Questions
Questions
Questions
Firewall
IDS/IPS
Proxy
DNS
DHCP
AD active server
Database
File server
Windows
2. SIEM components?
https://www.manageengine.com/log-management/siem/siem-components.html
7. What is firewall?
URL: https://www.simplilearn.com/tutorials/cyber-security-tutorial/what-is-
firewall
A firewall is a network security device, either hardware or software-based, which
monitors all incoming and outgoing traffic and based on a defined set of security
rules it accepts, rejects or drops that specific traffic.
Accept: allow the traffic
Reject: block the traffic but reply with an “unreachable error”
Drop: block the traffic with no reply
A firewall establishes a barrier between secured internal networks and outside
untrusted network, such as the Internet.
Know which assets are most at risk with complete context awareness
Quickly react to attacks with intelligent security automation that sets policies
and hardens your defenses dynamically
Better detect evasive or suspicious activity with network and endpoint event
correlation
Greatly decrease the time from detection to cleanup with retrospective
security that continuously monitors for suspicious activity and behavior even
after initial inspection
Ease administration and reduce complexity with unified policies that protect
across the entire attack continuum
16. Parsing
Data parsing is converting data from one format to another. Widely used for data
structuring, it is generally done to make the existing, often unstructured, unreadable
data more comprehensible.
17. NIC
A Network Interface Card (NIC) provides networking capabilities for a computer. It
may enable a wired connection (Ethernet) or a wireless connection (Wi-Fi) to a local
area network.
26. What are the different types of Splunk dashboards available in Splunk?
Following are the three different types of Splunk dashboards available in Splunk:
Real-time dashboards
Dynamic form-based dashboards
Dashboards for scheduled reports
28. What are the different types of search modes supported in Splunk?
Splunk supports the following three types of dashboards:
Fast mode
Smart mode
Verbose mode
https://www.devopsschool.com/blog/top-50-splunk-interview-questions-and-
answers/
In Dos attack single system targets the In DDoS multiple systems attacks the
victim system. victim’s system.
Victim PC is loaded from the packet of Victim PC is loaded from the packet of data
data sent from a single location. sent from Multiple location.
In DOS Attack only single device is In DDoS attack,The volumeBots are used to
used with DOS Attack tools. attack at the same time.
DOS Attacks are Easy to trace. DDOS Attacks are Difficult to trace.
Types of DOS Attacks are: 1. Buffer Types of DDOS Attacks are: 1. Volumetric
overflow attacks 2. Ping of Death or Attacks 2. Fragmentation Attacks 3.
ICMP flood 3. Teardrop Attack 4. Application Layer Attacks 4. Protocol
Flooding Attack Attack.
34. Eavesdropping
Eavesdropping attacks happen when cyber criminals or attackers listen in to
network traffic traveling over computers, servers, mobile devices and Internet of
Things (IoT) devices.
40. Being a SOC Analyst, what would you do if you found 300 alerts triggered at
once?
Answer: If multiple alerts trigger at the same time, there could be the following three
possibilities:
A single alert may have triggered more than once: If a single alert triggers more than
once, I will distinguish the duplicate alerts.
If the alerts are different: I will prioritize them and choose the one having a higher
impact.
If the alerts are for a new correlation rule: Then alerts may be misconfigured. I will
inform the SIEM Engineer.
(These types of questions are asked by the interviewer to check the practical or
applied knowledge of the candidates)
Key: Random string of bits created specifically for scrambling and unscrambling
data. These are used to encrypt and/or decrypt data. Each key is unique and created
via an algorithm to make sure it is unpredictable. Longer keys are harder to crack.
Common key lengths are 128 bits for symmetric key algorithms and 2048 bits for
public-key algorithms.
Private Key (or Symmetric Key): This means that the encryption and decryption keys
are the same. The two parties must have the same key before they can achieve secure
communication.
Public Key: This means that the encryption key is published and available for
anyone to use. Only the receiving party has access to the decryption key that enables
them to read the message.
51. Whaling
A whaling attack, also known as whaling phishing or a whaling phishing attack, is a
specific type of phishing attack that targets high-profile employees, such as the chief
executive officer or chief financial officer, in order to steal sensitive information from
a company. In many whaling phishing attacks, the attacker's goal is to manipulate
the victim into authorizing high-value wire transfers to the attacker.
52. Steps in Incident response plan
Preparation
Identification
Containment
Eradication
Recovery
Lessons learned.
53. If ur system is attacked with ransomeware how u'll react?
Isolate the Affected Systems
Report the attack
Shut down "Patient Zero"
Secure your Backups
Disable all Maintenance Tasks
Backup the Infected Systems
Identify the Strain
Decide Whether to Pay the Ransom
61. AAA
AAA is a standard-based framework used to control who is permitted to use
network resources (through authentication), what they are authorized to do
(through authorization), and capture the actions performed while accessing the
network (through accounting).
Authentication –
The process by which it can be identified that the user, which wants to access the
network resources, valid or not by asking some credentials such as username and
password. Common methods are to put authentication on console port, AUX port, or
vty lines.
As network administrators, we can control how a user is authenticated if someone
wants to access the network. Some of these methods include using the local database
of that device (router) or sending authentication requests to an external server like
the ACS server. To specify the method to be used for authentication, a default or
customized authentication method list is used.
Authorization –
It provides capabilities to enforce policies on network resources after the user has
gained access to the network resources through authentication. After the
authentication is successful, authorization can be used to determine what resources
is the user allowed to access and the operations that can be performed.
For example, if a junior network engineer (who should not access all the resources)
wants to access the device then the administrator can create a view that will allow
particular commands only to be executed by the user (the commands that are
allowed in the method list). The administrator can use the authorization method list
to specify how the user is authorized to network resources i.e through a local
database or ACS server.
Accounting –
It provides means of monitoring and capturing the events done by the user while
accessing the network resources. It even monitors how long the user has access to
the network. The administrator can create an accounting method list to specify what
should be accounted for and to whom the accounting records should be sent.
AAA implementation: AAA can be implemented by using the local database of the
device or by using an external ACS server.
local database – If we want to use the local running configuration of the router or
switch to implement AAA, we should create users first for authentication and
provide privilege levels to users for Authorization.
ACS server – This is the common method used. An external ACS server is used (can
be ACS device or software installed on Vmware) for AAA on which configuration on
both router and ACS is required. The configuration includes creating a user, separate
customized method list for authentication, Authorization, and Accounting.
The client or Network Access Server (NAS) sends authentication requests to the
ACS server and the server takes the decision to allow the user to access the network
resource or not according to the credentials provided by the user.
Note – If the ACS server fails to authenticate, the administrator should mention
using the local database of the device as a backup, in the method list, to implement
AAA.
To qualify as two-factor authentication, the two access methods used must be two
different factor types. Using a username and password isn’t 2FA because both
factors are knowledge factors. Even an extra security question still doesn’t qualify as
2FA, because a security question is also a knowledge factor.
Now, think of your garage door code (knowledge factor) and your house key
(possession factor). If you want to enter your locked house through the garage, you
need both. This is an example of two-factor authentication, because it relies on
something you know (code) and something you have (key). Without one of them,
you’re not getting through that door easily.
The default https port number is 443, so Tomcat uses 8443 to distinguish this port.
These are the objectives that should be kept in mind while securing a network.
Confidentiality:
Confidentiality means that only authorized individuals/systems can view sensitive
or classified information. The data being sent over the network should not be
accessed by unauthorized individuals. The attacker may try to capture the data
using different tools available on the Internet and gain access to your information. A
primary way to avoid this is to use encryption techniques to safeguard your data so
that even if the attacker gains access to your data, he/she will not be able to decrypt
it. Encryption standards include AES (Advanced Encryption Standard) and DES
(Data Encryption Standard). Another way to protect your data is through a VPN
tunnel. VPN stands for Virtual Private Network and helps the data to move securely
over the network.
Integrity:
The next thing to talk about is integrity. Well, the idea here is to make sure
that data has not been modified. Corruption of data is a failure to maintain data
integrity. To check if our data has been modified or not, we make use of a hash
function.
We have two common types: SHA (Secure Hash Algorithm) and MD5(Message
Direct 5). Now MD5 is a 128-bit hash and SHA is a 160-bit hash if we’re using SHA-
1. There are also other SHA methods that we could use like SHA-0, SHA-2, SHA-3.
Let’s assume Host ‘A’ wants to send data to Host ‘B’ maintaining integrity. A
hash function will run over the data and produce an arbitrary hash value H1 which
is then attached to the data. When Host ‘B’ receives the packet, it runs the same hash
function over the data which gives a hash value H2. Now, if H1 = H2, this means
that the data’s integrity has been maintained and the contents were not modified.
Availability:
This means that the network should be readily available to its users. This applies to
systems and to data. To ensure availability, the network administrator should
maintain hardware, make regular upgrades, have a plan for fail-over, and prevent
bottlenecks in a network. Attacks such as DoS or DDoS may render a network
unavailable as the resources of the network get exhausted. The impact may be
significant to the companies and users who rely on the network as a business tool.
Thus, proper measures should be taken to prevent such attacks.
Installation
A backdoor or remote access trojan is installed by the malware that provides access to the
intruder. This is also another important stage where the attack can be stopped using systems
such as HIPS (Host-based Intrusion Prevention System).
Command and Control
The attacker gains control over the organization’s systems and network. Attackers gain
access to privileged accounts and attempt brute force attacks, search for credentials, and
change permissions to take over the control.
Actions on Objective
The attacker finally extracts the data from the system. The objective involves gathering,
encrypting, and extracting confidential information from the organization’s environment.
The following table illustrates the fundamental differences between penetration testing
and vulnerability assessments –
Vulnerability scan Penetration test
At least quarterly, especially after Once or twice a year, as well as
new equipment is loaded or the anytime the Internet-facing
Frequency
network undergoes significant equipment undergoes significant
changes changes
Provide a comprehensive
baseline of what vulnerabilities Concisely identify what data was
Reports
exist and what changed since the compromised
last report
Lists known software Discovers unknown and
Focus vulnerabilities that could be exploitable weaknesses in normal
exploited business processes
Typically conducted by in-house Best to use an independent
Performed staff using authenticated outside service and alternate
by credentials; does not require a between two or three; requires a
high skill level great deal of skill
Detects when equipment could be
Value Identifies and reduces weaknesses
compromised
81. DMARC?
DMARC (Domain-based Message Authentication Reporting and Conformance) is an email
validation system designed to protect your company’s email domain from being used for
email spoofing, phishing scams and other cybercrimes. DMARC leverages the existing email
authentication techniques SPF (Sender Policy Framework) DKIM (Domain Keys Identified
Mail). DMARC adds an important function, reporting. When a domain owner publishes a
DMARC record into their DNS record, they will gain insight in who is sending email on
behalf of their domain. This information can be used to get detailed information about the
email channel. With this information a domain owner can get control over the email sent on
his behalf. You can use DMARC to protect your domains against abuse in phishing or
spoofing attacks.
Within DMARC it is possible to instruct email receivers what to do with an email which fails
the DMARC checks. In the DMARC record a DMARC policy can be defined that, depending
on the setting, instructs an ISP how to handle emails that fail the DMARC checks. Email
receivers check if incoming messages have valid SPF and DKIM records and if these align
with the sending domain. After these checks a message can be considered as DMARC
compliant or DMARC failed. After the email receiver verifies the authentication status of a
message, they will handle the message differently based on the DMARC policy that is set.
There are 3 possible DMARC policies available: None (monitoring only), Quarantine and
Reject.
Monitor policy: p=none
The first policy is the none (monitor) policy: p=none. The DMARC policy none instructs
email receivers to send DMARC reports to the address published in the RUA or RUF tag of
the DMARC record. This is known as a Monitoring only policy because with this
(recommended starting) policy you gain insight in your email channel. The none policy will
give insight in the email channel but does not instruct email receivers to handle emails
failing the DMARC checks differently, this is why it is also known as the monitor policy. The
none policy only gives insight in who’s sending email on behalf of a domain and will not
affect the deliverability.
Quarantine policy: p=quarantine
The second policy is the quarantine policy: p=quarantine. Besides sending DMARC reports,
the DMARC policy quarantine instructs email receivers to put emails failing the DMARC
checks in the spam folder of the receiver. Emails that pass the DMARc checks will be
delivered in the primary inbox of the receiver. The quarantine policy will already mitigate
the impact of spoofing, but spoof emails will still be delivered to the receiver (in the spam
folder).
Reject policy: p=reject
The third policy is the reject policy: p=reject. The DMARC policy reject. Besides sending
DMARC reports, the DMARC policy reject instructs email receivers to not deliver emails
failing the DMARC checks at all. Emails that pass the DMARC checks will be delivered in
the primary inbox of the receiver. This policy mitigates the impact of spoofing. Since the
DMARC policy reject makes sure all incorrect setup emails (spoofing emails) will be deleted
by the email receiver and not land in the inbox of the receiver.
A DMARC policy is a request not an obligation
91. If you get alert in proxy server, what you will check?
Proxy server logs should track the below information for being useful during an
investigation:
User agents
You should not blindly trust user agent information, it’s something that can easily be
crafted. But making statistics on the user agents can prove useful. Look out for user
agents that indicate the use of a scripting language (Python for example) or user
agents that don’t make sense. You can use User Agent String.com as a reference.
If you control your environment then you can develop a list of “known” and
“accepted” user agents. Everything that’s out of the ordinary should then trigger an
alarm.
If your proxy server logs the computer name you can add this as an extra rule to
validate the trustworthiness of the user agent field.