
Follow our Instagram page
https://www.instagram.com/novaskillhub60?igsh=aDF5ZnJtc2p6d3k=
Join our Telegram channel https://t.me/novaskillhub
Stay connected and don’t miss any update — everything will be available there!
4 Marks Questions
4. Executive Information Systems (EIS): Provide top-level executives with easy access to
internal and external information for strategic decisions.
5 Marks Questions
Ans:
An Information System (IS) is an integrated set of components for collecting, storing, and
processing data and delivering information, knowledge, and digital products. Businesses rely
on information systems to carry out and manage their operations, interact with customers
and suppliers, and compete in the marketplace.
o Help middle managers monitor and control the business by providing regular
reports on operations.
These systems are essential for organizations to function efficiently and to gain a competitive
advantage.
Ans:
Information Systems are vulnerable to various threats that can cause serious damage to
businesses, individuals, and governments.
Effective risk analysis helps in better security planning and ensures that the organization's
information assets are well protected.
Q3. Discuss the Need for Information Security and the Role of Cyber Security.
Ans:
The growing dependence on technology has made organizations and individuals more
vulnerable to cyber threats. Therefore, information security has become crucial to:
• Meet Legal Requirements: Compliance with laws like GDPR, HIPAA, etc.
Without cyber security, organizations risk not just financial loss but also legal penalties and
brand damage.
• Nmap
• Netcat
4 Marks Questions
• Port scanning.
• Banner grabbing.
5 Marks Questions
Q1. Explain the Overview of Vulnerability Scanning and its Key Techniques.
Ans:
Vulnerability scanning is a key security technique used to identify weaknesses in systems,
networks, or applications that could be exploited by attackers. It is an automated process
that continuously monitors the environment to detect vulnerabilities such as unpatched
software, misconfigurations, and open ports.
o Scanning the system to find ports that are open and listening for connections.
o Open ports reveal running services that can be entry points for attackers.
2. Banner/Version Check:
3. Traffic Probe:
o Sending specially crafted packets to the target system to study how it
responds.
4. Vulnerability Probe:
Thus, vulnerability scanning plays a critical role in maintaining a strong security posture.
Q2. Discuss Network Vulnerability Scanning with Netcat, Port, and Service Tools.
Ans:
Network vulnerability scanning focuses on finding weaknesses in network devices, servers,
and services. Specialized tools like Netcat are used to detect and analyze open ports and
services.
Netcat (nc):
• Helps in port scanning, data transfer, banner grabbing, and setting up simple servers.
• Ports are endpoints for communication; each service listens on a specific port.
Thus, network vulnerability scanning is an essential task for maintaining network security.
Q3. Explain Network Reconnaissance using Nmap and the Role of Network Sniffers like
Wireshark.
Ans:
Network Reconnaissance:
Network reconnaissance is the process of gathering detailed information about the
structure, devices, and services of a network to plan potential attacks or defensive
strategies.
• Nmap is a powerful open-source tool used for network discovery and security
auditing.
• It can detect live hosts, open ports, running services, and operating systems.
• Features like OS fingerprinting, version detection, and scriptable interaction with the
target make it highly useful for reconnaissance.
• It helps in:
Use Case:
• A penetration tester uses Nmap to discover all devices on a network and open ports.
• Then, uses Wireshark to analyze the traffic and detect weaknesses like unencrypted
credentials being transmitted.
Thus, combining reconnaissance tools like Nmap and Wireshark provides a complete view of
the network’s vulnerabilities and strengthens the overall security posture.
UNIT 3: Network Defense Tools
2 Marks Questions
4 Marks Questions
• Stateless Firewalls:
• Stateful Firewalls:
• Windows Firewall:
5 Marks Questions
Q1. Explain Firewall Basics and How Firewalls Protect a Network.
Ans:
A firewall is a crucial security device designed to prevent unauthorized access to or from a
private network. Firewalls can be hardware-based, software-based, or a combination of
both. They enforce security policies by filtering traffic based on IP addresses, domain names,
protocols, ports, and specific keywords.
Firewalls are the first line of defense and critical in securing network infrastructure against
both internal and external threats.
Q2. Differentiate between Packet Filter vs Firewall and Explain Packet Characteristics to
Filter.
Ans:
Packet Filter vs Firewall:
• Packet Filter:
• Firewall:
By analyzing these packet characteristics, firewalls and packet filters can accurately
determine whether to allow or deny network traffic.
Q3. Explain NAT, Port Forwarding, and the Basics of Virtual Private Networks (VPNs).
Ans:
Network Address Translation (NAT):
NAT is a method used to remap one IP address space into another by modifying the network
address information in IP packet headers. It allows multiple devices in a private network to
access the Internet using a single public IP address, enhancing security by hiding internal
network structures.
Port Forwarding:
Port Forwarding is a feature of NAT that forwards external traffic coming to a specific port to
a designated device inside the private network. It is commonly used to allow external
devices to access services such as web servers or gaming servers located within the internal
network.
By combining NAT, Port Forwarding, and VPNs, organizations can secure their network
communications and provide access control effectively.
Q4. Discuss the Functionality of Linux Firewall, Windows Firewall, and Introduction to
Snort IDS.
Ans:
Linux Firewall:
Linux systems primarily use iptables or firewalld to manage network traffic. They provide
powerful control over:
• Setting up NAT.
• Protecting Linux servers from unauthorized access. Firewall rules can be customized
extensively based on ports, IP addresses, and protocols.
Windows Firewall:
Windows Firewall is integrated into Windows operating systems. It offers:
Together, firewalls and IDS tools like Snort provide a layered security approach to defend
networks against various types of cyber threats.
• Identity theft
• Cyberstalking
4 Marks Questions
• Lack of physical evidence: Crimes are committed digitally, with limited physical
traces.
• Preparation
• Identification
• Containment
• Eradication
• Recovery
• Lessons learned
The aim is to limit damage and reduce recovery time and costs.
5 Marks Questions
• Identity Theft: Stealing personal information like credit card numbers for fraud.
Hacking:
Hacking is the process where cyber criminals exploit vulnerabilities in systems to gain
unauthorized access to data or control. Hackers may alter, steal, or destroy information.
Hacking can be ethical (for security testing) or malicious (for personal gain).
Cyber crime is a growing threat, requiring strong cyber laws and digital literacy among users
to combat it effectively.
Q2. What are Attack Vectors? Explain Clarification of Terms Related to Cyber Crime.
Ans:
Attack Vectors:
Attack vectors are techniques or pathways used by cyber criminals to infiltrate computer
systems or networks. Common attack vectors include:
Clarification of Terms:
Q3. Discuss Traditional Problems Associated with Computer Crime and Incident Response.
Ans:
Traditional Problems:
• Anonymity: Cyber criminals can mask their identity, making it difficult to trace them.
• Jurisdiction: Cyber crimes often cross multiple legal regions, creating complications
in prosecution.
• Lack of Awareness: Victims often do not realize they have been attacked until
significant damage is done.
Incident Response: Incident Response is crucial for minimizing the damage of cyber attacks.
It involves:
A proper incident response plan ensures that organizations can respond quickly and
effectively to cyber attacks.
Q4. Define Digital Forensics, Realms of the Cyber World, and History of the Internet.
Ans:
Digital Forensics:
Digital forensics involves the investigation of digital devices to find evidence related to cyber
crimes. It includes collecting, preserving, and analyzing data from computers, mobile
devices, and networks for use in court.
• Deep Web: Private websites and data not indexed by search engines.
• Dark Web: Hidden part of the internet used often for illegal activities.
• 1960s: ARPANET, the first network created by the U.S. Department of Defense.
• 1990s: The World Wide Web (WWW) was introduced, leading to a boom in internet
usage.
Understanding these concepts helps in comprehending how cyber crime has evolved with
technology.
Q5. Recognize and Define Computer Crime, Contemporary Crimes, and the Indian IT Act
2000.
Ans:
Recognizing and Defining Computer Crime:
Computer crime refers to any illegal act that involves a computer as a tool, target, or both.
Crimes include hacking, spreading malware, cyberbullying, and financial theft.
Contemporary Crimes:
• Ransomware Attacks: Encrypting user files and demanding payment for decryption.
Computers as Targets:
Cyber attacks often specifically target computers to steal, alter, or destroy data. Examples
include:
• Virus:
A virus is a malicious program that attaches itself to a legitimate file or program and
spreads when the file or program is executed. Example: ILOVEYOU virus.
• Worm:
A worm is a standalone malware that replicates itself to spread to other computers
without human intervention. Example: Mydoom worm.
Both cause data loss, system slowdowns, and can open the door for other attacks.
Both attacks overwhelm systems, disrupt services, and cause financial loss.
Proper encryption (WPA3) and strong passwords can mitigate these risks.
5 Marks Questions
Ans:
Password Cracking:
Password cracking refers to the methods used to discover passwords by brute force,
dictionary attacks, or exploiting weaknesses in password storage. Tools like John the Ripper
and Hydra are commonly used. Attackers aim to gain unauthorized access to systems or
accounts.
Keyloggers:
Keyloggers record every keystroke typed on a computer. They can be software or hardware-
based. Once installed, they collect usernames, passwords, and confidential data without the
user's knowledge.
Spyware:
Spyware secretly gathers user information and transmits it to external parties without
consent. It monitors browsing habits, collects sensitive data, and may slow down the system.
Spyware often comes bundled with free software or downloads.
Together, these techniques are major threats to cybersecurity and personal privacy.
Ans:
Virus:
A virus is a malicious code that attaches itself to a host program and spreads when the
program is executed. It can corrupt data, reformat hard drives, or crash systems.
Worms:
Unlike viruses, worms are standalone programs that replicate themselves and spread
independently. They often cause network congestion and resource depletion.
Trojans:
A Trojan horse appears as a useful program but carries malicious code inside. Trojans can
create backdoors, enabling attackers to control infected systems remotely.
Backdoors:
Backdoors are hidden entry points into software or systems, bypassing normal
authentication. Hackers use backdoors to maintain unauthorized access long after the
system is compromised.
These malware types form the core arsenal for cyber attackers and must be defended
against with strong antivirus measures and vigilant system monitoring.
Ans:
Steganography:
Steganography is the art of hiding secret information within an ordinary, non-secret file or
message. Examples include embedding messages in image pixels or audio files. It differs
from encryption, as the existence of the hidden message is concealed, not just its contents.
DOS Attack:
In a Denial of Service (DoS) attack, the attacker floods the target server with overwhelming
traffic from a single source, making the service unavailable to legitimate users.
DDOS Attack:
Distributed Denial of Service (DDoS) attacks involve multiple compromised computers
attacking a target, greatly increasing the scale of the attack. DDoS attacks are coordinated
and harder to stop because they originate from different locations.
These attacks are intended to paralyze services, damage reputation, and cause significant
financial loss.
Q4. Explain SQL Injection, Buffer Overflow, and Wireless Network Attacks.
Ans:
SQL Injection:
In SQL Injection, attackers insert malicious SQL commands into input fields of websites to
manipulate the database.
Consequences include:
• Unauthorized data access
Buffer Overflow:
A buffer overflow occurs when more data is written to a buffer than it can hold. Attackers
exploit this by injecting malicious code into the memory space, potentially gaining control
over the system.
Buffer overflow attacks are dangerous because they can allow remote execution of arbitrary
code.
• Eavesdropping
• Deauthentication attacks
• Fake hotspots
Using strong encryption (WPA3), disabling SSID broadcasts, and MAC address filtering can
reduce the risk of wireless attacks.
Information System
Information Assurance
Cyber Security
Vulnerability Scanning
Banner/Version Check
Examples of Vulnerabilities
• Firewalls block unauthorized access; Packet filters control network packet flow.
Firewall Protection
Cyber Crimes
Incident Response
Digital Forensics
Password Cracking
Steganography
SQL Injection
Buffer Overflow
"All Q&A banks and important updates related to NovaSkillHub will be shared directly on
our Instagram and Telegram!
Follow our Instagram page
https://www.instagram.com/novaskillhub60?igsh=aDF5ZnJtc2p6d3k=
Join our Telegram channel https://t.me/novaskillhub
Stay connected and don’t miss any update — everything will be available there!
Together, let’s build a future with "Career Growth with Technology and Real Education.