Are you preparing for a CompTIA Security+ interview or aiming to strengthen your cybersecurity fundamentals? Whether you’re just starting out or looking to level up your knowledge, this comprehensive guide covers 45+ Security+ interview questions and detailed answers, categorized into Beginner, Intermediate, and Advanced levels. From understanding the CIA Triad and basic encryption to tackling zero trust architecture and SIEM systems, this post is your one-stop resource for exam prep and interview success.
Beginner-Level CompTIA Security+ Interview Questions and Answers
1. What is the CIA Triad in cybersecurity?
The CIA Triad is a fundamental model in cybersecurity that stands for Confidentiality, Integrity, and Availability.
-
Confidentiality ensures that sensitive information is only accessible to authorized individuals and systems.
-
Integrity guarantees that the data is accurate and unaltered by unauthorized parties.
-
Availability ensures that data and services are accessible to authorized users when needed.
This triad helps guide security policies and strategies. A breach in any of these elements can compromise system security. For instance, a DoS attack affects availability, a man-in-the-middle attack may impact confidentiality and integrity, and data corruption can compromise integrity.
2. What is the difference between a threat, vulnerability, and risk?
-
A threat is any potential danger that can exploit a weakness in a system, such as malware or hackers.
-
A vulnerability is a weakness in a system that could be exploited by a threat, like outdated software.
-
Risk is the likelihood that a threat will exploit a vulnerability and cause harm.
For example, if a server is running outdated software (vulnerability), and a hacker (threat) targets it, there is a risk of data breach. Understanding these terms helps in risk management and implementing proper security controls.
3. What is a firewall and what does it do?
A firewall is a security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks like the internet.
There are different types of firewalls, including packet-filtering, stateful inspection, and next-generation firewalls. Firewalls prevent unauthorized access, block malicious traffic, and help enforce security policies. They are essential in both enterprise and home environments for reducing the attack surface and minimizing security risks.
4. What is two-factor authentication (2FA)?
Two-factor authentication (2FA) is a security process that requires users to provide two different forms of identification before gaining access to a system. It typically combines:
-
Something you know (password or PIN)
-
Something you have (a smartphone, hardware token)
or -
Something you are (fingerprint or facial recognition)
2FA enhances security by adding a second layer of protection. Even if a password is compromised, an attacker would still need the second factor to gain access. Common examples include using a password and a code sent to your phone.
5. What is the purpose of encryption?
Encryption is the process of converting plain text into unreadable ciphertext using algorithms and encryption keys. Its primary purpose is to ensure confidentiality—only authorized parties with the decryption key can access the original data.
Encryption protects data at rest (e.g., files on a hard drive) and data in transit (e.g., data sent over the internet).
There are two main types: symmetric encryption (same key for encryption and decryption) and asymmetric encryption (public/private key pair). Encryption is critical in securing communication, protecting personal information, and complying with data privacy laws.
6. What is malware? Name a few types.
Malware is short for malicious software—software designed to damage, disrupt, or gain unauthorized access to systems. Common types of malware include:
-
Viruses: Attach to files and spread when the file is executed.
-
Worms: Spread independently over networks.
-
Trojans: Disguise as legitimate software but carry malicious code.
-
Ransomware: Encrypts data and demands payment.
-
Spyware: Secretly gathers user data.
Malware can lead to data loss, unauthorized access, and even complete system compromise. Antivirus software and good cyber hygiene help prevent malware infections.
7. What is phishing?
Phishing is a type of social engineering attack where attackers trick individuals into revealing sensitive information like usernames, passwords, or credit card numbers. It often involves deceptive emails or messages that appear to be from legitimate sources, urging users to click malicious links or download harmful attachments.
For example, a phishing email may mimic a bank alert and ask you to verify your account. Clicking the link might take you to a fake website that captures your credentials. Training users to recognize phishing attempts and implementing email filters can help mitigate this threat.
8. What is the difference between a virus and a worm?
Both viruses and worms are types of malware, but they behave differently.
-
A virus needs a host file to attach itself to. It spreads when that file is executed.
-
A worm is self-replicating and spreads across networks without needing a host file or user interaction.
Worms tend to spread more rapidly and can cause widespread damage in a short time. An example of a famous worm is the ILOVEYOU worm, which caused billions in damages worldwide. Viruses, on the other hand, might spread slower but can be equally damaging if activated.
9. What is a VPN and how does it work?
A VPN (Virtual Private Network) provides a secure connection over a public network, like the internet. It encrypts data traveling between the user’s device and the VPN server, ensuring privacy and security.
VPNs work by creating a secure “tunnel” using encryption protocols such as IPSec or SSL/TLS. This prevents third parties from intercepting or reading the transmitted data. VPNs are often used by remote workers to access internal company resources securely or by users who want to protect their online activities from surveillance.
10. What are some common password best practices?
Password best practices are essential for securing accounts. Key recommendations include:
-
Use long passwords (at least 12 characters).
-
Include a mix of uppercase, lowercase, numbers, and special characters.
-
Avoid using personal information like birthdates or pet names.
-
Don’t reuse passwords across different accounts.
-
Change passwords regularly and immediately after a suspected breach.
-
Use a password manager to store complex passwords securely.
Implementing these practices reduces the risk of brute force and credential-stuffing attacks.
11. What is social engineering?
Social engineering is a manipulation technique used by attackers to trick individuals into revealing confidential information or performing certain actions, like clicking malicious links or giving up passwords.
Instead of exploiting a system’s technical flaws, social engineering exploits human psychology. Common techniques include:
-
Phishing (fraudulent emails)
-
Pretexting (creating a false scenario)
-
Tailgating (following someone into a restricted area)
-
Baiting (leaving infected USB drives in public places)
Training employees and promoting security awareness are key defenses against these tactics.
12. What is the difference between symmetric and asymmetric encryption?
-
Symmetric encryption uses the same key for both encryption and decryption. It is fast and suitable for encrypting large amounts of data, but the key must be securely shared between parties. Examples: AES, DES.
-
Asymmetric encryption uses a pair of keys: a public key to encrypt and a private key to decrypt. It provides secure communication without the need to share a secret key in advance. Examples: RSA, ECC.
Both encryption types are often used together—public key encryption to exchange a symmetric key, then symmetric encryption for the data.
13. What is a brute force attack?
A brute force attack is a method used by attackers to gain access to accounts or encrypted data by systematically trying every possible combination of characters until the correct one is found.
It can be used to crack passwords or encryption keys. The attack can be time-consuming, especially if the password is long and complex. To mitigate brute force attacks, organizations use:
-
Account lockouts after several failed attempts
-
CAPTCHA to prevent automated login attempts
-
Strong password policies
-
Multi-factor authentication (MFA)
14. What is the difference between IDS and IPS?
-
IDS (Intrusion Detection System) monitors network traffic for suspicious activity and alerts administrators when it detects potential threats but doesn’t take direct action.
-
IPS (Intrusion Prevention System) not only detects threats but also actively blocks or prevents them.
An IDS is more passive, suitable for monitoring and analysis, while an IPS provides proactive defense by stopping threats in real-time. Often, both are used together as part of a layered security approach.
15. What is multi-factor authentication (MFA)?
MFA is a security measure that requires users to present two or more verification factors to gain access to a resource such as an application or online account. The factors are:
-
Something you know (password)
-
Something you have (security token, smartphone)
-
Something you are (fingerprint, face scan)
By combining these, MFA significantly increases security. Even if one factor (like a password) is compromised, unauthorized access is unlikely without the others.
16. What is a security policy?
A security policy is a formal document that outlines how an organization protects its digital assets and sensitive information. It defines rules, procedures, and responsibilities for maintaining security.
Types of security policies include:
-
Acceptable Use Policy (AUP): Rules for employee use of company systems.
-
Password Policy: Guidelines for password creation and management.
-
Incident Response Policy: Procedures for handling security incidents.
Security policies are essential for ensuring compliance, standardizing practices, and reducing security risks.
17. What is the principle of least privilege (PoLP)?
The Principle of Least Privilege states that users, applications, and systems should be given the minimum level of access necessary to perform their duties.
This reduces the potential attack surface and limits the damage in case an account is compromised. For example, a data entry employee should not have administrative rights. Implementing PoLP involves reviewing permissions regularly and revoking unnecessary access.
18. What is the purpose of a DMZ in network security?
A DMZ (Demilitarized Zone) is a subnetwork that sits between an organization’s internal network and an untrusted network like the internet. It hosts public-facing services (e.g., web servers, mail servers) that need to be accessible externally.
The DMZ acts as a buffer zone. If an attacker compromises a server in the DMZ, they won’t gain direct access to the internal network. Firewalls are used to control traffic between the DMZ, internal network, and external users.
19. What is a security incident?
A security incident is any event that indicates that an organization’s systems or data may have been compromised. This can include:
-
Unauthorized access
-
Malware infection
-
Data breach
-
Denial of service attack
Effective incident response includes detection, reporting, containment, eradication, recovery, and post-incident review. A documented incident response plan (IRP) is crucial for minimizing damage and restoring operations quickly.
20. What is patch management and why is it important?
Patch management involves regularly applying updates (patches) to software and systems to fix known vulnerabilities, improve functionality, or enhance security.
Unpatched systems are often exploited by attackers using known vulnerabilities. A famous example is the WannaCry ransomware, which exploited a Windows vulnerability that had a patch available but wasn’t applied in time.
A good patch management strategy includes:
-
Regularly checking for updates
-
Testing patches before deployment
-
Applying critical patches immediately
Intermediate-Level CompTIA Security+ Interview Questions and Answers
21. What is the difference between vulnerability scanning and penetration testing?
Vulnerability scanning and penetration testing are both used to identify security weaknesses but differ in scope and depth.
-
Vulnerability scanning is an automated process that detects known vulnerabilities in systems, networks, and applications using tools like Nessus or OpenVAS. It’s non-intrusive and often used for routine assessments.
-
Penetration testing (pen testing) is a manual, simulated cyberattack performed by ethical hackers to exploit vulnerabilities and understand the real-world impact of a breach. It goes beyond detection by validating how an attacker might exploit the system.
While vulnerability scans are good for regular compliance checks, pen testing provides in-depth insights and is typically performed less frequently.
22. What is a digital certificate and how does it work?
A digital certificate is an electronic document used to prove the ownership of a public key. It is issued by a trusted third party called a Certificate Authority (CA). Digital certificates are part of the Public Key Infrastructure (PKI) system.
The certificate contains the public key, owner’s identity, expiration date, and the CA’s digital signature. When someone receives a certificate (e.g., during HTTPS communication), they can verify its authenticity using the CA’s signature. If valid, they can trust the public key it contains.
Digital certificates help ensure confidentiality, integrity, and authenticity during secure communications, such as encrypted email, VPNs, or SSL/TLS connections.
23. What is port security and how does it enhance network security?
Port security is a feature found on network switches that allows administrators to control access to physical switch ports. It helps prevent unauthorized devices from connecting to the network.
The switch can be configured to:
-
Allow only specific MAC addresses on a port.
-
Limit the number of devices per port.
-
Take actions like shutting down, restricting, or protecting the port if violations occur.
This technique is especially effective in preventing MAC flooding attacks, rogue device connections, and insider threats. Port security is a layer of defense-in-depth that supports network access control.
24. What is a man-in-the-middle (MITM) attack and how can it be prevented?
A Man-in-the-Middle (MITM) attack occurs when an attacker secretly intercepts and possibly alters communication between two parties without their knowledge.
MITM attacks can happen over unsecured networks (like public Wi-Fi), and common methods include ARP spoofing, DNS spoofing, and SSL stripping.
To prevent MITM attacks:
-
Use HTTPS/TLS encryption for all web communications.
-
Implement VPNs for remote access.
-
Apply mutual authentication in sensitive systems.
-
Use strong encryption protocols and avoid outdated SSL versions.
-
Educate users to avoid untrusted networks.
Detecting MITM attacks can involve network monitoring tools that identify unusual traffic patterns or certificate anomalies.
25. What are some common methods for securing wireless networks?
Securing wireless networks is crucial due to their vulnerability to interception and unauthorized access. Common methods include:
-
WPA3 encryption (or WPA2 if WPA3 isn’t available): Stronger than WEP or WPA.
-
Disable SSID broadcasting to reduce visibility (though not foolproof).
-
MAC address filtering to limit which devices can connect.
-
Strong, complex pre-shared keys.
-
Captive portals for guest access in enterprise environments.
-
Segmenting wireless networks from critical internal systems using VLANs.
-
Limiting signal strength to reduce external exposure.
Regular monitoring for rogue access points and applying firmware updates to wireless access points are also essential practices.
26. What is role-based access control (RBAC) and why is it important?
Role-Based Access Control (RBAC) is an access control model where permissions are assigned based on a user’s role within an organization, rather than assigning permissions individually.
For example, a “Finance” role may allow access to accounting applications, while an “HR” role grants access to employee records.
Benefits of RBAC include:
-
Consistency and efficiency in managing permissions.
-
Easier onboarding and offboarding.
-
Principle of least privilege enforcement.
-
Reduced risk of privilege creep.
RBAC is ideal for large organizations where managing access individually is impractical. It also improves auditability and helps meet compliance requirements.
27. What are SIEM systems and what purpose do they serve?
SIEM (Security Information and Event Management) systems collect, analyze, and correlate security event data from multiple sources in real time. Examples include Splunk, IBM QRadar, and ArcSight.
A SIEM provides:
-
Centralized logging of network, system, and application events.
-
Real-time alerts for suspicious activity.
-
Incident detection and response capabilities.
-
Compliance reporting for regulations like HIPAA, PCI-DSS, or GDPR.
By analyzing data from firewalls, IDS/IPS, servers, and endpoints, a SIEM can detect patterns and help security teams quickly identify and respond to threats.
28. What is the difference between a public CA and a private CA?
A Public CA (Certificate Authority) is a trusted third-party provider that issues digital certificates for use on the open internet. Examples include DigiCert, Let’s Encrypt, and GoDaddy. These CAs are trusted by browsers and operating systems by default.
A Private CA is an internal certificate authority used within an organization to issue certificates for internal systems, users, or devices. It’s not trusted by default outside the organization.
-
Public CAs are ideal for public-facing websites.
-
Private CAs are used for internal servers, VPNs, and device authentication.
Private CAs offer more control but require internal infrastructure and management.
29. What is the difference between a hot site, warm site, and cold site in disaster recovery?
These are disaster recovery sites used to maintain business continuity:
-
Hot Site: A fully operational backup location with real-time data synchronization, ready for immediate use. Most expensive but provides minimal downtime.
-
Warm Site: A partially configured site with necessary hardware and older data backups. Takes some time to become fully functional.
-
Cold Site: A location with basic infrastructure (like power and networking) but no hardware or data. Cheapest option but takes the longest to activate.
Organizations choose based on their Recovery Time Objective (RTO) and budget.
30. What is EFS and how does it differ from BitLocker?
EFS (Encrypting File System) and BitLocker are both Microsoft encryption tools, but they differ in scope and usage.
-
EFS encrypts individual files or folders on NTFS-formatted drives. It’s user-specific—only the user who encrypted the file can access it. EFS is useful for selective file protection.
-
BitLocker provides full-disk encryption, securing the entire drive including system files. It uses TPM (Trusted Platform Module) or USB keys for pre-boot authentication.
EFS is best for file-level confidentiality on shared systems, while BitLocker ensures that the entire disk is protected against physical theft or unauthorized access.
31. What are the differences between TCP and UDP in security contexts?
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) differ in how they manage data transmission:
-
TCP is connection-oriented, ensuring data integrity with features like sequencing, error checking, and acknowledgment. It’s more secure by nature due to its reliability and control mechanisms.
-
UDP is connectionless and faster but lacks error-checking and guaranteed delivery. It’s commonly used for streaming, DNS, and VoIP but is more vulnerable to spoofing and DDoS amplification attacks.
In security, TCP is preferred where reliable communication is essential (e.g., HTTPS), while UDP should be monitored closely and protected with proper firewall and IDS/IPS configurations.
32. What is data loss prevention (DLP) and how is it implemented?
Data Loss Prevention (DLP) refers to strategies and technologies used to prevent the unauthorized access, transfer, or leakage of sensitive information.
DLP solutions can:
-
Monitor data in use, at rest, and in transit.
-
Block unauthorized file transfers or email transmissions.
-
Detect sensitive content using regex, data fingerprinting, or machine learning.
Implementation examples include:
-
Email DLP to block PII from leaving the organization.
-
Endpoint DLP to control USB device usage.
-
Network DLP to monitor outbound traffic.
DLP helps organizations protect IP, meet compliance (like HIPAA, PCI), and enforce internal security policies.
33. What is the purpose of a honeypot in cybersecurity?
A honeypot is a decoy system or resource deployed in a network to lure attackers and monitor their activity. It mimics a legitimate target, such as a server or database, but contains no actual data or production value.
The goals of a honeypot include:
-
Detecting unauthorized activity early.
-
Analyzing attacker behavior, tools, and tactics.
-
Diverting attention from real systems (distraction mechanism).
Honeypots can be high-interaction (real systems) or low-interaction (simulated services). They should be isolated to avoid introducing risk to the actual network.
34. What is a zero-day vulnerability?
A zero-day vulnerability is a previously unknown security flaw in software or hardware that is actively being exploited before the vendor has released a fix or patch.
-
“Zero-day” means the developer has had zero days to address the vulnerability.
-
These are highly valuable to attackers and defenders alike.
-
Zero-day exploits are often used in targeted attacks, cyber espionage, and by advanced persistent threats (APTs).
Mitigation includes using behavior-based detection, threat intelligence feeds, application whitelisting, and regular system updates once patches become available.
35. How does DNSSEC protect DNS infrastructure?
DNSSEC (Domain Name System Security Extensions) adds security to the DNS protocol by enabling authentication of DNS responses using digital signatures.
-
Traditional DNS has no built-in integrity checks, making it vulnerable to DNS spoofing or cache poisoning attacks.
-
DNSSEC verifies that the DNS response comes from an authorized source and hasn’t been tampered with.
-
It uses public key cryptography to sign DNS zone data, allowing resolvers to validate authenticity.
Though it doesn’t encrypt DNS traffic, DNSSEC ensures that users are directed to the correct websites, thus improving trust and integrity in domain resolution.
Advanced-Level CompTIA Security+ Interview Questions and Answers
36. What is an Advanced Persistent Threat (APT)?
An Advanced Persistent Threat (APT) is a prolonged and targeted cyberattack in which an intruder gains unauthorized access to a network and remains undetected for an extended period. APTs are often carried out by nation-state actors or highly organized cybercriminal groups.
These attacks are “advanced” because they use sophisticated techniques like zero-day exploits, social engineering, and lateral movement. They’re “persistent” because attackers maintain long-term access without detection.
APT goals typically include espionage, data theft, or disruption of critical infrastructure. Defending against APTs involves implementing layered security (defense-in-depth), behavioral analytics, endpoint detection and response (EDR), and continuous monitoring.
37. How does tokenization differ from encryption in data protection?
Tokenization and encryption both protect sensitive data but work differently:
-
Encryption transforms plaintext into ciphertext using an algorithm and key. The data can be decrypted back to its original form with the appropriate key.
-
Tokenization replaces sensitive data with non-sensitive placeholders (tokens). The actual data is stored in a secure token vault. Tokens have no mathematical relationship with the original data, making them useless if intercepted.
Tokenization is often used in payment processing (e.g., credit cards) and is ideal when data doesn’t need to be recovered frequently. Encryption is more suitable for securing data that needs to be decrypted regularly.
38. Explain how sandboxing is used in cybersecurity.
Sandboxing is a security technique that isolates potentially malicious code or files in a controlled, virtual environment to observe their behavior without affecting the host system or network.
This method is widely used for:
-
Malware analysis
-
Email attachment inspection
-
Behavior-based detection
For example, if a suspicious file is received via email, it’s executed in a sandbox where its behavior (file creation, registry edits, network connections) can be monitored. If malicious actions are detected, the file is blocked before it reaches users.
Sandboxing is particularly effective against zero-day threats, polymorphic malware, and evasive attack techniques.
39. What are the key components of a secure DevOps (DevSecOps) pipeline?
DevSecOps integrates security practices into the DevOps pipeline to ensure that security is not an afterthought but a continuous, automated part of development.
Key components include:
-
Secure coding practices
-
Static and dynamic code analysis (SAST/DAST)
-
Dependency scanning for vulnerabilities in open-source libraries
-
Automated security testing during CI/CD pipelines
-
Role-based access control and secrets management
-
Container security (image scanning, runtime monitoring)
-
Logging and audit trails for traceability
DevSecOps promotes “shift-left” security, integrating security early in the software lifecycle to reduce vulnerabilities and increase delivery speed.
40. What is the difference between SAML and OAuth?
SAML (Security Assertion Markup Language) and OAuth (Open Authorization) are both protocols for authentication and authorization, but they serve different purposes and operate differently.
-
SAML is an XML-based protocol used primarily for Single Sign-On (SSO) in enterprise environments. It allows identity providers (IdPs) to pass authentication credentials to service providers (SPs).
-
OAuth is a token-based authorization framework. It allows third-party applications to access user resources without revealing credentials. OAuth is often used in modern web/mobile apps (e.g., “Login with Google”).
In short:
-
SAML = Authentication (Who are you?)
-
OAuth = Authorization (What can you access?)
41. How do attackers use PowerShell in post-exploitation scenarios?
Attackers use PowerShell, a legitimate Windows administrative tool, in post-exploitation phases to maintain access, escalate privileges, and exfiltrate data. Since PowerShell is native and often trusted by antivirus software, it enables living-off-the-land (LotL) tactics.
Common techniques include:
-
Downloading and executing payloads from memory (fileless malware)
-
Credential harvesting using tools like Mimikatz
-
Enumerating networks and connected devices
-
Establishing backdoors or persistence mechanisms
To mitigate PowerShell-based attacks:
-
Use constrained language mode
-
Enable PowerShell logging and transcription
-
Monitor unusual script execution
-
Use AppLocker or WDAC to restrict unauthorized PowerShell use
42. What is data obfuscation and where is it used?
Data obfuscation is the process of making data unintelligible or less useful to unauthorized users while preserving its structure or usability for testing or development purposes.
Common methods:
-
Masking: Hiding sensitive fields (e.g., showing only last 4 digits of SSN)
-
Substitution: Replacing real data with fictitious but realistic values
-
Encryption or tokenization: Securing sensitive values
It is widely used in:
-
Test environments to protect real customer data
-
User interface displays (e.g., payment pages)
-
Data analytics, where anonymization is needed
Obfuscation is not a substitute for encryption but adds a layer of protection against data exposure.
43. Explain the concept of zero trust architecture (ZTA).
Zero Trust Architecture (ZTA) is a security model based on the principle of “never trust, always verify.” It assumes no implicit trust, even for users or systems inside the network perimeter.
Core concepts:
-
Continuous verification of identity and access
-
Least privilege access
-
Micro-segmentation of networks
-
Strict access controls and policy enforcement
ZTA relies heavily on identity, context, and device posture to grant access dynamically. Implementation may involve technologies like multi-factor authentication, endpoint detection and response (EDR), and conditional access policies.
ZTA helps reduce risk from insider threats, lateral movement, and perimeter-based security weaknesses.
44. What is the difference between a hash and an encryption algorithm?
Hashing and encryption both transform data but serve different purposes:
-
Hashing is a one-way function that generates a fixed-length output (hash) from input data. It cannot be reversed. Used for data integrity (e.g., verifying file downloads) and storing passwords. Examples: SHA-256, MD5.
-
Encryption is a two-way function that converts plaintext into ciphertext and can be reversed using a key. Used for data confidentiality. Examples: AES, RSA.
In short:
-
Hashing = Data integrity (non-reversible)
-
Encryption = Data confidentiality (reversible with key)
Combining both can provide strong security, such as encrypting a file and hashing it to ensure it hasn’t been tampered with.
45. How does Public Key Infrastructure (PKI) support secure communications?
PKI (Public Key Infrastructure) enables secure electronic communications through the use of asymmetric encryption and digital certificates. It supports:
-
Authentication (verifying identities via certificates)
-
Confidentiality (encrypting communications)
-
Integrity (ensuring data isn’t altered)
-
Non-repudiation (proving message origin)
PKI includes components like:
-
Certificate Authority (CA): Issues and signs certificates.
-
Registration Authority (RA): Verifies identities before certificate issuance.
-
Public and Private Keys: Used for encryption and decryption.
When two parties communicate, PKI ensures that data is encrypted with the recipient’s public key and can only be decrypted with their private key, ensuring secure transmission.
46. What is lateral movement and how can it be detected?
Lateral movement is the technique used by attackers to move across a network after gaining initial access, aiming to find sensitive data or high-value targets like domain controllers.
Common methods include:
-
Credential dumping
-
Pass-the-Hash or Pass-the-Ticket attacks
-
Remote Desktop Protocol (RDP) abuse
-
Windows Admin Shares (C$, IPC$)
Detection strategies:
-
Behavioral analytics to detect unusual logins or access patterns
-
Network segmentation to reduce attack surface
-
SIEM correlation of login events across systems
-
Honeytokens or decoy accounts to lure attackers
Stopping lateral movement early prevents escalation and limits breach impact.
47. What is the Kerberos authentication protocol and how does it work?
Kerberos is a network authentication protocol designed for secure identity verification over insecure networks, primarily used in Windows domains.
How it works:
-
A user logs in and requests a Ticket-Granting Ticket (TGT) from the Key Distribution Center (KDC).
-
With the TGT, the user requests service tickets to access specific resources.
-
The service ticket is used to authenticate to the service without needing to resend credentials.
Kerberos uses symmetric encryption and time-stamped tickets to prevent replay attacks. It improves security by reducing password transmissions and enabling single sign-on (SSO) functionality.
48. What are the NIST Cybersecurity Framework’s five core functions?
The NIST Cybersecurity Framework (CSF) provides best practices for managing cybersecurity risks and is built around five core functions:
-
Identify – Understand business context, assets, and risks.
-
Protect – Implement safeguards to ensure delivery of critical services.
-
Detect – Develop capabilities to identify cybersecurity events.
-
Respond – Take action regarding a detected event.
-
Recover – Maintain resilience and restore operations post-incident.
These functions help organizations structure their cybersecurity programs and are widely adopted across industries for compliance, risk management, and security improvement initiatives.
49. What is a buffer overflow and how can it be prevented?
A buffer overflow occurs when a program writes more data to a buffer (temporary storage space) than it can hold, causing adjacent memory to be overwritten. This can result in crashes, data corruption, or execution of malicious code.
Attackers exploit buffer overflows to:
-
Inject malicious code
-
Escalate privileges
-
Take control of systems
Prevention techniques include:
-
Bounds checking in code
-
Use of safe programming languages like Python or Java
-
Stack canaries and DEP/ASLR protections
-
Code reviews and static analysis tools
Buffer overflows are a common vector for zero-day attacks and must be mitigated in secure coding practices.
50. How do threat intelligence feeds enhance an organization’s security posture?
Threat intelligence feeds provide real-time or near-real-time data about known and emerging threats. They enhance security by:
-
Identifying malicious IPs, domains, hashes, or behaviors
-
Allowing proactive blocking via firewalls, SIEMs, or endpoint tools
-
Correlating incidents with known threat actors or campaigns
-
Enhancing incident response and prioritization
Feeds can be:
-
Open-source (OSINT) like AlienVault OTX or AbuseIPDB
-
Commercial like Recorded Future or Anomali
The integration of threat intelligence into security operations enables faster detection, reduces false positives, and improves decision-making in defense strategies.
Follow KBDUMPS for more.
