text
stringlengths
93
748
<s>[INST] 101) Name common types of non-physical threats. [/INST] Following are various types of non-physical threats: Trojans Adware Worms Spyware Denial of Service Attacks Distributed Denial of Service Attacks Virus Key loggers Unauthorized access to computer systems resources Phishing </s>
<s>[INST] 102) Explain the sequence of a TCP connection. [/INST] The sequence of a TCP connection is SYN-SYN ACK-ACK. </s>
<s>[INST] 103) Define hybrid attacks. [/INST] Hybrid attack is a blend of dictionary method and brute force attack. This attack is used to crack passwords by making a change of a dictionary word with symbols and numbers. </s>
<s>[INST] 104) What is Nmap? [/INST] Nmap is a tool which is used for finding networks and in security auditing. </s>
<s>[INST] 105) What is the use of EtterPeak tool? [/INST] EtterPeak is a network analysis tool that is used for sniffing packets of network traffic. </s>
<s>[INST] 106) What are the types of cyber-attacks? [/INST] There are two types of cyberattacks: 1) Web-based attacks, 2) System based attacks. </s>
<s>[INST] 107) List out web-based attacks [/INST] Some web-based attacks are: 1) SQL Injection attacks, 2) Phishing, 3) Brute Force, 4) DNS Spoofing, 4) Denial of Service, and 5) Dictionary attacks. </s>
<s>[INST] 108) Give examples of System-based attacks [/INST] Examples of system-based attacks are: Virus Backdoors Bots Worm </s>
<s>[INST] 109) List out the types of cyber attackers [/INST] There are four types of cyber attackers. They are: 1) cybercriminals, 2) hacktivists, 3) insider threats, 4) state-sponsored attackers. </s>
<s>[INST] 110) Define accidental threats [/INST] They are threats that are accidently done by organization employees. In these threats, an employee unintentionally deletes any file or share confidential data with outsiders or a business partner going beyond the policy of the company. These interview questions will also help in your viva(orals) </s>