What do you mean by honeypots ?

Honeypots are attack targets that are set up to see how different attackers attempt exploits. Private firms and governments can utilize the same concept to evaluate their vulnerabilities, which is…
View Answer

What do you mean by a botnet ?

A botnet is a collection of internet-connected devices, such as servers, PCs, and mobile phones, that are infected with malware and controlled by it. It’s used to steal data, send…
View Answer

What is a Firewall ?

A firewall serves as a barrier between a LAN and the Internet. It allows private resources to remain private while reducing security threats. It manages both inbound and outbound network…
View Answer

Explain CIA triad

CIA stands for Confidentiality, Integrity, and Availability. CIA is a model that is designed to guide policies for Information Security. It is one of the most popular models used by organizations. Confidentiality The information should…
View Answer

Are HTTPS headers encrypted ?

When sending data over HTTPS, I know the content is encrypted, however I hear mixed answers about whether the headers are encrypted, or how much of the header is encrypted.…
View Answer

How to prevent SQL injection in PHP ?

If user input is inserted without modification into an SQL query, then the application becomes vulnerable to SQL injection, like in the following example: $unsafe_variable = $_POST[‘user_input’]; mysql_query(“INSERT INTO `table` (`column`)…
View Answer

What are the steps to set up a firewall ?

Username/password: modify the default password for a firewall device Remote administration: Disable the feature of the remote administration Port forwarding: Configure appropriate port forwarding for certain applications to work properly, such as a…
View Answer