text
stringlengths 93
748
|
---|
<s>[INST] 101) Name common types of non-physical threats. [/INST]
Following are various types of non-physical threats:
Trojans
Adware
Worms
Spyware
Denial of Service Attacks
Distributed Denial of Service Attacks
Virus
Key loggers
Unauthorized access to computer systems resources
Phishing
</s> |
<s>[INST] 102) Explain the sequence of a TCP connection. [/INST]
The sequence of a TCP connection is SYN-SYN ACK-ACK.
</s> |
<s>[INST] 103) Define hybrid attacks. [/INST]
Hybrid attack is a blend of dictionary method and brute force attack. This attack is used to crack passwords by making a change of a dictionary word with symbols and numbers.
</s> |
<s>[INST] 104) What is Nmap? [/INST]
Nmap is a tool which is used for finding networks and in security auditing.
</s> |
<s>[INST] 105) What is the use of EtterPeak tool? [/INST]
EtterPeak is a network analysis tool that is used for sniffing packets of network traffic.
</s> |
<s>[INST] 106) What are the types of cyber-attacks? [/INST]
There are two types of cyberattacks: 1) Web-based attacks, 2) System based attacks.
</s> |
<s>[INST] 107) List out web-based attacks [/INST]
Some web-based attacks are: 1) SQL Injection attacks, 2) Phishing, 3) Brute Force, 4) DNS Spoofing, 4) Denial of Service, and 5) Dictionary attacks.
</s> |
<s>[INST] 108) Give examples of System-based attacks [/INST]
Examples of system-based attacks are:
Virus
Backdoors
Bots
Worm
</s> |
<s>[INST] 109) List out the types of cyber attackers [/INST]
There are four types of cyber attackers. They are: 1) cybercriminals, 2) hacktivists, 3) insider threats, 4) state-sponsored attackers.
</s> |
<s>[INST] 110) Define accidental threats [/INST]
They are threats that are accidently done by organization employees. In these threats, an employee unintentionally deletes any file or share confidential data with outsiders or a business partner going beyond the policy of the company.
These interview questions will also help in your viva(orals)
</s> |