How can you protect against impersonation   Do you know what dumpster diving is in the
                attacks?                            context of cybersecurity?
  Dumpster diving involves searching through        To protect against impersonation attacks, never
  discarded materials like trash or recycling to    volunteer personal information, avoid disclosing
 gather information that can be used for cyber      personal details, always verify before revealing
 attacks, such as impersonating individuals or       info, and encourage verification, especially in
            obtaining sensitive data.                   organizations with valuable information.
Do SSL stripping and HTTP downgrade combine         Describe the concept of refactoring in the
                 for an attack?                        context of metamorphic malware.
     Do directory traversal attacks exploit     Describe the risks associated with improper error
        vulnerabilities in web servers?                     handling in applications.
                                                   Cross-site request forgery (CSRF) is an attack
  Attacker executed commands on Capital One
                                                  where a user is tricked into executing unwanted
  website due to misconfigured WAF, obtained
                                                   actions on a web application in which they are
   WAF role credentials, accessed Amazon S3
                                                  authenticated, exploiting the trust between the
      buckets, and retrieved sensitive data.
                                                         user's browser and the application.
   Refactoring involves metamorphic malware        Yes, SSL stripping and HTTP downgrade merge to
   redesigning itself intelligently by changing       strip encryption from HTTPS, requiring the
functions, application flow, and code structure to    attacker to sit between the victim and web
        evade signature-based detection.                         server to modify data.
  Memory vulnerabilities involve manipulating    Race conditions can cause issues like the Mars
  memory to exploit issues like memory leaks,     rover reboot loop when a problem triggers a
NULL pointer dereference, and integer overflow, reboot due to a file system issue, creating a loop
leading to system crashes or application issues.            due to a race condition.
 Improper error handling can expose sensitive Yes, directory traversal attacks read files outside
  information, leading to security breaches, as a website's directory, exploiting vulnerabilities in
  detailed error messages may reveal network      web server software or poorly written code to
data, memory dumps, or database information.                  access restricted files.
 How can API attacks impact communication           Define resource exhaustion attacks like ZIP
                  paths?                                             bombs.
   Do wireless disassociation attacks lead to         Define the term threat actors and their
       significant network disruptions?                             attributes.
  Describe the attack vectors used by threat      How does threat intelligence aid in cybersecurity
                    actors.                                          defense?
Define indicators of compromise (IOC) and their    Describe the concept of predictive analysis in
                  significance.                                   cybersecurity.
Resource exhaustion attacks, such as ZIP bombs,      API attacks target vulnerabilities in
   are specialized DoS attacks that may use       communication paths, potentially exposing
 minimal resources to overload systems, like a     sensitive data, causing DoS, intercepted
     42KB file expanding to 4.5 petabytes.      communication, or privileged access breaches.
  Define vulnerability impacts based on the         How can data loss occur due to unsecured
                  content.                                         databases?
Explain the concept of identity theft based on    Describe the financial loss experienced by the
            Equifax's data breach.                     Bank of Bangladesh in March 2016.
What are the impacts of getting hacked on an     How does ransomware impact availability loss in
         organization's reputation?                   the context of BancoEstado's attack?
   Define the concept of threat hunting in          How does intelligence fusion contribute to
               cybersecurity.                                cybersecurity efforts?
                                              Third-party risks pose security challenges due to
 Accessing the code base for outsourced code system integration risks, lack of vendor support,
development can be done internally over a VPN supply chain vulnerabilities, and potential legacy
       or through cloud-based access.           platform issues, requiring diligence and local
                                                    security controls to mitigate threats.
Data loss can occur due to unsecured databases Vulnerability impacts can result in significant
with no password or default password, leading to economic losses, as seen in the malicious cyber
 instances like Internet-facing databases being   activity that cost the U.S. economy billions in
                     deleted.                                          2016.
 The Bank of Bangladesh faced a financial loss Identity theft, exemplified by the Equifax breach,
when attackers sent secure messages to transfer        involves unauthorized access to personal
nearly one billion dollars, resulting in significant information like names, SSNs, and addresses,
  monetary losses and laundering through the           leading to financial and personal risks for
            Filipino casino industry.                                  individuals.
   Describe the process of provisioning an        Define scalability and elasticity in the context of
                application.                               handling application workload.
How does orchestration play a key role in cloud     Do you need to describe the deprovisioning
                computing?                              process of an application instance?
 Explain the concept of obfuscation in secure           How can code reuse lead to security
              coding techniques.                                 vulnerabilities?
 Define input validation and its importance in    Describe the purpose of memory management in
                secure coding.                                     secure coding.
Configuration review is crucial for validating the
                                                     Vulnerability scanning involves using powerful
  security of device configurations, ensuring
                                                       tools to identify vulnerabilities through non-
      proper settings to mitigate risks and
                                                      intrusive or intrusive scans, aiming to gather
  vulnerabilities in workstations, servers, and
                                                     information without exploiting vulnerabilities.
                security devices.
Code reuse involves using old code to build new       Obfuscation involves making code difficult to
    applications, which can spread security            understand by turning readable code into
  vulnerabilities if the old code contains flaws.        nonsense while maintaining the same
Reusing vulnerable code increases the risk for all   functionality. It helps prevent the discovery of
               applications using it.                            security vulnerabilities.
Memory management in secure coding involves        Input validation ensures that expected input
being mindful of how memory is used to prevent     matches actual input, documenting all input
vulnerabilities like buffer overflows. Developers methods, and correcting any improper input. It
   should not trust data input and follow best    helps prevent security issues by verifying and
        practices to design secure code.                       sanitizing user input.
  How do third-party libraries and SDKs pose          Explain the importance of version control in
   security risks in software development?                      software development.
Hashing represents data as a short string of text, Homomorphic encryption allows for performing
   ensuring integrity and providing a unique          calculations on encrypted data without
               identifier for data.                                decrypting it.
   Network segmentation involves dividing a        Yes, load balancers distribute network traffic
   network into smaller segments to improve        across multiple servers to ensure even load
    performance, security, and compliance.                         distribution.
How do VPNs ensure secure data transmission      Describe the purpose of AH (Authentication
          over public networks?                               Header) in VPNs.
Define ESP (Encapsulating Security Payload) in How does L2TP (Layer 2 Tunneling Protocol) work
                   VPNs.                                         in VPNs?
    Do HTML5 VPNs require a separate VPN           Describe the purpose of Port Security in
      application to create a VPN tunnel?                        networking.
Describe the function of BPDU Guard in network    What is the purpose of DHCP Snooping in
                    security.                                 network security?
AH provides data integrity, origin authentication,
                                                     VPNs use encryption to create a private and
 and protection against replay attacks using a
                                                       secure connection over a public network,
keyed-hash mechanism, but it does not provide
                                                      ensuring data confidentiality and integrity.
          confidentiality/encryption.
L2TP connects sites over a layer 3 network as if ESP provides data confidentiality (encryption),
  they were connected at layer 2, commonly       limited traffic flow confidentiality, data integrity,
    implemented with IPsec for encryption.                   and anti-replay protection.
Port Security involves controlling and protecting No, HTML5 VPNs create a VPN tunnel without a
   the physical switch interface to limit overall      separate VPN application, allowing direct
 traffic, control specific traffic types, and watch communication to the VPN concentrator using an
          for unusual or unwanted traffic.                    HTML5 compliant browser.
   Loop Protection prevents switches from      Broadcast Storm Control limits the number of
  endlessly sending traffic back and forth by broadcasts per second to manage multicast and
implementing IEEE standard 802.1D to prevent    unknown unicast traffic, maintaining a tight
          loops in bridged networks.                         security posture.
Describe the purpose of using a Jump Server in    Do Hardware Security Modules (HSMs) provide
              network security.                         cryptographic hardware security?
  Define Unified Threat Management (UTM) in      How do Next-Generation Firewalls (NGFWs) differ
               network security.                           from traditional firewalls?
  Describe the function of Intrusion Detection    How does Mobile Device Management (MDM)
      Systems (IDS) in network security.              help in managing mobile devices?
Define Mobile Application Management (MAM) in Describe the purpose of SEAndroid in Android OS
            mobile device security.                              security.
    DNSSEC (Domain Name System Security           MAC Filtering limits access through the physical
Extensions) validates DNS responses, providing     hardware address (MAC address) to enhance
origin authentication, data integrity, and public  security by keeping unauthorized devices out
 key cryptography by signing DNS records with       and requiring additional administration for
             trusted third parties.                                    visitors.
 NGFWs analyze all data in every packet at the UTM combines various security features like web
    OSI Application Layer, applying advanced      security, URL filtering, malware inspection,
 decodes and deep packet inspection to control firewall, IDS/IPS, and VPN endpoint into a single
  traffic flows based on applications and apply      appliance for comprehensive threat
  application-specific vulnerability signatures.                  management.
SEAndroid (Security Enhancements for Android)        MAM involves provisioning, updating, and
 integrates SELinux to provide access control      removing mobile apps, creating an enterprise
security policies, isolates and sandboxes apps,   app catalog, monitoring app use, and remotely
  and protects privileged system daemons in         wiping application data to securely manage
                Android devices.                                mobile applications.
 How does Geofencing enhance mobile device        Do Third-Party App Stores pose security risks for
                 security?                                        mobile devices?
  Define Rooting/Jailbreaking in the context of   Describe the function of Remote Wipe in mobile
            mobile device security.                               device security.
How does Full Device Encryption enhance mobile Define Unified Endpoint Management (UEM) and
               device security?                       its role in mobile device security.
Do External Media pose security risks for mobile Define USB On-The-Go (USB OTG) and its role in
                   devices?                                 mobile device security.
Yes, Third-Party App Stores may contain insecure
                                                 Geofencing restricts or allows features based on
       or malicious applications, leading to
                                                   the device's location, enabling control over
  vulnerabilities, data leaks, and unauthorized
                                                  camera use, authentication, and app access
    access, making them a potential security
                                                      depending on the geographical area.
           concern for mobile devices.
Define SMS/MMS and its security implications in Describe the purpose of Recording Microphone in
             mobile devices.                                 mobile device security.
  How does Camera Use pose security risks in      Do Push Notification Services enhance mobile
              mobile devices?                                    device security?
  Define Passwords and PINs in mobile device      Describe the function of Biometrics in mobile
                  security.                                      device security.
How does Mobile Packet Analysis help in network     Define Channel Selection and Overlaps in
                  security?                                    network security.
 Geolocation provides precise tracking details to     Geotagging adds location metadata to
   locate devices within feet, aiding in device   documents using GPS coordinates, which can be
recovery and security measures, but also raising    a security concern due to potential privacy
     privacy concerns and potential misuse.                issues and location tracking.
      Yes, Push Notification Services deliver     Camera Use on mobile devices can lead to
  information to mobile devices without user     privacy breaches, corporate espionage, and
     intervention, aiding in timely alerts and inappropriate use, making it a security concern
notifications, which can be managed by MDM to that can be controlled by MDM through disabling
          control displayed notifications.                     or geo-fencing.
Biometrics use unique physical characteristics Passwords and PINs are common authentication
   like fingerprints or facial recognition for    methods used in mobile devices to secure
  authentication, providing secure access to   access, with recovery processes initiated through
devices, managed by MDM to control biometric      MDM and options for strong passcodes or
            authentication per app.                        alphanumeric passwords.
    Channel Selection and Overlaps involve         Mobile Packet Analysis allows monitoring of
   configuring wireless access points to avoid    wireless networks by capturing and analyzing
 frequency conflicts and overlapping channels,      data packets, providing insights into signal
  ensuring efficient network performance and      strengths, potential interference, and network
            minimizing interference.                              performance.
Describe the purpose of Access Point Placement     Define Wireless Infrastructure Security and its
              in network security.                                  importance.
How do Mobile Networks like Wi-Fi and Cellular      Describe the function of Bluetooth in mobile
    Networks operate in communication?                            communication.
Define RFID (Radio-frequency identification) and     How does Near Field Communication (NFC)
               its applications.                        enhance wireless communication?
Describe the purpose of Infrared (IR) in mobile    Define USB (Universal Serial Bus) and its role in
                  devices.                                  mobile device connectivity.
  How does Global Positioning System (GPS)             Describe the function of Mobile Device
    enhance mobile device functionality?                 Enforcement in ensuring security.
    Wireless Infrastructure Security involves
                                                   Access Point Placement aims to minimize
securing wireless controllers and access points
                                                overlap, avoid interference, and control signal
by controlling access to management consoles,
                                                strength by strategically placing access points
using strong encryption, and updating firmware
                                                where users are located and ensuring coverage
  to protect against unauthorized access and
                                                         without excessive distance.
            ensure network security.
NFC enables two-way wireless communication by RFID uses radio energy to transmit and receive
    building on RFID technology, supporting   data for various applications like access badges,
 contactless payments, Bluetooth pairing, and    inventory tracking, and pet identification,
   access tokens, with security features like   providing bidirectional communication and
              encryption support.                        active/passive tag formats.
  USB provides physical connectivity to mobile Infrared technology on mobile devices allows for
devices for data transfer and charging, allowing remote control of entertainment systems, file
 connections to computers or external devices,    transfers, and other applications, providing a
 posing security risks if not managed securely. wireless communication method using IR signals.
Define BYOD and explain its security challenges. How does COPE differ from BYOD?
Describe VDI/VMI and its benefits. Define HA across zones in cloud computing.
  How do resource policies contribute to cloud     Explain the concept of secrets management in
                  security?                                      cloud computing.
Describe the purpose of integration and auditing Define the term 'Cloud storage' and explain its
               in cloud security.                                 importance.
   No, WiFi Direct and ad hoc networks allow       Geotagged information in documents can allow
wireless devices to connect directly without the    easy tracking of users, potentially leading to
            need for access points.                                security risks.
 COPE (Corporate Owned, Personally Enabled)               BYOD stands for Bring Your Own
   involves the company buying the device,         Device/Technology, where employees use their
  maintaining full control, and allowing both        personal devices for work, posing security
corporate and personal use, unlike BYOD where      challenges due to the mix of personal and work
        the employee owns the device.                                   data.
   HA (High Availability) across zones involves     VDI/VMI separates apps and data from mobile
isolating locations within a cloud region, running devices, stores data securely, minimizes risk of
  applications in active/standby or active/active       physical device loss, centralizes app
  modes, and using load balancers for seamless        development, and manages applications
                    availability.                                     centrally.
  Describe the purpose of replication in cloud      Define cloud networks and their role in cloud
                 computing.                                         computing.
Explain the concept of virtual networks in cloud     Describe the importance of segmentation in
                 computing.                                       cloud computing.
 Define API inspection and integration in cloud     Explain the role of compute cloud instances in
                    security.                                      cloud computing.
Describe the function of security groups in cloud    Define dynamic resource allocation in cloud
                  computing.                                        computing.
  Encryption in cloud computing ensures data        Permissions in cloud storage are crucial as one
 security by encrypting data at rest (server-side    permission mistake can lead to a data breach,
     encryption) and in transit (client-side        emphasizing the need to avoid public access by
   encryption), with critical emphasis on key          default and utilize options like IAM, bucket
                 management.                          policies, and globally blocking public access.
  Cloud networks connect cloud components         Replication involves copying data to multiple
    internally and externally, allowing user       locations for real-time duplication, ensuring
communication from the public Internet or over a disaster recovery, maintaining high availability,
  VPN tunnel, and facilitating communication        enabling data analysis, and constant data
            between cloud devices.                                    backups.
 Compute cloud instances in cloud computing,      API inspection and integration focus on
part of the IaaS component, manage computing monitoring microservice architecture for security
   resources by launching VMs or containers,   risks, identifying and monitoring API calls for
  allocating resources based on demand, and   unauthorized access attempts, and integrating
     enabling disabling/removing instances.    security measures across different platforms.
   Explain the security concerns related to        Define the role of Cloud Access Security Brokers
    container security in cloud computing.                     (CASB) in cloud security.
Describe the purpose of Next-Gen Secure Web        Explain the function of firewalls in the cloud and
      Gateways (SWG) in cloud security.                             their benefits.
Define the concept of security controls in cloud    Describe the role of Identity Providers (IdP) in
                 computing.                                        authentication.
 Explain the concept of attributes in identity        Define certificates and their role in digital
               management.                                              security.
    Virtual private cloud endpoints in cloud   Instance awareness in cloud security involves
 computing serve as VPC gateway endpoints,    identifying and managing specific data flows for
allowing private cloud subnets to communicate each instance, defining and setting policies for
   with other cloud services securely without data access, and implementing granular security
         requiring internet connectivity.                        controls.
   CASBs help secure cloud environments by          Container security in cloud computing involves
integrating security policies, providing visibility addressing bugs, insufficient security controls,
   into app usage, ensuring compliance with        and misconfigurations by using container-specific
 regulations, preventing threats, and securing operating systems, grouping containers based on
                 data transfers.                       sensitivity, and limiting intrusion scope.
Firewalls in the cloud control traffic flows inside   Next-Gen SWGs protect users and devices by
   and outside the cloud, offer cost-effective            examining application APIs, allowing or
    security measures, enable segmentation          disallowing specific activities, providing instance-
   between microservices, VMs, or VPCs, and            aware security, and differentiating between
         operate at OSI layers 4 and 7.                  development and production instances.
    Certificates bind public keys with digital        Attributes are identifiers or properties of an
signatures, providing trust and security in digital entity used for identification, including personal
 communications, with digital certificates being      attributes like name and email address, and
   used for encryption, digital signatures, and      other attributes like department name or job
             secure data exchange.                                         title.
 Describe the purpose of tokens and cards in     Explain the concept of SSH keys and their role in
               authentication.                                secure communication.
Describe the purpose of IEEE 802.1X in network     Explain the concept of federation in identity
                access control.                                   management.
 Define Security Assertion Markup Language       Describe the purpose of OAuth in authorization
    (SAML) and its role in authentication.                    and access control.
       SSH keys are used in Secure Shell           Tokens and cards are used as authentication
 communication as an alternative to username         factors, with smart cards integrating with
 and password, providing secure authentication    devices and USB tokens storing certificates for
        through public/private key pairs.                      secure authentication.
  Describe the benefits of Role-based Access      Explain the concept of Attribute-based Access
          Control (RBAC) in security.                  Control (ABAC) and its advantages.
    Define Rule-based Access Control and its        Describe the role of File System Security in
             application in security.                       managing access to files.
Explain the concept of Conditional Access and its Define Privileged Access Management (PAM) and
       importance in modern workplaces.                              its benefits.
Describe the purpose of Public Key Infrastructure Explain the concept of Certificate Chaining and
             (PKI) in digital security.                  its significance in digital security.
                                                     Access control involves enforcing policies to
   MAC limits operations on objects based on
                                                     ensure only authorized rights are exercised,
  security clearance levels, assigning labels to
                                                     determining user permissions, and defining
 objects for access control, and ensuring users
                                                     policies based on access control models and
        cannot change security settings.
                                                                business requirements.
File System Security involves controlling access Rule-based Access Control enforces access rules
to files through access control lists, user/group     based on system-enforced conditions,
  permissions, and centralized administration,    determining access based on predefined rules
 ensuring secure encryption and decryption of     associated with objects, and ensuring secure
                      files.                                     access control.
   PAM manages superuser access by storing        Conditional Access applies access rules based on
 privileged accounts in a digital vault, enabling    conditions like employee status, location,
centralized password management, automation, application type, and device, providing granular
   access control, and extensive tracking and        access control and enhancing security in
         auditing of privileged accounts.                  dynamic work environments.
Certificate Chaining establishes a chain of trust        PKI involves policies, procedures, and
 between the server and the root CA, listing all     technologies for managing digital certificates,
certificates between the SSL certificate and the       ensuring secure creation, distribution, and
 root certificate, ensuring secure validation of     management of certificates, and establishing
     certificates in digital communications.                trust in digital communications.
Define the role of OCSP stapling in certificate     Describe the concept of Key Escrow and its
                  validation.                                 implications in security.
Explain the concept of Pinning and its role in    Define the concept of Certificate Revocation List
        ensuring secure connections.                (CRL) and its importance in digital security.
Describe how traceroute works. Do nslookup and dig serve the same purpose?
  What is the purpose of corrective security       Define deterrent security controls and give
                  controls?                                        examples.
 Describe compensating security controls and        What is the purpose of physical security
             provide examples.                                     controls?
Deterrent controls discourage intrusion attempts    Corrective controls are designed to mitigate
without directly preventing access, e.g., warning    damage after a security incident, such as
              signs, login banners.               blocking an attacker or restoring from backups.