1 What is cryptography?
2 What is cryptography?
What is a firewall? Mention its
3 uses.
4 LMS
What is cybersecurity attack?
5 Explain Different Types?
Difference between Symmetric
6 and Asymmetric encryption
What is a firewall, and how does
7 it protext a network?
Brute Force Attack & How it
8 can be prevented
What is a vulnerability
assessment & how does it differ
9 from penetration testing
Define a man-in-the middle
attack and discuss how to
10 prevent it
What are SQL injection attacks
11 and how can they be avoided
What is a two-factor
12 authentication
Describe different forms of data
leakge and their impact of
13 organization
What is rootkit or how can it be
14 detected
How does traceroute work in
15 tracking data routes
What are HTTP response status
codes, and which ones are
critical for web application
16 security?
What are HTTP response status
codes, and which ones are
critical for web application
17 security?
Discuss the key elements of a
strong security policy within an
18 organization ?
Advance Persistent Threats
19 (APT)
What is Cognitive Cybersecurity
and how does is use AI for
20 threat detection>
How does SSH help in securing
21 a server?
What are the security challenges
22 associated with IoT devices ?
Explain Phishing attacks and
23 how to prevent them?
what is data protection at transit
24 and data protection at rest
25
what is a zero-day vulnetrability
26 and why is it dangerous?
How does VPN differ from a
VLAN in terms of network
27 security
What is ethical hacking and
28 what principles does it follow
What is significance of
penetration testing in
29 CyberSecurity?
How do incident response teams
30 manage and mitigate beaches
Difference between malware &
31 ransomware
What is the best method for
32 securing mobile devices
How does machine learning
contribute to cyber security
33 solutions
What are the top 5 reaons for
34 security vulnerabilities?
What are cyber attacks? What
are the most common types of
35 cyber attacks?
What are the elements of
36 Network Security ?
What is a computer virus? How
does it impact the working
37 computer system?
What are pen testing tools ? Can
38 you name a few?
Factors of choosing pen testing
39 tools
40 Man in the middle attack
41 DOS & DDoS Attacks
What are the steps you would
take in case of a real time cyber
42 attack ?
What are types of penetration
43 testing?
what is SSL? what is its
44 importance in cyber security ?
What are webbased and
systembased attacks ? name a
45 few examples ?
What is social engineering ?
What are the types of social
46 engineering ?
What is a computer worm ?
How Computer worm is it
47 different from a virus ?
What is a Honeypot? What are
48 its types?
What are the types of
49 Nonphysical threats ?
50 What are accidental threats ?
How would you find out where
a Traceroute breakdown in a
51 network communication is ?
What is a backdoor ? What is
52 the 80/20 rule of networking?
What is the difference between
security testing and security
53 scanning
What is session hijacking?
Name the various methods of
54 session hijacking
What is a trojan horse? How
55 does it executed?
What is SQL injection ? How is
56 it implemented as a threat ?
What is Network sniffing How
57 is it implemented ?
What are the types of sniffing
58 attacks?
What is a cipher algorithm What
do you know about stream and
59 block Cipher?
What is WEP cracking ? Name
60 the various WEP cracking tools?
61 What is Data Encryption ?
What is the difference between
symmetric and asymmetric
62 encryption ?
Why do you need ssh for a
63 windows pc ?
How would you reset a
64 password protected BIOS
65 What is crosssite scripting
What are the steps to make the
user authentication process more
66 secure?
What are the risks associated
with Risks associated with
67 public WiFi ?
What is a Remote Desktop
68 Protocol (RDP)
Explain the concept of IV in
69 encryption
What is the best way to
configure a network to allow a
single computer on a particular
70 Jack ?
71 What is IP and Mac address ?
What is the best response when
you see a user logging in as root
72 to perform basic functions ?
What are the key indicators that
suggest your company's
73 Network might be hacked ?
74 Active Directory (AD)
75 Group Policy
Why is it said that we should
restore a dc that was backed up
76 9 months ago?
What do forest, trees, and
77 domain mean
What do you know about WINS
78 servers
What, according to you, could
be the personal characteristics of
a person administering a
79 system?
Can you give us one of the
examples of the systems you
have been working with as an
80 Administrator?
What is a lingering object? What
is the command that we use to
remove lingering objects? Why
is it important to remove the
81 lingering objects?
Can you differentiate between
82 firewall and antivirus?
According to you, why backing
up an active directory is
important, and how can you
83 back up an active directory?
84 What is a domain controller?
According to you, what is the
difference between FAT and
85 NTFS?
Can you tell me what is
loopback address and in what
86 sense is it useful?
What do you know about proxy
87 servers?
88
89
90
91
92
93
94
95
96
97
98
99
Cryptography refers to the domain of cyber security that serves the purpose of safeguarding information from individuals known as adversar
accessed by senders and intended recipients.
Cryptography refers to the domain of cyber security that serves the purpose of safeguarding information from individuals known as adversar
accessed by senders and intended recipients.
In cybersecurity, a firewall refers to a type of network security system that blocks malicious traffic from hackers and hence maintains data pr
malware, trojan viruses, etc.
Uses:
The firewall monitors the inbound and outbound network traffic. It permits or allows only data packets agreeable to the set of security guidel
A firewall acts as a barrier between the internal network and the inbound traffic from external sources like the Internet.
An LMS stands for Learning Management System. It's a software application that helps organizations administer, document, track, report, au
programs, or learning and development programs. In essence, it's a platform for creating, managing, and delivering online learning.
A cybersecurity attack refers to any malicious attempt by hackers to access, steel, alter or damage information system, networks, or data.
i) Malware can steal sensitive dada, spy on user activities or disrupt normal operations(Virus, Worm,Spyware, Ransomware
ii) Phishing- Involves sending fradulent communications, usually emails, that appear to come from a trusted source.
iii) MitM Attack - The attacker secretly intercepts and alters communication between two parties without their knowledgr.
iv) DDoS--> A DDoS attack floods a server , network, or service with at overwhelming amount of traffic, rendering it unstable.
v) SQL Injection : Exploit vulnerabilities in a database layer by inserting malicious SQL Code.
vi) Zero- Day Exploit - A zero-day exploit refers to an attack that takes advantage of a previously unknown vulnerability in software or hardw
Asymmetric encryption : Uses a pair of keys : a public key ( for encryption) and a private key ( for decryption)
Firewalls are an essential component of network security , that provides protection against unauthorized access, cyber threats, and data breac
A brute force attack is a hacking method where hackers try to gain unauthorized access to a system by trying all possible combinations of pa
Strong password policies
Account Lockout Mechanism
Rate Limiting
MFA- Multi Factor Authenticate
Cache System
IP Blocking
Password Hatching
next sheet
The attacker places themselves in the middle of the communication, eavesdropping or manipulating the dada being exchanged, often for mal
login credentials , financial details or personal data
Wi-Fi Eavesdropping - The attacker creates a fake, unsecured Wi-Fi network and tricks user connecting to fake wi-fi
Session Hijacking:
DNS spooffing:
Prevention Techniques : Use Encryption, Avoid Unsecured Public Wi-Fi, USE VPN, Enable 2 FA, Implement Encryption Protocols, Certific
Security
SQL injection (SQLi) is a type of cyberattack that allows an attacker to interfere with the queries that an application makes to its database
i) Web application Firewalls
ii) Regular Security Testing
iii) Error Handling
2FA is a security mechanism that adds an extra layer of protection .SMS Code, Authenticator App, Hardware Token, Biometric Verification
1) Unintentional Data Leakage, 2) Malicios insider threats, 3) External Breaches, 4) Data Transfer Leakage, 5) Social Engineering Attack, 6)
Services
Impact on Organization 1) Reputation Damage 2) Financial Loss 3) Operational Disruption 4) Loss of Competitive Advantage
A rootkit is a type of malicious software designed to gain unauthorized access to a computer or network while remaining hidden from the use
1) Behavioral Analysis
2) Rootki Scanner like chkRootKit
3) System Monitoring Tools
4) Anti Malware Software
5) Mannual Inspection
Traceroute is sa network diagonistic tool that tracks the path data takes from your computer to a specific destination , like a server , by showi
HTTP response status code are three-digit numbers returned by the server in response to a client's HTTP request. They inform the client abou
encountered a error , or requires further action
1xx(Information),2xx(Success),3xx(Redirection),4xx(Client Error),5xx(Server Error)
429 - Too many requests
400 - Bad Request
401 - Unauthorized
502 - Bad Gateway
403 - Forbidden
404- Not found
503 - Service Unavailable
1. Roles & Responsibilities
2) Data Classificatio and Handling
3) ACCESS Control
4) Incident Response
5) Acceptable Use Policiy
6) Training & Awareness
7) Monitoring & Auditing
8) Physical Security
9) Compliance with Rules & Regulation
APT are sophisticated , prolonged cyberattacks typically carried out by well-funded and highly skilled groups , often linked to nation -states
Cognitive cybersecurity is an advance approach to securing digital enviroments by using cognitive technologies to enhance the detection and
1} AI 2} NLP 3} Machine Learning
Behavioral Analysis
Threat Intelligence
Automated Threat Hunting
Predictive Analysis
Real Time Response
SSH allows you to securely connect and control a remote computer over the internet. SSH has two type of keys Private & Public Key
1) Weak Authentication
2) Insecure Communication
3) Limited Resources
4) Lack of Updates and Patching
Phishing is a type of cyber attack where attackers impersonate legtimate entities to trick individuals into providing sensitive information , suc
others personal data
1) email phishiong
2) Spear Phishing
3) Whaling
4) SMS Phishing
5) Voice Phishing
How to Avoid :
1) Educate and Train Users
2) Use Email Filters
3) Avoid sharing personal information
4) verify links
5) enable mfa
6) regular update software
7) report suspicious activity
8) monitor accounts
Data Protection at Transit
Refers to the security measures applied when data is transtered from one location to another
Data Protection at Rest
involves securing data that is stored in a fixed location , such as on a hard drive or in a database or in a cloud storage
lifecycle of data
1.Data Creation
2. Data Storage
3. Data Usage
4. Data Sharing
5. Data Archiving
6. data destruction
Data Protection at Transit
Common methods for protects includes encryption (e.g TLS & SSL)
Data Protection at Rest
Protection method includes encryption, access control & physical security
A zero-day vulnerability is a security flaw in software or hardware that is unknown to the vendor or developer
VPN - A VPN is designed primarily to provide secure access to a network from a remote location, often over the internet
VLAn - a Vlan is used to segment a network within a local area (e.g. within a single office building) to improve manage security without add
Ethical hacking is the practice of intentionally probing a computer system , network, or application to identify and fix security vulnersabilitie
Legality and Authorization
Integrity and Confidentiality
Purpose and Scope
Reporting & Accountability
Non Malicious Intent
The penetration testing reveals critical vulnerabilities , allowing compaines to strengthen its web application security before the launch
Preparation --> Detection & Analysis --> Containment --> Eradication --> Recovery --> Documentation
1) Strong Authentication
2) Update patches of OS
3) USE MDM
4) Enable Device Encryption
5) Avoid Public Wi-Fi
ML algorithms can analyze vast amounts of data in real time to detect unusal patterns , behaviours or anomalies thay may indicate security th
1. Threat Detection
2. Anomaly Detection
3. Predictive Analysis
4. Real Time Response
5. Fraud Detection
6. Behavioural Bio Metrics
7. Enhanced threat Intelligence
1. Complexity 2. Design Flaws. 3. User Data Input 4. Poor System Configuration 5. Unsecured Connectivity
A Cyber attack is an offensive action taken by a hacker or unauthorized individual or a group of individuals who Target computer systems ,it
other computer devices by using different methods to break into, steal ,damage or alter crucial data and information.
Common type of cyber-attacks are
Malware
Phishing
Password Attacks
DOS & DDOS attacks
Man in the middle attack
Drive by downloads
Malvertising
Rogue software
Ransomware
Brute force attack
Network access control allows the network admin to understand and control who can and cannot access the network.
Firewall security decides whether specific traffic in the network has to be blocked or allowed .This is one of the most important elements to
Intrusion prevention system is a threat prevention technology that examines identifies and prevents unusual Network traffic from exploitin
Security information and event management or seam combined security event management and security information management into on
A virus is dangerous s/w that is executed without user's permission .
Pen tessters use penetration testing tools to perform certain tasks automatically and improve the testing procedure.
Nmap
Nessus
Metasploit
Wireshark
OpenSSL
W3af
1. Easy to use and cost effective
2. Efficient tech support and documentation
3. Able to generate logs and reports
4. Scan Vulnerabilities with ease
5. Categorise based on risk level
The hacker places himself in between the client and the owner or between users and the server or between clients and server to misinform the
information from the system .In this attack the hacker breaks the commun communication link between the user and the server. All data and
through the hacker. This gives the hacker unsolicited access to complete information of the whole system. This gives the hacker complete co
process is involved in it .
Error 404 reflects when a web page doesn't load the website is down or there is a lot of traffic on the website it is detrimental to the profits of
of users on the website on that page exceeds the limit the website can handle once it exceeds the page is down and the users get this commun
System there are three level handshakes before the data from the server is transferred to the client system the first handshake is the client's re
any content the second handshake is where the server approves the client's request gets ready to load and ask the client device when to load i
the server loads the request dos
DOS Attack
attack stands for denial of service attack
DDoS Attack
DDos stands for distributed denial
of service attack
in DOS attack the fake requests are made by the same device to overwhelm the website causing to crash
in DDoS attack a big network of devices creates a large number of fake requests and together request the server at the same
in case of a real-time Cyber attack
First take the help of a set of forensic resources which would enable to quickly research for any issues
Once the cause of the issue gets identified the first action is to restrict any damage
Then provide immediate workarounds or a solution or fix so that any threat is taken care of immediately
Then proactively look for any threats by monitoring any unusual activity or access attempts
Blackbox penetration testing : Black hat hackers try to to break into the system they use the trial and error method to force into the syste
White box penetration testing ethical hackers assess system security and give suggestions for improvements they have complete data and
testing
Gray box penetration testing gray hat hackers also illegally break into the system they give their findings to the owner to point out the f
SSL stands for secure sockets layer . SSL technology helps in creating encrypted connections between a web browser and a web server.
It ensures data privacy by protecting the information in online transactions and digital payments .
for each Web-based attacks hackers take advantage of weaknesses and vulnerabilities in system code to obtain unauthorized access to a data
System-based attacks these attacks are launched by hackers to take unauthorized control over a computer or computer network to gain acces
web-based attacks are 1.Dictionary attacks 2. Denial of service 3. DNS spoofing 4. Brute Force 5.Phishing 6, SQL injection attacks
system-based attacks are 1. Virus 2. BackDoors 3. Bots 4. Worm
What is social engineering ? What are the types of social engineering ?
social engineering is the psychological manipulation of users. This can also occur when someone is convinced to reveal their confidential i
Three types of social engineering attacks are mainly
1. Computer-based
2. Mobile based
3. Human-based
Human-based attack what a hacker pretends to be a genuine user by requesting higher authority to reveal confidential and crucial informa
the organization.
Computer-based attack in this attack attackers send fake emails to harm the computer. They ask people to forward such
Mobilebased attack mobile based attack the hacker may send SMS to others and collect important information if any user
downloads an app then it can be misused to access confidential information
A worm is a type of malware that replicates itself and spreads from one computer to another.
The differences between a computer virus and a computer worm are
Virus --> It inserts malicious code into a specific file or program
Worm --> It generates its duplicate copy and spreads using email client
Virus --> They need a host program to function.
Worm --> They do not need any host to work correctly.
Virus --> It can be linked with com, XLS, exe, doc Etc.
Worm --> It can be linked with any file on a network.
Virus --> It spreads slower than a worm .
Worm --> It spreads faster than a virus.
A computer system that acts like a decoy and Records all user transactions interactions and actions is called a Honeypot
Honeypot is divided into two categories
1. research Honeypot and
2. production Honeypot
1.Research Honeypot it is used by research and educational organizations and institutions for the purpose of understanding and researching
the motives and tactics of hackers who Target different networks to gain unauthorized access
2. Production Honeypot
production Honeypot is used to gather real-time information for the administrator to access security weaknesses and vulnerabilities to
increase network security they are generally placed inside production networks
Non-physical threats are Trojans, worms, denial of service attacks, adware, spyware, distributed denial of service attacks, virus, key loggers
They are threats that are accidentally done by organization employees. In these threats an employee unintentionally deletes any
file or share confidential data with Outsiders or a business partner going beyond the policy of the company
Depending on the operating system Tracert or Traceroute helps to find out the locations of routers that come along the
chain connections till the final destination is reached .If you cannot reach the Final Destination or cannot connect then the trace route
can suggest exactly where the chain of connection stops . This information can be used to know if it's your own firewall some
issue in the middle your ISP or your destination's ISP that's causing the issue.
Backdoor is malware in which a security system is bypassed to access the system .This is done to have unauthorized access to user
credentials and confidential information .
The 80/20 rule is based on the percentage of network traffic in which 80% of all Network traffic should remain local
while the rest of the traffic should be routed towards a permanent VPN
Security testing is one of the main types of software testing that ensures that all security applications and
software systems and other applications are free from any hackers or security vulnerabilities threats risks or cyber threats
Security scanning is a method that identifies any network or system weaknesses and vulnerabilities and later provides resolutions
to reduce these risks with provision for testing
TCP session hijacking is the unethical use of a valid computer session. IP spoofing is the most common method of session hijacking.
In this method attackers use IP packets to insert a command between two nodes of the network.
Various methods of session hijacking are
1. Using packet sniffers 2. Cross-site scripting 3. XSS attack 4. IP spoofing 5. Blind attack
A trojan horse or a Trojan is a malware program designed by hackers to break into electronic and digital devices by disguising the
program as necessary software .This type of Cyber attack is quite dangerous as it helps the hackers to have unauthorized access
to crucial information of users such as their credentials and financial details
SQL injection includes incorporating malicious data into the user's digital device .
It enable the hacker to give unauthorized access to all the crucial and confidential information belonging to the user .
It uses the design flaws to exploit SQL statements and execute malicious SQL code through poorly designed web applications.
A hacker can use SQL injection to escalate it to perform other cyber attacks
whenever data packets are being sent over a network, network sniffing is used as a tool to analyze these packets .To implement this
specialized Hardware equipment or software program has to be used sniffing.
It can be used too capture sensitive data such as passwords ,EES drop on chat messages monitor data package over a network
various types of sniffing attacks are
1. protocol sniffing
2. web password sniffing
3. application Level sniffing
4. TCP session stealing
5. lan sniffing
6. ARP sniffing
Cipher algorithm is used to protect email, credit card information and corporate data.
Stream Cipher it functions on
1. small plane text units
2. it requires less code
3. key is used only once
4. secure socket layer SSL it is used to implement Hardware
Block Cipher
it functions on
1. large data blocks
2. It requires more code
3. reuse of key as possible
4. file encryption and database
5. it is used to implement software
WEP cracking is a method used for a security breach in wireless networks. There are two types of WEP cracking
1. active cracking and
2. passive cracking
WEP cracking tools are
1. aircrack
2. WebDecrypt
3. kismet
4. WEPCrack
Data encryption is used as a method in which the sender converts a message into a code. This method helps only authorized
users to have access to confidential and critical information and data
symmetric and asymmetric encryption
symmetric encryption needs only the same key for encryption and decryption
asymmetric encryption needs two different keys one for encryption and the other for decryption
Windows PC the SSH is the TCP Port 22 and is a safe connection that can be used on various devices and systems. This can be used to prote
against eavesdroppin attacks by channeling routers, SFTP servers switches, and any vulnerable programs through this port SSH
This is mostly not done on Windows systems but implemented by SSH protocol on a wide variety of systems called SShing into a box that i
For Windows users programs like filezilla and Putty for instance have Windows ports available and supports ease of use connectivity on pa
users
protected bios configuration bios is superseded by the UEFI and this configuration is mostly followed by various systems and How the
settings in storage are kept in place
Bios is a pre-boot system and has its own set of settings and preferences
First method is to Simply remove the CMOS battery which results in the system losing its memory storage
The second method is to use on the motherboard a jumper switch or a physical switch
The third method is to use the password password if the BIOS has default password enabled from the factory
cross-site scripting is the incorporation of malicious scripts into websites that causes a network security vulnerability.
This is a type of Cyber attack that occurs when hackers allow an untrusted source to include code into any web application
The key steps to authenticate users are user has to provide his or her identity
the user ID and key should be used to confirm user identity. This is the ideal way of of a system should give authorization to the user .
public Wi-Fi has many cyber security vulnerabilities issues
Wi-Fi attacks include sniffing , Brute Force attack, War driving Karma attack Etc
public Wi-Fi May recognize data that gets passed through any electronic device on the network like credit or debit card information emails
confidential
Remote desktop protocol provides a graphic user interface or GUI over a network to connect two devices
Remote desktop protocol is generally used to access computers and applications virtually present over a network for Remote Management.
must run the RDP client software to have Remote Management and access while the other devices must use the RDP server software
IV is the abbreviation for Initial vector and it is an arbitrary number
Initial Vector is used to ensure that similar text is encrypted to different Cipher texts.
This is a unique number and the the encryption program can use this number only once per session ?
The best way to achieve this is by using sticky ports
These ports allow a network admin to set up the networks so that each port on a switch allows only one computer to
be connected to that particular Port .It achieves this by locking the computer to a designated Mac address if any other
computer tries to plug in or gain access to that Port the port shuts down and he user receives a call that they cannot connect anymore
IP address is the abbreviation of an Internet Protocol address the Internet Protocol address can be used to identify any device or computer u
computer network like printers and any storage disc
Mac address is the abbreviation of media Access Control address.
The media Access Control address is used to identify any network interfaces for communication present in the physical layer of the network
a Linux admin account also called as root has more powers and permissions over a standard user. It is also not always necessary to log in as
root to perform basic tasks as standard user permissions would suffice for such tasks.
The best way to handle this is to reduce the permitted time for any individual to be logged in his root by regulating the time.
We can control the probability of things going wrong either intentionally or accidentally
1. unknown requests for login
2. drastic increase in help requests
3. slow down of computer and network operations
4. suspicious emails from various senders
5. irregularities in system and Network login attempts
6. unusual increase in network traffic
7. messages for Ransom in return for Access
8. strange messages from trusted contacts
9. multiple attempts on non-standard firewall ports
10. unusual increase of attempts to connect within your network and domain
Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks. It acts as a centralized database and s
network resources within an organization.
AD enables administrators to control access to these resources, manage user identities, and enforce security policies.
Group Policy is a feature in Windows operating systems that allows administrators to centrally manage and configure user and computer sett
a way to enforce consistent configurations, enhance security, and streamline IT management across an organization.
Restoring a Domain Controller (DC) from a backup older than 6-12 months, or even 180 days, is generally not recommended due to potentia
Active Directory. Active Directory relies on a replication model where changes are constantly exchanged between DCs. Restoring an old bac
conflicts with more current DCs and potentially leading to data loss or rollback of recent changes.
In the context of Active Directory, forest, tree, and domain represent different levels of a hierarchical structure for managing network resourc
computers, and other objects with a shared directory and security policies. A tree is a collection of domains that share a common namespace
relationship. A forest is a collection of one or more trees, sharing a common schema, configuration, and global catalog, and is considered the
A WINS (Windows Internet Name Service) server is a legacy Microsoft service that maps NetBIOS comput
network communication. It was crucial for older Windows networks but has largely been superseded by DN
System administrators face a variety of challenges. They are the problem solvers and coordinators. They understand a computer’s software, h
employees regarding technical issues. Their primary task is to monitor the system. They are able to keep track of the server performance and
arrange for replacement in case of any hardware failure.
This typically may include Windows and Linux, which support asset management or GIS. GIS, or Geographic Information Systems, plays a
model, analyze, and visualize spatial data related to networks
The lingering object is a deleted active directory that remains on the restored domain controller in its local copy of the active directory. When
Tombstone (which is temporary) is created, which then has to be replicated by the domain controller before it expires, i.e., they seem to occu
the system backups are created.
When we restore a backup file, the AD (ACTIVE DIRECTORY) generally requires that the backup should not be more than 180 days old. T
was deleted on another DC more than 180 days ago. In such cases, if we want to remove the lingering object, we use windows server 2003 a
the lingering objects using the console utility command REPADMIN.EXE. It is necessary to remove the lingering object as it puts an extra b
like limited space availability.
Antivirus: We use antivirus to protect the system from computer viruses. When using your system, it actively monitors for any virus threats f
tries to clean or quarantine the virus and keeps your system and data safe.
Firewall: On the flip side, a firewall protects your system from outside/intruder/hacker attacks. Sometimes hackers may take control of your
data from the system. It happens mostly in cases when your system is connected directly to the internet or an extensive network. In that case,
yourself from unauthorized access. It is either available in software or hardware form. If you have a single PC, the software firewall can do th
corporation, you have to install a hardware firewall to protect their system from such attacks.
To maintain the proper health of the AD database, the backup of an active directory is important.
Windows Server 2003: In this, you can backup the active directory using the NTBACKUP tool that is inbuilt with windows server 2003, or w
feature.
Windows server 2008: There is no option to back up the system state data through the normal backup utility. Here we need to use the comma
Step 1 – Open the command prompt by clicking on start, typing “cmd,” and then hitting the enter button.
Step 2 – In the command prompt, type “wbadmin start systemstatebackup – backuptarget;e:” and then press the enter button.
Step 3 – Input “y” and press the enter button to start the backup process.
When the backup is finished, you will get a message that the backup is completed if it has not been completed properly, you need to troubles
A domain controller (DC ) is a windows-based computer system that is used for storing user account data in a central database. The system a
resources, such as printers, documents, folders, network locations, etc
FAT:
There is no security when the user logs in locally.
It usually supports file names with only 8 characters and does not support file compression.
The partition and file size can be up to 4 GB, and there is no such security permission for file and folder levels.
It doesn’t support bad cluster mapping, so it is not very reliable.
NTFS:
There is security for both the local and the remote users.
It usually supports file names that have 255 characters.
It supports file compression, and the partition size can be up to 16 exabytes.
There is security for file and folder levels.
It supports bad cluster mapping and transaction logging and is highly reliable.
It is an address that sends outgoing signals back to the same computer for testing purposes. It is managed entirely within the operating system
and can communicate. It is not physically connected to a network. It is useful because the loopback provides IT professionals with an interfa
or corrupted drives or hardware.
Aspect Vulnerability Assessment Penetration Testing
Exploit vulnerabilities to access real-world
Goal Identify potential vulnerabilities risks
Manual and automated exploitation, active
Method Automated scans, passive analysis testing
Intrusiveness Non-intrusive(does not exploit) intrusive (exploits vulnerabilities)
Proof of concept of exploits, potential
Output List of vulnerabilities and their severity impact
Can be longer(manual and targeted attackks)
Duration Generally faster(automated) (
Aspect Malware Ramsomware
Broad term for malicious software A type of malware that encrypts or locks
Defn designed to harm or exploit systems data , demanding a ransom
Disrupt operations, steal data, spy on extrot money from victims in exchange for
Purpose users or damage systems restoring access to data
Varies (e.g viruses spread, spyware Encrypt files or locks the system amd
Behaviour monitors, trojans create backdoors) demands ransom for decryption
Here are 25 SQL interview questions specifically asked in Data Engineer interviews:👇
1/ What is the difference between INNER JOIN, LEFT JOIN, and RIGHT JOIN?
2/ How do you calculate the median of a numeric column in SQL?
3/ Write a query to find duplicate rows in a dataset.
4/ What is the difference between GROUP BY and ORDER BY?
5/ Explain the purpose of window functions and give an example.
6/ Write a query to calculate the rolling average of sales for the past 7 days.
7/ How would you identify the second highest value in a column?
8/ Explain how HAVING differs from WHERE with examples.
9/ Write a query to extract users who performed at least 5 transactions in a month.
10/ How would you detect anomalies or outliers in a dataset using SQL?
11/ Write a query to pivot a table and convert rows into columns.
12/ How can you rank users based on their total purchase value in descending order?
13/ Write a query to calculate a percentage contribution of each product to the total sales.
14/ Explain the concept of CASE statements with an example.
15/ Write a query to count the number of unique users by day.
16/ How would you calculate a cumulative sum of a column?
17/ Write a query to identify the first and last transaction of each user.
18/ How do you use ROW_NUMBER() to eliminate duplicates from a table?
19/ What are lag and lead functions, and how are they used in SQL?
20/ Write a query to calculate the time difference between consecutive events for each user.
21/ How would you handle missing values in SQL?
22/ Write a query to remove duplicate rows from a dataset.
23/ How can you split a single column into multiple columns in SQL?
24/ Explain how you would clean a dataset with inconsistent formats (e.g., date or string issues).
25/ Write a query to standardize data by scaling numeric columns between 0 and 1.
e total sales.
s for each user.
te or string issues).