Information Security Professional

  Home  Security  Information Security Professional


“Information Security Officer related Frequently Asked Questions in various Information Security Professional job interviews by interviewer. The set of questions here ensures that you offer a perfect answer posed to you. So get preparation for your new job hunting”



95 Information Security Professional Questions And Answers

41⟩ List out the steps to successful data loss prevention controls and Explain?

☛ Create an information risk profile

☛ Create an impact severity and response chart

☛ Based on severity and channel determine incident response

☛ Create an incident workflow diagram

☛ Assign roles and responsibilities to the technical administrator, incident analyst, auditor and forensic investigator

☛ Develop the technical framework

☛ Expand the coverage of DLP controls

☛ Append the DLP controls into the rest of the organization

☛ Monitor the results of risk reduction

 152 views

42⟩ Tell me for security analyst what are the useful certification?

Useful certification for security analyst are

☛ Security Essentials (GSEC): It declares that candidate is expert in handling basic security issues- it is the basic certification in security

☛ Certified Security Leadership: It declares the certification of management abilities and the skills that is required to lead the security team

☛ Certified Forensic Analyst: It certifies the ability of an individual to conduct formal incident investigation and manage advanced incident handling scenarios including external and internal data breach intrusions

☛ Certified Firewall Analyst: It declares that the individual has proficiency in skills and abilities to design, monitor and configure routers, firewalls and perimeter defense systems

 161 views

46⟩ Tell me what is an easy way to configure a network to allow only a single computer to login on a particular jack?

Sticky ports are one of the network admin’s best friends and worst headaches. They allow you to set up your network so that each port on a switch only permits one (or a number that you specify) computer to connect on that port by locking it to a particular MAC address. If any other computer plugs into that port, the port shuts down and you receive a call that they can’t connect anymore. If you were the one that originally ran all the network connections then this isn’t a big issue, and likewise if it is a predictable pattern then it also isn’t an issue. However if you’re working in a hand-me-down network where chaos is the norm then you might end up spending a while toning out exactly what they are connecting to.

 159 views

47⟩ Suppose you find PHP queries overtly in the URL, such as /index.php=?page=userID. What would you then be looking to test?

This is an ideal situation for injection and querying. If we know that the server is using a database such as SQL with a PHP controller, it becomes quite easy. We would be looking to test how the server reacts to multiple different types of requests, and what it throws back, looking for anomalies and errors.

One example could be code injection. If the server is not using authentication and evaluating each user, one could simply try /index.php?arg=1;system(‘id’) and see if the host returns unintended data.

 139 views

49⟩ Suppose you find out that there is an active problem on your network. You can fix it, but it is out of your jurisdiction. What do you do?

This question is a biggie. The true answer is that you contact the person in charge of that department via email – make sure to keep that for your records – along with CCing your manager as well. There may be a very important reason why a system is configured in a particular way, and locking it out could mean big trouble. Bringing up your concerns to the responsible party is the best way to let them know that you saw a potential problem, are letting them know about it, and covering yourself at the same time by having a timestamp on it.

 190 views

50⟩ Explain what is the difference between Encoding, Encryption and Hashing?

At a very high level, all these 3 terms might appear to be similar and people often confuse between them. But each of the technique is distinct and has different use case. The purpose of encoding is to transform data so that it can be properly (and safely) consumed by a different type of system, e.g. binary data being sent over email, or viewing special characters on a web page. The goal is not to keep information secret, but rather to ensure that it’s able to be properly consumed. It does not require a key as the only thing required to decode it is the algorithm that was used to encode it. Examples: ASCII, Unicode, URL Encoding, Base64. The purpose of encryption is to transform data in order to keep it secret from others. It uses a key, which is kept secret, in conjunction with the plaintext and the algorithm, in order to perform the encryption operation. Examples: AES, Blowfish, RSA. The purpose of hashing is to take arbitrary input and produce a fixed-length string that has the following attributes:

The same input will always produce the same output.

Multiple disparate inputs should not produce the same output.

It should not be possible to go from the output to the input.

Any modification of a given input should result in drastic change to the hash.

Examples- MD5, SHA1, SHA2 etc. Hashing is often used in computer forensics to verify integrity of the digital evidence.

 157 views

52⟩ Tell me what are personal traits you should consider protecting data?

☛ Install anti-virus on your system

☛ Ensure that your operating system receives an automatic update

☛ By downloading latest security updates and cover vulnerabilities

☛ Share the password only to the staff to do their job

☛ Encrypt any personal data held electronically that would cause damage if it were stolen or lost

☛ On a regular interval take back-ups of the information on your computer and store them in a separate place

☛ Before disposing off old computers, remove or save all personal information to a secure drive

☛ Install anti-spyware tool

 154 views

53⟩ Explain me techniques used to prevent web server attacks?

☛ Patch Management

☛ Secure installation and configuration of the O.S

☛ Safe installation and configuration of the web server software

☛ Scanning system vulnerability

☛ Anti-virus and firewalls

☛ Remote administration disabling

☛ Removing of unused and default account

☛ Changing of default ports and settings to customs port and settings

 146 views

54⟩ Explain me what is WEP cracking? What are the types of WEP cracking?

WEP cracking is the method of exploiting security vulnerabilities in wireless networks and gaining unauthorized access.

There are basically two types of cracks

☛ Active cracking: Until the WEP security has been cracked this type of cracking has no effect on the network traffic.

☛ Passive cracking: It is easy to detect compared to passive cracking. This type of attack has increased load effect on the network traffic.

 166 views

55⟩ Suppose you had to both encrypt and compress data during transmission, which would you do first, and why?

If they don’t know the answer immediately it’s ok. The key is how they react. Do they panic, or do they enjoy the challenge and think through it? I was asked this question during an interview at Cisco. I told the interviewer that I didn’t know the answer but that I needed just a few seconds to figure it out. I thought out loud and within 10 seconds gave him my answer: “Compress then encrypt. If you encrypt first you’ll have nothing but random data to work with, which will destroy any potential benefit from compression.

 165 views

56⟩ Tell me how would you implement a secure login field on a high traffic website where performance is a consideration?

We’re looking for a basic understanding of the issue of wanting to serve the front page in HTTP, while needing to present the login form via HTTPs, and how they’d recommend doing that. A key piece of the answer should center around avoidance of the MiTM threat posed by pure HTTP. Blank stares here mean that they’ve never seen or heard of this problem, which means they’re not likely to be anything near pro level.

 178 views

57⟩ Tell me you see a user logging in as root to perform basic functions. Is this a problem?

A Linux admin account (root) has many powers that are not permitted for standard users. That being said, it is not always necessary to log all the way off and log back in as root in order to do these tasks. For example, if you have ever used the ‘run as admin’ command in Windows, then you will know the basic concept behind ‘sudo’ or ‘superuser (root) do’ for whatever it is you want it to do. It’s a very simple and elegant method for reducing the amount of time you need to be logged in as a privileged user. The more time a user spends with enhanced permissions, the more likely it is that something is going to go wrong – whether accidentally or intentionally.

 171 views

58⟩ Suppose you manage to capture email packets from a sender that are encrypted through Pretty Good Privacy (PGP). What are the most viable options to circumvent this?

First, one should be considering whether to even attempt circumventing the encryption directly. Decryption is nearly impossible here unless you already happen to have the private key. Without this, your computer will be spending multiple lifetimes trying to decrypt a 2048-bit key. It’s likely far easier to simply compromise an end node (i.e. the sender or receiver). This could involve phishing, exploiting the sending host to try and uncover the private key, or compromising the receiver to be able to view the emails as plain text.

 166 views

59⟩ Do you know what’s the difference between encoding, encryption, and hashing?

Encoding is designed to protect the integrity of data as it crosses networks and systems, i.e. to keep its original message upon arriving, and it isn’t primarily a security function. It is easily reversible because the system for encoding is almost necessarily and by definition in wide use. Encryption is designed purely for confidentiality and is reversible only if you have the appropriate key/keys. With hashing the operation is one-way (non-reversible), and the output is of a fixed length that is usually much smaller than the input.

 203 views

60⟩ Tell us on a Windows network, why is it easier to break into a local account than an AD account?

Windows local accounts have a great deal of baggage tied to them, running back a long long way to keep compatibility for user accounts. If you are a user of passwords longer than 13 characters, you may have seen the message referring to this fact. However, Active Directory accounts have a great deal of security tied onto them, not the least of which is that the system actually doing the authenticating is not the one you are usually sitting at when you are a regular user. Breaking into a Windows system if you have physical access is actually not that difficult at all, as there are quite a few dedicated utilities for just such a purpose, however that is beyond the scope of what we’ll be getting into here.

 201 views