{"id":6777,"date":"2024-10-02T11:27:30","date_gmt":"2024-10-02T07:27:30","guid":{"rendered":"https:\/\/yusif.az\/main\/?p=6777"},"modified":"2024-10-02T11:32:23","modified_gmt":"2024-10-02T07:32:23","slug":"kibert%c9%99hluk%c9%99sizlik-sah%c9%99sind%c9%99-veril%c9%99n-intervu-suallari","status":"publish","type":"post","link":"https:\/\/yusif.az\/main\/?p=6777","title":{"rendered":"Kibert\u0259hl\u00fck\u0259sizlik sah\u0259sind\u0259 veril\u0259n interv\u00fc suallar\u0131"},"content":{"rendered":"<p style=\"text-align: right;\"><strong>A\u015fa\u011f\u0131da b\u0259zi tipik interv\u00fc suallar\u0131 t\u0259qdim edir\u0259m, h\u0259m\u00e7inin suallar\u0131n cavablar\u0131 il\u0259 ba\u011fl\u0131 q\u0131sa izahlar da \u0259lav\u0259 edir\u0259m:<\/strong><b><\/b><\/p>\n<p>&nbsp;<\/p>\n<p><b>1. Kriptoqrafiya n\u0259dir?<\/b><\/p>\n<p><b>Cavab<\/b>: Kriptoqrafiya m\u0259lumat\u0131n icaz\u0259 verilm\u0259diyi \u00fc\u00e7\u00fcnc\u00fc t\u0259r\u0259fl\u0259rd\u0259n m\u0259lumat\u0131 qorumaq \u00fc\u00e7\u00fcn m\u0259xfi m\u0259lumatlar\u0131 kodla\u015fd\u0131r\u0131lm\u0131\u015f \u015f\u0259kild\u0259 \u00e7evirm\u0259k v\u0259 \u00f6t\u00fcrm\u0259k \u00fcsuludur.<\/p>\n<p><b>3. IDS v\u0259 IPS aras\u0131ndak\u0131 f\u0259rq n\u0259dir?<\/b><\/p>\n<div><b>Cavab<\/b>: IDS Intrusion Detection System\u2019dir v\u0259 o, yaln\u0131z m\u00fcdaxil\u0259l\u0259ri a\u015fkarlay\u0131r v\u0259 administrator is\u0259 m\u00fcdaxil\u0259nin qar\u015f\u0131s\u0131n\u0131 almal\u0131d\u0131r.<\/div>\n<div>Halbuki, IPS y\u0259ni Intrusion Prevention System-d\u0259 sistem m\u00fcdaxil\u0259ni a\u015fkarlay\u0131r v\u0259 h\u0259m\u00e7inin m\u00fcdaxil\u0259nin qar\u015f\u0131s\u0131n\u0131 almaq \u00fc\u00e7\u00fcn t\u0259dbirl\u0259r g\u00f6r\u00fcr.<\/div>\n<div><\/div>\n<div><\/div>\n<div><b>4. CIA \u00fc\u00e7buca\u011f\u0131n\u0131 a\u00e7\u0131qlay\u0131n<\/b><\/div>\n<div>\n<div><b>Cavab<\/b>: CIA-\u0131n a\u00e7\u0131l\u0131\u015f\u0131 Confidentiality(Konfidensiall\u0131q), Integrity(taml\u0131q) v\u0259 Availability(\u0259l\u00e7atanl\u0131q)-d\u0131r. CIA \u0130nformasiya T\u0259hl\u00fck\u0259sizliyi siyas\u0259tl\u0259rin\u0259 r\u0259hb\u0259rlik etm\u0259k \u00fc\u00e7\u00fcn haz\u0131rlanm\u0131\u015f modeldir. Bu, t\u0259\u015fkilatlar t\u0259r\u0259find\u0259n istifad\u0259 edil\u0259n \u0259n m\u0259\u015fhur modell\u0259rd\u0259n biridir.<\/div>\n<div><\/div>\n<div>Konfidensiall\u0131q<\/div>\n<div>M\u0259lumat yaln\u0131z s\u0259lahiyy\u0259tli i\u015f\u00e7il\u0259r \u00fc\u00e7\u00fcn \u0259l\u00e7atan v\u0259 oxuna bil\u0259n olmal\u0131d\u0131r. O, icaz\u0259siz i\u015f\u00e7il\u0259r t\u0259r\u0259find\u0259n \u0259l\u00e7atan olmamal\u0131d\u0131r. Kims\u0259 m\u0259lumatlara daxil olmaq \u00fc\u00e7\u00fcn hakerd\u0259n istifad\u0259 ed\u0259rs\u0259, m\u0259lumat g\u00fccl\u00fc \u015f\u0259kild\u0259 \u015fifr\u0259l\u0259nm\u0259lidir ki, m\u0259lumat \u0259ld\u0259 olunsa bel\u0259, oxunaq v\u0259 ya ba\u015fa d\u00fc\u015f\u00fcl\u0259n olmas\u0131n.<\/div>\n<div><\/div>\n<div>Taml\u0131q<\/div>\n<div>M\u0259lumatlar\u0131n icaz\u0259si olmayan \u015f\u0259xsl\u0259r t\u0259r\u0259find\u0259n d\u0259yi\u015fdirilm\u0259diyind\u0259n \u0259min olmaq \u00fc\u00e7\u00fcnd\u00fcr. D\u00fcr\u00fcstl\u00fck m\u0259lumatlar\u0131n icaz\u0259si olmayan i\u015f\u00e7il\u0259r t\u0259r\u0259find\u0259n pozulmamas\u0131n\u0131 v\u0259 ya d\u0259yi\u015fdirilm\u0259m\u0259sini t\u0259min edir. S\u0259lahiyy\u0259tli \u015f\u0259xs\/sistem m\u0259lumatlar\u0131 d\u0259yi\u015fdirm\u0259y\u0259 \u00e7al\u0131\u015f\u0131rsa v\u0259 d\u0259yi\u015fiklik u\u011fursuz olarsa, m\u0259lumat geri qaytar\u0131lmal\u0131 v\u0259 z\u0259d\u0259l\u0259nm\u0259m\u0259lidir.<\/div>\n<div><\/div>\n<div>\u018fl\u00e7atanl\u0131q<\/div>\n<div>M\u0259lumat istifad\u0259\u00e7i t\u0259l\u0259b etdiyi zaman istifad\u0259\u00e7i \u00fc\u00e7\u00fcn \u0259l\u00e7atan olmal\u0131d\u0131r. Avadanl\u0131\u011f\u0131n saxlanmas\u0131, m\u00fcnt\u0259z\u0259m olaraq t\u0259kmill\u0259\u015fdirilm\u0259si, M\u0259lumatlar\u0131n Yed\u0259kl\u0259nm\u0259si v\u0259 B\u0259rpas\u0131, \u015e\u0259b\u0259k\u0259 Darbo\u011fazlar\u0131na diqq\u0259t yetirilm\u0259lidir.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><b>5. \u015eifr\u0259l\u0259m\u0259 Hashing-d\u0259n n\u0259 il\u0259 f\u0259rql\u0259nir?\u00a0<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>: H\u0259m \u015eifr\u0259l\u0259m\u0259, h\u0259m d\u0259 Hashing oxuna bil\u0259n m\u0259lumatlar\u0131 oxunmayan formata \u00e7evirm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunur. F\u0259rq ondad\u0131r ki, \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat \u015fifr\u0259nin a\u00e7\u0131lmas\u0131 prosesi il\u0259 yenid\u0259n orijinal m\u0259lumatlara \u00e7evril\u0259 bil\u0259r, lakin hash edilmi\u015f m\u0259lumatlar orijinal m\u0259lumatlara qaytar\u0131la bilm\u0259z<\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>6. Firewall n\u0259dir v\u0259 ondan n\u0259 \u00fc\u00e7\u00fcn istifad\u0259 olunur?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>:Firewall \u015f\u0259b\u0259k\u0259 trafikini izl\u0259y\u0259n v\u0259 idar\u0259 ed\u0259n sistem\/\u015f\u0259b\u0259k\u0259 s\u0259rh\u0259dl\u0259rind\u0259 qurulmu\u015f \u015f\u0259b\u0259k\u0259 t\u0259hl\u00fck\u0259sizlik sistemidir.<\/div>\n<div><\/div>\n<div>Firewalllar \u0259sas\u0259n sistemi\/\u015f\u0259b\u0259k\u0259ni viruslar, qurdlar, z\u0259r\u0259rli proqramlar v\u0259 s.-d\u0259n qorumaq \u00fc\u00e7\u00fcn istifad\u0259 olunur. Firewalllar h\u0259m\u00e7inin uzaqdan giri\u015fin(Remote Access) v\u0259 m\u0259zmunun filtrl\u0259nm\u0259sinin qar\u015f\u0131s\u0131n\u0131 almaq \u00fc\u00e7\u00fcn d\u0259 ola bil\u0259r.<\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>7. VA (Z\u0259ifliyin Qiym\u0259tl\u0259ndirilm\u0259si) v\u0259 PT (Penetrasiya Testi) aras\u0131nda f\u0259rq n\u0259dir?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>:Vulnerability Assessment qar\u015f\u0131 sistemd\u0259 q\u00fcsurlar\u0131n tap\u0131lmas\u0131 prosesidir. T\u0259\u015fkilatlar sisteml\u0259rinin\/\u015f\u0259b\u0259k\u0259l\u0259rinin q\u00fcsurlar\u0131 v\u0259 ya z\u0259if t\u0259r\u0259fl\u0259ri oldu\u011funu bilir v\u0259 bu q\u00fcsurlar\u0131 tapmaq v\u0259 d\u00fcz\u0259ltm\u0259k \u00fc\u00e7\u00fcn q\u00fcsurlar\u0131 prioritetl\u0259\u015fdirm\u0259k ist\u0259yir.<\/div>\n<div><\/div>\n<div>Penetration Testing h\u0259d\u0259fd\u0259 z\u0259iflikl\u0259rin tap\u0131lmas\u0131 prosesidir. T\u0259\u015fkilatlar d\u00fc\u015f\u00fcn\u0259 bil\u0259c\u0259kl\u0259ri b\u00fct\u00fcn t\u0259hl\u00fck\u0259sizlik t\u0259dbirl\u0259rini qurublar.Onlar\u0131n sistemini\/\u015f\u0259b\u0259k\u0259sini s\u0131nd\u0131rmaq \u00fc\u00e7\u00fcn ba\u015fqa yol olub-olmad\u0131\u011f\u0131n\u0131 bilm\u0259k v\u0259 yoxlamaq \u00fc\u00e7\u00fcn bu xidm\u0259td\u0259n istifad\u0259 edirl\u0259r.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><b>8.\u00dc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma n\u0259dir?<\/b><\/div>\n<div><b>Cavab:\u00a0<\/b>\u00dc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma, host v\u0259 m\u00fc\u015ft\u0259ri aras\u0131nda \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn TCP\/IP \u015f\u0259b\u0259k\u0259sind\u0259 istifad\u0259 edil\u0259n \u00fcsuldur. Bu, \u00fc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma adlan\u0131r, \u00e7\u00fcnki bu, m\u00fc\u015ft\u0259ri v\u0259 serverin paket m\u00fcbadil\u0259si apard\u0131\u011f\u0131 \u00fc\u00e7 add\u0131ml\u0131 bir \u00fcsuldur. \u00dc\u00e7 add\u0131m a\u015fa\u011f\u0131dak\u0131lard\u0131r:<\/div>\n<div>1.\u00a0 \u00a0M\u00fc\u015ft\u0259ri server\u0259 SYN (Sinxronizasiya) paketini g\u00f6nd\u0259rir, serverin i\u015fl\u0259k v\u0259ziyy\u0259td\u0259 olub olmad\u0131\u011f\u0131n\u0131 v\u0259 ya a\u00e7\u0131q portlar\u0131n olub olmad\u0131\u011f\u0131n\u0131 yoxlay\u0131r.<\/div>\n<div>2.\u00a0 \u00a0Server a\u00e7\u0131q portlar\u0131 varsa, m\u00fc\u015ft\u0259riy\u0259 SYN-ACK paketini g\u00f6nd\u0259rir<\/div>\n<div>3.\u00a0 \u00a0M\u00fc\u015ft\u0259ri bunu q\u0259bul edir v\u0259 server\u0259 ACK (T\u0259qdimat) paketi g\u00f6nd\u0259rir.<\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>9. Veb T\u0259tbiqind\u0259n al\u0131na bil\u0259n cavab kodlar\u0131 hans\u0131lard\u0131r?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>:<\/div>\n<div>1xx \u2013 M\u0259lumat xarakterli cavablar(Informational responses)<\/div>\n<div>2xx \u2013 U\u011fur(Success)<\/div>\n<div>3xx \u2013 Yenid\u0259n y\u00f6nl\u0259ndirm\u0259(Redirection)<\/div>\n<div>4xx \u2013 M\u00fc\u015ft\u0259ri t\u0259r\u0259f x\u0259tas\u0131(Client-side error)<\/div>\n<div>5xx \u2013 Server t\u0259r\u0259f x\u0259tas\u0131(Server-side error)<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><b>10. Traceroute n\u0259dir?<\/b><\/div>\n<div><b>Cavab:\u00a0<\/b>Traceroute paketin yolunu g\u00f6st\u0259r\u0259n bir vasit\u0259dir. O, paketin ke\u00e7diyi b\u00fct\u00fcn n\u00f6qt\u0259l\u0259ri (\u0259sas\u0259n mar\u015frutla\u015fd\u0131r\u0131c\u0131lar) sadalay\u0131r. Bu, \u0259sas\u0259n paket t\u0259yinat yerin\u0259 \u00e7atmad\u0131qda istifad\u0259 olunur. Traceroute, nasazl\u0131q n\u00f6qt\u0259sini m\u00fc\u0259yy\u0259n etm\u0259k \u00fc\u00e7\u00fcn \u0259laq\u0259nin harada dayand\u0131\u011f\u0131n\u0131 v\u0259 ya pozuldu\u011funu yoxlamaq \u00fc\u00e7\u00fcn istifad\u0259 olunur.<\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>11. Firewall qurmaq \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar var?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab:<\/b><\/div>\n<div>1.\u00a0 \u00a0Username\/password: firewall cihaz\u0131 \u00fc\u00e7\u00fcn standart parolu d\u0259yi\u015fdirin<\/div>\n<div>2.\u00a0 \u00a0Remote administration: Uzaqdan idar\u0259etm\u0259 funksiyas\u0131n\u0131 s\u00f6nd\u00fcr\u00fcn<\/div>\n<div>3.\u00a0 \u00a0Port forwarding: Veb server v\u0259 ya FTP server kimi m\u00fc\u0259yy\u0259n proqramlar\u0131n d\u00fczg\u00fcn i\u015fl\u0259m\u0259si \u00fc\u00e7\u00fcn m\u00fcvafiq port y\u00f6nl\u0259ndirm\u0259sini konfiqurasiya edin<\/div>\n<div>4.\u00a0 \u00a0DHCP Server: Firewallun m\u00f6vcud DHCP serveri il\u0259 \u015f\u0259b\u0259k\u0259y\u0259 qura\u015fd\u0131r\u0131lmas\u0131, firewallun DHCP-si deaktiv edilm\u0259yinc\u0259 m\u00fcnaqi\u015f\u0259y\u0259 s\u0259b\u0259b olacaq.<\/div>\n<div>5.\u00a0 \u00a0Logging: Firewall probleml\u0259rini v\u0259 ya potensial h\u00fccumlar\u0131 aradan qald\u0131rmaq \u00fc\u00e7\u00fcn giri\u015fin aktiv oldu\u011fundan \u0259min olun v\u0259 log-lara nec\u0259 baxmaq laz\u0131m oldu\u011funu anlay\u0131n.<\/div>\n<div>6.\u00a0 \u00a0Policies: M\u00f6hk\u0259m t\u0259hl\u00fck\u0259sizlik siyas\u0259tl\u0259riniz olmal\u0131 v\u0259 Firewall-un h\u0259min siyas\u0259tl\u0259ri t\u0259tbiq etm\u0259k \u00fc\u00e7\u00fcn konfiqurasiya edildiyin\u0259 \u0259min olmal\u0131s\u0131n\u0131z.<\/div>\n<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>12. SSL \u015eifr\u0259l\u0259m\u0259sini izah edin<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>:<\/div>\n<div>SSL (Secure Sockets Layer) Veb Server v\u0259 Brauzer aras\u0131nda \u015fifr\u0259l\u0259nmi\u015f \u0259laq\u0259l\u0259r yaradan s\u0259naye standartl\u0131 t\u0259hl\u00fck\u0259sizlik texnologiyas\u0131d\u0131r. Bu, m\u0259lumatlar\u0131n m\u0259xfiliyini qorumaq v\u0259 onlayn \u0259m\u0259liyyatlarda m\u0259lumat\u0131 qorumaq \u00fc\u00e7\u00fcn istifad\u0259 olunur.<\/div>\n<div><\/div>\n<div>SSL ba\u011flant\u0131s\u0131 qurmaq \u00fc\u00e7\u00fcn add\u0131mlar a\u015fa\u011f\u0131dak\u0131 kimidir:<\/div>\n<div>1.\u00a0 \u00a0Brauzer SSL il\u0259 qorunan veb server\u0259 qo\u015fulma\u011fa \u00e7al\u0131\u015f\u0131r<\/div>\n<div>2.\u00a0 \u00a0Brauzer SSL sertifikat\u0131n\u0131n sur\u0259tini brauzer\u0259 g\u00f6nd\u0259rir<\/div>\n<div>3.\u00a0 \u00a0Brauzer SSL sertifikat\u0131n\u0131n etibarl\u0131 olub olmad\u0131\u011f\u0131n\u0131 yoxlay\u0131r. Etibarl\u0131d\u0131rsa, o zaman brauzer veb server\u0259 \u015fifr\u0259li \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn mesaj g\u00f6nd\u0259rir<\/div>\n<div>4.\u00a0 \u00a0Veb server SSL \u015fifr\u0259li ba\u011flant\u0131ya ba\u015flamaq \u00fc\u00e7\u00fcn t\u0259sdiq g\u00f6nd\u0259rir<\/div>\n<div>5. SSL \u015fifr\u0259li \u0259lqa\u0259 brauzer v\u0259 veb server aras\u0131nda ba\u015f verir<\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>13. Serverin t\u0259hl\u00fck\u0259sizliyini t\u0259min etm\u0259k \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar\u0131 atacaqs\u0131n\u0131z?<\/b><\/div>\n<div><b>\u00a0<\/b><\/div>\n<div><b>Cavab<\/b>:<\/div>\n<div>T\u0259hl\u00fck\u0259siz serverl\u0259r m\u0259lumatlar\u0131 icaz\u0259siz \u0259l\u0259 ke\u00e7irm\u0259kd\u0259n qorumaq \u00fc\u00e7\u00fcn m\u0259lumatlar\u0131n \u015fifr\u0259l\u0259nm\u0259si v\u0259 \u015fifr\u0259sinin a\u00e7\u0131lmas\u0131 \u00fc\u00e7\u00fcn Secure Sockets Layer (SSL) protokolundan istifad\u0259 edir.<\/div>\n<div>Serveri qorumaq \u00fc\u00e7\u00fcn d\u00f6rd sad\u0259 yol var:<\/div>\n<div>Add\u0131m 1: Root v\u0259 administrator istifad\u0259\u00e7il\u0259riniz \u00fc\u00e7\u00fcn t\u0259hl\u00fck\u0259siz parolunuz oldu\u011fundan \u0259min olun<\/div>\n<div>Add\u0131m 2: Sizin etm\u0259li oldu\u011funuz n\u00f6vb\u0259ti \u015fey sisteminizd\u0259 yeni istifad\u0259\u00e7il\u0259r yaratmaqd\u0131r. Bunlar sistemi idar\u0259 etm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 etdiyiniz istifad\u0259\u00e7il\u0259r olacaq<\/div>\n<div>Add\u0131m 3: default root\/administrator hesablar\u0131ndan uzaqdan giri\u015fi silin<\/div>\n<div>Add\u0131m 4: N\u00f6vb\u0259ti add\u0131m uzaqdan giri\u015f \u00fc\u00e7\u00fcn Firewall qaydalar\u0131n\u0131z\u0131 konfiqurasiya etm\u0259kdir<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>14. M\u0259lumat s\u0131zmas\u0131n\u0131(Data Leakage) izah edin<\/b><\/div>\n<div><\/div>\n<div><b>Cvaab<\/b>: M\u0259lumat s\u0131zmas\u0131 m\u0259lumatlar\u0131n t\u0259\u015fkilat daxilind\u0259n icaz\u0259siz k\u0259nar t\u0259yinat yerin\u0259 q\u0259sd\u0259n v\u0259 ya ist\u0259m\u0259d\u0259n \u00f6t\u00fcr\u00fclm\u0259sidir. Bu, m\u0259xfi m\u0259lumat\u0131n icaz\u0259siz quruma a\u00e7\u0131qlanmas\u0131d\u0131r.<\/div>\n<div>M\u0259lumat s\u0131zmas\u0131 nec\u0259 ba\u015f verdiyin\u0259 g\u00f6r\u0259 3 kateqoriyaya b\u00f6l\u00fcn\u0259 bil\u0259r:<\/div>\n<div>1. T\u0259sad\u00fcfi pozulma: M\u00fc\u0259ssis\u0259 s\u0259hv v\u0259 ya kobud n\u00f6qteyi-n\u0259z\u0259rd\u0259n icaz\u0259siz \u015f\u0259xs\u0259 m\u0259lumat g\u00f6nd\u0259rir<\/div>\n<div>2. Q\u0259sd\u0259n pozma: S\u0259lahiyy\u0259tli qurum m\u0259qs\u0259dli \u015f\u0259kild\u0259 icaz\u0259siz quruma m\u0259lumatlar\u0131 g\u00f6nd\u0259rir<\/div>\n<div>3. Sistem Hack: Hacking \u00fcsullar\u0131 m\u0259lumat s\u0131zmas\u0131na s\u0259b\u0259b olmaq \u00fc\u00e7\u00fcn istifad\u0259 olunur<\/div>\n<div><\/div>\n<div>DLP (Data Leakage Prevention) Al\u0259tl\u0259ri kimi tan\u0131nan al\u0259tl\u0259r, proqram t\u0259minat\u0131 v\u0259 strategiyalardan istifad\u0259 etm\u0259kl\u0259 m\u0259lumat s\u0131zmas\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 almaq olar.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><\/div>\n<div><b>15. \u00dcmumi kiberh\u00fccumlardan b\u0259zil\u0259ri hans\u0131lard\u0131r?<\/b><\/div>\n<\/div>\n<div><b>\u00a0<\/b><\/div>\n<div>\n<div><b>Cavab<\/b>: A\u015fa\u011f\u0131da sisteminiz\u0259 m\u0259nfi t\u0259sir g\u00f6st\u0259r\u0259 bil\u0259c\u0259k b\u0259zi \u00fcmumi kiberh\u00fccumlar verilmi\u015fdir.<\/div>\n<div><\/div>\n<div>Malware<\/div>\n<div>Phishing<\/div>\n<div>Password Attacks<\/div>\n<div>DDoS<\/div>\n<div>Man in the Middle<\/div>\n<div>Drive-By Downloads<\/div>\n<div>Malvertising<\/div>\n<div>Rogue Software<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>16. Port Scanning n\u0259dir?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>: Port Skanlama, hostda m\u00f6vcud olan a\u00e7\u0131q portlar\u0131 v\u0259 xidm\u0259ti m\u00fc\u0259yy\u0259n etm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259n texnikad\u0131r. Hakerl\u0259r z\u0259iflikl\u0259rd\u0259n istifad\u0259 etm\u0259k \u00fc\u00e7\u00fcn faydal\u0131 ola bil\u0259c\u0259k m\u0259lumatlar\u0131 tapmaq \u00fc\u00e7\u00fcn port skan\u0131ndan istifad\u0259 edirl\u0259r.<\/div>\n<div>\u0130dar\u0259\u00e7il\u0259r \u015f\u0259b\u0259k\u0259nin t\u0259hl\u00fck\u0259sizlik siyas\u0259tl\u0259rini yoxlamaq \u00fc\u00e7\u00fcn Port Skanlamas\u0131ndan istifad\u0259 edirl\u0259r.<\/div>\n<div>\u00dcmumi Port Skanlama Texnikalar\u0131ndan b\u0259zil\u0259ri bunlard\u0131r:<\/div>\n<div>Ping Scan<\/div>\n<div>TCP Half-Open<\/div>\n<div>TCP Connect<\/div>\n<div>UDP<\/div>\n<div>Stealth Scanning<\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>17. Brute Force Attack n\u0259dir? Bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 ala bil\u0259rsiniz?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>: Brute Force, m\u00fcmk\u00fcn etimadnam\u0259l\u0259rin b\u00fct\u00fcn d\u0259yi\u015fm\u0259l\u0259rini v\u0259 kombinasiyalar\u0131n\u0131 t\u0259krar-t\u0259krar s\u0131namaqla d\u00fczg\u00fcn etimadnam\u0259l\u0259ri tapmaq \u00fcsuludur.<\/div>\n<div>\u018fks\u0259r hallarda Brute Force h\u00fccumlar\u0131 avtomatla\u015fd\u0131r\u0131l\u0131r, burada al\u0259t\/proqram avtomatik olaraq etimadnam\u0259l\u0259r siyah\u0131s\u0131 il\u0259 daxil olma\u011fa \u00e7al\u0131\u015f\u0131r. Brute Force h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 alma\u011f\u0131n m\u00fcxt\u0259lif yollar\u0131 var.<\/div>\n<div>Onlardan b\u0259zil\u0259ri bunlard\u0131r:<\/div>\n<div>Parolun uzunlu\u011fu: Siz parol \u00fc\u00e7\u00fcn minimum uzunluq t\u0259yin ed\u0259 bil\u0259rsiniz. \u015eifr\u0259 n\u0259 q\u0259d\u0259r uzun olsa, onu tapmaq bir o q\u0259d\u0259r \u00e7\u0259tindir.<\/div>\n<div>\u015eifr\u0259 M\u00fcr\u0259kk\u0259bliyi: Parolda simvollar\u0131n m\u00fcxt\u0259lif formatlar\u0131n\u0131n daxil edilm\u0259si kobud g\u00fcc h\u00fccumlar\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir. X\u00fcsusi simvollar v\u0259 b\u00f6y\u00fck v\u0259 ki\u00e7ik h\u0259rfl\u0259rl\u0259 birlikd\u0259 alfa-r\u0259q\u0259m parollar\u0131ndan istifad\u0259 parol m\u00fcr\u0259kk\u0259bliyini art\u0131r\u0131r v\u0259 s\u0131nd\u0131r\u0131lmas\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir.<\/div>\n<div>Giri\u015f c\u0259hdl\u0259rinin m\u0259hdudla\u015fd\u0131r\u0131lmas\u0131: Giri\u015f u\u011fursuzluqlar\u0131na limit t\u0259yin edin. M\u0259s\u0259l\u0259n, giri\u015f x\u0259talar\u0131 \u00fc\u00e7\u00fcn limiti 3 kimi t\u0259yin ed\u0259 bil\u0259rsiniz. Bel\u0259likl\u0259, ard\u0131c\u0131l 3 giri\u015f u\u011fursuzlu\u011fu olduqda, istifad\u0259\u00e7inin bir m\u00fcdd\u0259t daxil olmas\u0131n\u0131 m\u0259hdudla\u015fd\u0131r\u0131n v\u0259 ya n\u00f6vb\u0259ti d\u0259f\u0259 daxil olmas\u0131, istifad\u0259 etm\u0259si \u00fc\u00e7\u00fcn E-po\u00e7t v\u0259 ya OTP g\u00f6nd\u0259rin. Brute Force avtomatla\u015fd\u0131r\u0131lm\u0131\u015f proses oldu\u011fundan, giri\u015f c\u0259hdl\u0259rini m\u0259hdudla\u015fd\u0131rmaq Brute Force prosesini pozacaq.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>18. OSI modelinin m\u00fcxt\u0259lif t\u0259b\u0259q\u0259l\u0259ri hans\u0131lard\u0131r?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>: OSI modeli, proqramlar\u0131n \u015f\u0259b\u0259k\u0259 \u00fcz\u0259rind\u0259n nec\u0259 \u0259laq\u0259 saxlayaca\u011f\u0131na dair \u0259laq\u0259li istinad modelidir. OSI referans\u0131n\u0131n m\u0259qs\u0259di r\u0259q\u0259msal kommunikasiya m\u0259hsullar\u0131 v\u0259 software proqramlar\u0131n\u0131n qar\u015f\u0131l\u0131ql\u0131 f\u0259aliyy\u0259t g\u00f6st\u0259r\u0259 bilm\u0259si \u00fc\u00e7\u00fcn sat\u0131c\u0131lara v\u0259 t\u0259rtibat\u00e7\u0131lara r\u0259hb\u0259rlik etm\u0259kdir.<\/div>\n<div><\/div>\n<div>Fiziki s\u0259viyy\u0259(Physical): R\u0259q\u0259msal m\u0259lumatlar\u0131n rabit\u0259 vasit\u0259si il\u0259 g\u00f6nd\u0259ricid\u0259n al\u0131c\u0131ya \u00f6t\u00fcr\u00fclm\u0259sin\u0259 cavabdehdir<\/div>\n<div>Data Link Layer: Veril\u0259nl\u0259rin fiziki ke\u00e7id\u0259 v\u0259 oradan h\u0259r\u0259k\u0259tini idar\u0259 edir. O, h\u0259m\u00e7inin m\u0259lumat bitl\u0259rinin kodla\u015fd\u0131r\u0131lmas\u0131 v\u0259 dekodlanmas\u0131na cavabdehdir.<\/div>\n<div>\u015e\u0259b\u0259k\u0259 s\u0259viyy\u0259si: Paketin y\u00f6nl\u0259ndirilm\u0259si v\u0259 \u015f\u0259b\u0259k\u0259 rabit\u0259si \u00fc\u00e7\u00fcn mar\u015frutla\u015fd\u0131rma yollar\u0131n\u0131n t\u0259min edilm\u0259sin\u0259 cavabdehdir.<\/div>\n<div>N\u0259qliyyat Layeri: \u015e\u0259b\u0259k\u0259 \u00fcz\u0259rind\u0259n end-to-end rabit\u0259y\u0259 cavabdehdir. O, m\u0259lumat\u0131 yuxar\u0131dak\u0131 t\u0259b\u0259q\u0259d\u0259n ay\u0131r\u0131r v\u0259 \u015e\u0259b\u0259k\u0259 Layerin\u0259 \u00f6t\u00fcr\u00fcr v\u0259 sonra b\u00fct\u00fcn m\u0259lumatlar\u0131n q\u0259buledicinin sonuna u\u011furla \u00e7atmas\u0131n\u0131 t\u0259min edir.<\/div>\n<div>Session Layer: G\u00f6nd\u0259r\u0259n v\u0259 q\u0259bul ed\u0259n aras\u0131nda \u0259laq\u0259ni idar\u0259 edir. O, sessiyan\u0131n ba\u015flamas\u0131, ba\u015fa \u00e7atmas\u0131 v\u0259 idar\u0259 edilm\u0259sin\u0259, g\u00f6nd\u0259rici il\u0259 q\u0259buledici aras\u0131nda qar\u015f\u0131l\u0131ql\u0131 \u0259laq\u0259nin qurulmas\u0131na, saxlanmas\u0131na v\u0259 sinxronla\u015fd\u0131r\u0131lmas\u0131na cavabdehdir.<\/div>\n<div>T\u0259qdimat Layeri: Bu, xam dataqramlar v\u0259 ya paketl\u0259r g\u00f6nd\u0259rm\u0259k \u0259v\u0259zin\u0259 veril\u0259nl\u0259rin d\u00fczg\u00fcn formatda v\u0259 m\u0259lumat strukturunda t\u0259qdim edilm\u0259si il\u0259 m\u0259\u015f\u011ful olur.<\/div>\n<div>T\u0259tbiq Layeri: T\u0259tbiq v\u0259 \u015f\u0259b\u0259k\u0259 aras\u0131nda interfeys t\u0259min edir. O, prosesd\u0259n proses\u0259 rabit\u0259y\u0259 diqq\u0259t yetirir v\u0259 \u00fcnsiyy\u0259t interfeysini t\u0259min edir.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>19. VPN n\u0259dir?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>: Dem\u0259k olar ki, b\u00fct\u00fcn Kibert\u0259hl\u00fck\u0259sizlik M\u00fcsahib\u0259 Suallar\u0131na bu sual daxil edilir. VPN Virtual \u015e\u0259xsi \u015e\u0259b\u0259k\u0259 dem\u0259kdir. T\u0259hl\u00fck\u0259siz v\u0259 \u015fifr\u0259li \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn istifad\u0259 olunur. Bir VPN istifad\u0259 ed\u0259rk\u0259n, m\u00fc\u015ft\u0259rid\u0259n g\u0259l\u0259n m\u0259lumatlar VPN-d\u0259 \u015fifr\u0259l\u0259ndiyi bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir v\u0259 sonra internet vasit\u0259sil\u0259 ba\u015fqa bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir.<\/div>\n<div>Bu zaman veril\u0259nl\u0259rin \u015fifr\u0259si a\u00e7\u0131l\u0131r v\u0259 server\u0259 g\u00f6nd\u0259rilir. Server cavab g\u00f6nd\u0259rdikd\u0259, cavab VPN-in \u015fifr\u0259l\u0259ndiyi bir n\u00f6qt\u0259y\u0259 v\u0259 bu \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat VPN-in \u015fifr\u0259sinin a\u00e7\u0131ld\u0131\u011f\u0131 ba\u015fqa bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir. V\u0259 n\u0259hay\u0259t, \u015fifr\u0259si a\u00e7\u0131lm\u0131\u015f m\u0259lumatlar m\u00fc\u015ft\u0259riy\u0259 g\u00f6nd\u0259rilir. VPN-d\u0259n istifad\u0259 etm\u0259yin b\u00fct\u00fcn m\u0259qs\u0259di \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat \u00f6t\u00fcr\u00fclm\u0259sini t\u0259min etm\u0259kdir.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>20. \u015e\u0259b\u0259k\u0259d\u0259 Risk, Z\u0259iflik v\u0259 T\u0259hdid dedikd\u0259 n\u0259 ba\u015fa d\u00fc\u015f\u00fcrs\u00fcn\u00fcz?<\/b><\/div>\n<div><\/div>\n<div><b>Cvaab<\/b>: T\u0259hdid: Sistem\u0259 v\u0259 ya t\u0259\u015fkilata z\u0259r\u0259r vurma potensial\u0131 olan kims\u0259<\/div>\n<div>Z\u0259iflik: Potensial haker t\u0259r\u0259find\u0259n istifad\u0259 edil\u0259 bil\u0259n sistemd\u0259ki z\u0259iflik<\/div>\n<div>Risk: T\u0259hl\u00fck\u0259li z\u0259iflikd\u0259n istifad\u0259 etdikd\u0259 itki v\u0259 ya z\u0259d\u0259l\u0259nm\u0259 potensial\u0131<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>21. Black Hat, White Hat v\u0259 Gray Hat hakerl\u0259ri n\u0259dir?<\/b><\/div>\n<div><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>:Blach Hat hakerl\u0259r komp\u00fcter \u015f\u0259b\u0259k\u0259l\u0259rin\u0259 m\u00fcdaxil\u0259 haqq\u0131nda geni\u015f biliy\u0259 malik olmaqlar\u0131 il\u0259 tan\u0131n\u0131rlar. Onlar bu sisteml\u0259r\u0259 daxil olmaq \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259n z\u0259r\u0259rli proqramlar yaza bilirl\u0259r. Bu tip hakerl\u0259r m\u0259lumat o\u011furlamaq v\u0259 ya s\u0131nd\u0131r\u0131lm\u0131\u015f sistemd\u0259n z\u0259r\u0259rli m\u0259qs\u0259dl\u0259r \u00fc\u00e7\u00fcn \u00f6z bacar\u0131qlar\u0131ndan sui-istifad\u0259 edirl\u0259r.<\/div>\n<div>White Hat hakerl\u0259r \u00f6z s\u0259lahiyy\u0259tl\u0259rini yax\u015f\u0131 i\u015fl\u0259r \u00fc\u00e7\u00fcn istifad\u0259 edirl\u0259r v\u0259 buna g\u00f6r\u0259 d\u0259 onlara Etik Hakerl\u0259r deyilir. Onlar Black Hat hackerler il\u0259 eyni biliy\u0259 malik olurlar. Bunlar \u0259sas\u0259n \u015firk\u0259tl\u0259r t\u0259r\u0259find\u0259n sisteml\u0259rd\u0259 z\u0259iflikl\u0259ri v\u0259 t\u0259hl\u00fck\u0259sizlik bo\u015fluqlar\u0131n\u0131 tapma\u011fa v\u0259 d\u00fcz\u0259ltm\u0259y\u0259 \u00e7al\u0131\u015fan bir t\u0259hl\u00fck\u0259sizlik m\u00fct\u0259x\u0259ssisi kimi i\u015f\u0259 g\u00f6t\u00fcr\u00fcl\u00fcrl\u0259r. Onlar t\u0259hl\u00fck\u0259sizliyi yax\u015f\u0131la\u015fd\u0131rmaq \u00fc\u00e7\u00fcn \u00f6z bacar\u0131qlar\u0131ndan istifad\u0259 edirl\u0259r.<\/div>\n<div>Gray Hat hakerl\u0259r White v\u0259 Black Hat hakerinin birl\u0259\u015fm\u0259sidir. Sahibinin icaz\u0259si olmadan sistem z\u0259iflikl\u0259rini axtar\u0131rlar. H\u0259r hans\u0131 bir z\u0259iflik a\u015fkar ed\u0259rl\u0259rs\u0259, bu bar\u0259d\u0259 sahibin\u0259 m\u0259lumat verirl\u0259r. Black Hat hakerl\u0259rd\u0259n f\u0259rqli olaraq, onlar a\u015fkar edilmi\u015f z\u0259iflikl\u0259rd\u0259n istifad\u0259 etmirl\u0259r.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>22.XSS h\u00fccumunu izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>:XSS (Saytlararas\u0131 Skriptl\u0259m\u0259) hakerl\u0259r\u0259 veb s\u0259hif\u0259l\u0259r\u0259 z\u0259r\u0259rli client-side skriptl\u0259ri yeritm\u0259y\u0259 imkan ver\u0259n kiberh\u00fccumdur. XSS sessiyalar\u0131 v\u0259 kukil\u0259ri o\u011furlamaq, DOM-u d\u0259yi\u015fdirm\u0259k, remote code execution, serveri s\u0131nd\u0131rmaq v\u0259 s. \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r.<\/div>\n<div>XSS-in n\u00f6vl\u0259ri<\/div>\n<div>&#8211;\u00a0 \u00a0 \u00a0 \u00a0Reflected XSS<\/div>\n<div>&#8211;\u00a0 \u00a0 \u00a0 \u00a0Stored XSS<\/div>\n<div>&#8211;\u00a0 \u00a0 \u00a0 \u00a0DOM Based XSS<\/div>\n<div>A\u015fa\u011f\u0131dak\u0131 t\u0259cr\u00fcb\u0259l\u0259rd\u0259n istifad\u0259 etm\u0259kl\u0259 XSS h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:<\/div>\n<div>\u0130stifad\u0259\u00e7i daxiletm\u0259l\u0259rini t\u0259sdiql\u0259yin (Validate user inputs)<\/div>\n<div>\u00b7\u00a0 \u00a0 \u00a0 \u00a0\u0130stifad\u0259\u00e7i giri\u015fl\u0259rini t\u0259mizl\u0259yin (Sanitize user inputs)<\/div>\n<div>X\u00fcsusi simvollar\u0131 kodlay\u0131n(Encode special characters)<\/div>\n<div>Anti-XSS xidm\u0259tl\u0259rind\u0259n\/al\u0259tl\u0259rind\u0259n istifad\u0259 edin (Use Anti-XSS services\/tools)<\/div>\n<div>XSS HTML Filtrind\u0259n istifad\u0259 edin(Use XSS HTML Filter)<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>24. Botnet n\u0259dir?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>: Botnet, h\u0259r bir cihaz\u0131n \u00fcz\u0259rind\u0259 bir v\u0259 ya daha \u00e7ox botun i\u015fl\u0259diyi internet\u0259 qo\u015fulmu\u015f bir s\u0131ra cihazlard\u0131r.<\/div>\n<div>Qur\u011fulardak\u0131 botlar v\u0259 z\u0259r\u0259rli skriptl\u0259r qurban\u0131 s\u0131nd\u0131rmaq \u00fc\u00e7\u00fcn istifad\u0259 olunurdu. Botnetl\u0259r m\u0259lumatlar\u0131 o\u011furlamaq, spam g\u00f6nd\u0259rm\u0259k v\u0259 DDOS h\u00fccumunu h\u0259yata ke\u00e7irm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>25. SSL v\u0259 TLS-I a\u00e7\u0131qlay\u0131n<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>: SSL g\u00f6nd\u0259r\u0259nin \u015f\u0259xsiyy\u0259tini yoxlamaq \u00fc\u00e7\u00fcn n\u0259z\u0259rd\u0259 tutulub, lakin o, bundan ba\u015fqa he\u00e7 n\u0259 axtarm\u0131r. SSL dan\u0131\u015fd\u0131\u011f\u0131n\u0131z insan\u0131 izl\u0259m\u0259y\u0259 k\u00f6m\u0259k ed\u0259 bil\u0259r, lakin bu da b\u0259z\u0259n aldad\u0131la bil\u0259r.<\/div>\n<div><\/div>\n<div>TLS h\u0259m\u00e7inin SSL kimi eynil\u0259\u015fdirm\u0259 vasit\u0259sidir, lakin daha yax\u015f\u0131 t\u0259hl\u00fck\u0259sizlik x\u00fcsusiyy\u0259tl\u0259ri t\u0259klif edir. M\u0259lumatlara \u0259lav\u0259 qorunma t\u0259min edir v\u0259 buna g\u00f6r\u0259 d\u0259 SSL v\u0259 TLS daha yax\u015f\u0131 qorunmaq \u00fc\u00e7\u00fcn tez-tez birlikd\u0259 istifad\u0259 olunur.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>26. 2FA n\u0259dir v\u0259 ictimai vebsaytlar \u00fc\u00e7\u00fcn nec\u0259 t\u0259tbiq oluna bil\u0259r?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>: &#8220;\u00c7ox faktorlu autentifikasiya&#8221; kimi tan\u0131nan \u0259lav\u0259 t\u0259hl\u00fck\u0259sizlik s\u0259viyy\u0259sidir.<\/div>\n<div>Yaln\u0131z parol v\u0259 istifad\u0259\u00e7i ad\u0131 deyil, h\u0259m d\u0259 yaln\u0131z v\u0259 yaln\u0131z h\u0259min istifad\u0259\u00e7inin onlarda olan bir \u015feyi, y\u0259ni ancaq onlar\u0131n bilm\u0259li olduqlar\u0131 v\u0259 ya d\u0259rhal \u0259ld\u0259 etm\u0259li oldu\u011fu bir m\u0259lumat\u0131, m\u0259s\u0259l\u0259n, fiziki token t\u0259l\u0259b edir.<\/div>\n<div>Authenticator proqramlar\u0131 m\u0259tn, s\u0259sli z\u0259ng v\u0259 ya e-po\u00e7t vasit\u0259sil\u0259 do\u011frulama kodu \u0259ld\u0259 etm\u0259k ehtiyac\u0131n\u0131 \u0259v\u0259z edir.<\/div>\n<div>Bu Proqramlara n\u00fcmun\u0259 kimi Google Authenticator v\u0259 Autify kimi proqramlar\u0131 g\u00f6st\u0259rm\u0259k olar.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>27. Fi\u015finqi izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>:Fi\u015finq kiberh\u00fccumdur ki, burada haker etibarl\u0131 \u015f\u0259xs v\u0259 ya biznes kimi maskalan\u0131r v\u0259 saxta e-po\u00e7t v\u0259 ya ani mesaj vasit\u0259sil\u0259 h\u0259ssas maliyy\u0259 v\u0259 ya \u015f\u0259xsi m\u0259lumatlar\u0131 o\u011furlama\u011fa \u00e7al\u0131\u015f\u0131r<\/div>\n<div>A\u015fa\u011f\u0131dak\u0131 \u00fcsullardan istifad\u0259 etm\u0259kl\u0259 fi\u015finq h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:<\/div>\n<div>\u00b7\u00a0 \u00a0 \u00a0 \u00a0Etibar etm\u0259diyiniz veb s\u0259hif\u0259l\u0259r\u0259 h\u0259ssas m\u0259lumatlar\u0131 daxil etm\u0259yin<\/div>\n<div>\u00b7\u00a0 \u00a0 \u00a0 \u00a0Sayt\u0131n t\u0259hl\u00fck\u0259sizliyini yoxlay\u0131n<\/div>\n<div>\u00b7\u00a0 \u00a0 \u00a0 \u00a0Firewall-lardan istifad\u0259 edin<\/div>\n<div>\u00b7\u00a0 \u00a0 \u00a0 \u00a0\u0130nternet T\u0259hl\u00fck\u0259sizliyi olan AntiVirus Proqram\u0131ndan istifad\u0259 edin<\/div>\n<div>\u00b7\u00a0 \u00a0 \u00a0 \u00a0Anti-Fi\u015finq Al\u0259tl\u0259r Panelind\u0259n istifad\u0259 edin<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>28. SQL Enjeksiyonunu izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>: SQL Injection (SQLi) t\u0259cav\u00fczkar\u0131n veb t\u0259tbiqinin veril\u0259nl\u0259r bazas\u0131 serverin\u0259 n\u0259zar\u0259t etm\u0259k \u00fc\u00e7\u00fcn z\u0259r\u0259rli SQL sor\u011fular\u0131n\u0131 yerin\u0259 yetirm\u0259k \u00fc\u00e7\u00fcn server\u0259 g\u00f6nd\u0259ril\u0259n m\u0259lumatlar\u0131 manipulyasiya etdiyi, bununla da icaz\u0259siz m\u0259lumatlara daxil olmaq, d\u0259yi\u015fdirm\u0259k v\u0259 silm\u0259k \u00fc\u00e7\u00fcn kod yeritm\u0259 h\u00fccumudur. Bu h\u00fccum \u0259sas\u0259n veril\u0259nl\u0259r bazas\u0131 serverl\u0259rini \u0259l\u0259 ke\u00e7irm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunur.<\/div>\n<div>A\u015fa\u011f\u0131dak\u0131 t\u0259cr\u00fcb\u0259l\u0259rd\u0259n istifad\u0259 etm\u0259kl\u0259 SQL Injection h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:<\/div>\n<div>\u00b7\u00a0 \u00a0 \u00a0 \u00a0Haz\u0131rlanm\u0131\u015f ifad\u0259l\u0259ri daxil edin (parametrl\u0259\u015fdirilmi\u015f sor\u011fularla)<\/div>\n<div>\u00b7\u00a0 \u00a0 \u00a0 \u00a0Saxlan\u0131lan Prosedurlardan istifad\u0259 edin<\/div>\n<div>\u0130stifad\u0259\u00e7i daxiletm\u0259sini t\u0259sdiq edin(Validate user input)<\/div>\n<div>\u00b7\u00a0 \u00a0 \u00a0 \u00a0Error mesaj\u0131ndan m\u0259lumatlar\u0131 gizl\u0259din<\/div>\n<div>\u00b7\u00a0 \u00a0 \u00a0 \u00a0Sisteminizi yenil\u0259yin<\/div>\n<div>Veril\u0259nl\u0259r bazas\u0131 etimadnam\u0259sini ayr\u0131 v\u0259 \u015fifr\u0259l\u0259nmi\u015f \u015f\u0259kild\u0259 saxlay\u0131n<\/div>\n<div>Shell v\u0259 ehtiyac\u0131n\u0131z olmayan h\u0259r hans\u0131 dig\u0259r funksiyalar\u0131 s\u00f6nd\u00fcr\u00fcn<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>29. T\u0259hl\u00fck\u0259sizlik s\u0259hv konfiqurasiyas\u0131(security misconfiguration) n\u0259dir?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>:Security Misconfiguration t\u0259hl\u00fck\u0259siz olmayan konfiqurasiya se\u00e7imi s\u0259b\u0259bind\u0259n proqram\/\u015f\u0259b\u0259k\u0259\/cihaz h\u00fccuma m\u0259ruz qald\u0131qda ba\u015f ver\u0259 bil\u0259c\u0259k z\u0259iflikdir. Bu, standart istifad\u0259\u00e7i ad\u0131\/parolun d\u0259yi\u015fm\u0259z saxlan\u0131lmas\u0131 q\u0259d\u0259r sad\u0259 ola bil\u0259r.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>30. Remote Desktop Protocol (RDP) n\u0259dir?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>:<\/div>\n<div>&#8211;\u00a0 \u00a0 \u00a0 \u00a0RDP (Remote Desktop Protocol) x\u00fcsusi olaraq m\u00fc\u015ft\u0259ri cihazlar\u0131, istifad\u0259\u00e7il\u0259r v\u0259 virtual \u015f\u0259b\u0259k\u0259 serveri aras\u0131nda proqram m\u0259lumatlar\u0131n\u0131n \u00f6t\u00fcr\u00fclm\u0259si t\u0259hl\u00fck\u0259sizliyi v\u0259 \u015fifr\u0259l\u0259m\u0259si \u00fc\u00e7\u00fcn n\u0259z\u0259rd\u0259 tutulmu\u015f Microsoft protokoludur.<\/div>\n<div>&#8211;\u00a0 \u00a0 \u00a0 \u00a0Bu, administratorlara f\u0259rdi abun\u0259\u00e7il\u0259rin qar\u015f\u0131la\u015fd\u0131\u011f\u0131 probleml\u0259ri uzaqdan qiym\u0259tl\u0259ndirm\u0259y\u0259 v\u0259 h\u0259ll etm\u0259y\u0259 imkan verir.<\/div>\n<div>&#8211;\u00a0 \u00a0 \u00a0 \u00a0O, \u00e7oxn\u00f6qt\u0259li \u00f6t\u00fcrm\u0259 t\u0259min etm\u0259kl\u0259 64.000-\u0259 q\u0259d\u0259r ayr\u0131 m\u0259lumat kanal\u0131n\u0131 d\u0259st\u0259kl\u0259yir.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>31. Address Resolution Protocol (ARP) n\u0259 \u00fc\u00e7\u00fcn istifad\u0259 olunur?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>: ARP x\u00fcsusi olaraq IP \u015f\u0259b\u0259k\u0259 \u00fcnvanlar\u0131n\u0131 Ethernet \u00fcnvanlar\u0131 kimi fiziki \u00fcnvanlarla \u0259laq\u0259l\u0259ndirm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunan protokoldur.<\/div>\n<div><\/div>\n<div>32 bitlik \u00fcnvanlar\u0131 48 bitlik \u00fcnvanlara v\u0259 \u0259ksin\u0259 t\u0259rc\u00fcm\u0259 edir. Bu laz\u0131md\u0131r, \u00e7\u00fcnki bu g\u00fcn istifad\u0259 etdiyimiz internet protokolunun (IP) \u0259n \u00fcmumi s\u0259viyy\u0259si 32 bit uzunlu\u011funda v\u0259 MAC \u00fcnvanlar\u0131 48 bit uzunlu\u011fundad\u0131r.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>33. \u015e\u0259b\u0259k\u0259 t\u0259hl\u00fck\u0259sizliyi \u00fc\u00e7\u00fcn autentifikasiyan\u0131n \u00fcmumi \u00fcsullar\u0131 hans\u0131lard\u0131r?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>: Biometrics &#8211; Bu, istifad\u0259\u00e7inin \u015f\u0259xsiyy\u0259tini yoxlamaq \u00fc\u00e7\u00fcn x\u00fcsusi olaraq istifad\u0259 edil\u0259n m\u0259lum v\u0259 qeyd\u0259 al\u0131nm\u0131\u015f fiziki atributudur<\/div>\n<div>Token &#8211; Sisteml\u0259r\u0259 daxil olmaq \u00fc\u00e7\u00fcn tokenl\u0259rd\u0259n d\u0259 istifad\u0259 olunur. Bu, hakerl\u0259rin etimadnam\u0259l\u0259r\u0259 malik olduqlar\u0131 halda hesablara daxil olmalar\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir.<\/div>\n<div>Transaction Authentication &#8211; Bird\u0259f\u0259lik pin v\u0259 ya parol, onlar\u0131n \u015f\u0259xsiyy\u0259tini t\u0259sdiql\u0259y\u0259n onlayn \u0259m\u0259liyyatlar\u0131n i\u015fl\u0259nm\u0259si zaman\u0131 istifad\u0259 olunur.<\/div>\n<div>Multi-Factor Authentication &#8211; Bu, bird\u0259n \u00e7ox autentifikasiya metoduna ehtiyac\u0131 olan bir t\u0259hl\u00fck\u0259sizlik sistemidir.<\/div>\n<div>Out-of-Band Authentication &#8211; Bu autentifikasiya iki f\u0259rqli kanaldan v\u0259 ya \u015f\u0259b\u0259k\u0259d\u0259n iki f\u0259rqli siqnal t\u0259l\u0259b edir. Bu, onlayn bank\u00e7\u0131l\u0131qda h\u00fccumlar\u0131n \u0259ks\u0259riyy\u0259tinin hack v\u0259 \u015f\u0259xsiyy\u0259t o\u011furlanmas\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 al\u0131r.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>34. Hashing v\u0259 Salting aras\u0131ndak\u0131 f\u0259rq n\u0259dir?<\/b><\/div>\n<\/div>\n<div><\/div>\n<div><b>Cavab<\/b>:\u00a0 \u00a0 Hashing \u0259sas\u0259n autentifikasiya \u00fc\u00e7\u00fcn istifad\u0259 olunur v\u0259 m\u0259lumatlar\u0131n sabit uzunluqlu d\u0259y\u0259r\u0259 planla\u015fd\u0131r\u0131ld\u0131\u011f\u0131 birt\u0259r\u0259fli funksiyad\u0131r.<\/div>\n<div>Salting hash \u00fc\u00e7\u00fcn \u0259lav\u0259 bir add\u0131md\u0131r, burada \u015fifr\u0259y\u0259 salt \u0259lav\u0259 olunur v\u0259 o \u015f\u0259kild\u0259 hashl\u0259nir<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>35. Stored v\u0259 Reflected XSS aras\u0131ndak\u0131 f\u0259rq n\u0259dir?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>: Stored XSS attacks &#8211; Enjekte edilmi\u015f skriptl\u0259rin h\u0259d\u0259f serverl\u0259rd\u0259 qal\u0131c\u0131 olaraq saxland\u0131\u011f\u0131 h\u00fccumlara deyilir. Bununla birlikd\u0259 qurban saxlan\u0131lan m\u0259lumatlar\u0131 h\u0259r d\u0259f\u0259 t\u0259l\u0259b etdikd\u0259 z\u0259r\u0259rli script yenid\u0259n i\u015f\u0259 d\u00fc\u015f\u00fcr.<\/div>\n<div>Reflected XSS Attacks \u2013 Stored XSS-d\u0259n f\u0259rqli olaraq bu tip XSS serverd\u0259 qal\u0131c\u0131 olaraq qalm\u0131r v\u0259 bir anl\u0131q ba\u015f verir v\u0259 bitir.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>37. \u015e\u0259xsiyy\u0259t o\u011furlu\u011funun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?<\/b><\/div>\n<div><\/div>\n<div>\u00b7\u00a0 \u00a0 \u00a0 \u015e\u0259xsi qeydl\u0259rinizi qoruyun.<\/div>\n<div>\u00b7\u00a0 \u00a0 \u00a0 M\u0259xfi m\u0259lumatlar\u0131n onlayn payla\u015f\u0131lmas\u0131ndan \u00e7\u0259kinin.<\/div>\n<div>\u00b7\u00a0 \u00a0 \u00a0 G\u00fccl\u00fc parollardan istifad\u0259 edin v\u0259 onlar\u0131 m\u00fcnt\u0259z\u0259m olaraq d\u0259yi\u015fdirin.<\/div>\n<div>\u00b7\u00a0 \u00a0 \u00a0 Etibars\u0131z saytlarda bank m\u0259lumatlar\u0131n\u0131z\u0131 t\u0259qdim etm\u0259yin.<\/div>\n<div>\u00b7\u00a0 \u00a0 \u00a0 \u0130l\u0259ri s\u0259viyy\u0259 firewall v\u0259 spyware al\u0259tl\u0259ri vasit\u0259l\u0259ri il\u0259 sisteminizi qoruyun.<\/div>\n<div>\u00b7\u00a0 \u00a0 \u00a0 Brauzerl\u0259rinizi, sisteminizi v\u0259 proqram t\u0259minat\u0131n\u0131z\u0131 \u0259n son versiyada tutun.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>38. LAN daxilind\u0259 port bloklanmas\u0131 n\u0259dir?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>: Bu, istifad\u0259\u00e7il\u0259rin yerli \u015f\u0259b\u0259k\u0259 daxilind\u0259 bir s\u0131ra xidm\u0259tl\u0259r\u0259 daxil olmas\u0131n\u0131 m\u0259hdudla\u015fd\u0131rma\u011fa k\u00f6m\u0259k edir. \u018fsas m\u0259qs\u0259d m\u0259nb\u0259nin portlar vasit\u0259sil\u0259 t\u0259yinat adresin\u0259 \u00e7\u0131x\u0131\u015f t\u0259min etm\u0259sini dayand\u0131rmaqd\u0131r. B\u00fct\u00fcn proqramlar portlarda i\u015fl\u0259diyi \u00fc\u00e7\u00fcn icaz\u0259siz giri\u015fi m\u0259hdudla\u015fd\u0131rmaq \u00fc\u00e7\u00fcn portlar\u0131 bloklamaq laz\u0131md\u0131r ki, bu da \u015f\u0259b\u0259k\u0259 infrastrukturunda t\u0259hl\u00fck\u0259sizlik z\u0259ifliyini poza bil\u0259r.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>41. Veril\u0259nl\u0259r bazas\u0131ndan \u00e7\u0131xar\u0131lan a\u015fa\u011f\u0131dak\u0131 parollar\u0131n siyah\u0131s\u0131na bax\u0131n:<\/b><\/div>\n<div><b>\u00a0\u00a0<\/b><\/div>\n<div>A. Password1<\/div>\n<div>B. @#$)*&amp;^%<\/div>\n<div>C. UcSc4Evr!<\/div>\n<div>D. akHGksmLN<\/div>\n<\/div>\n<div><\/div>\n<\/div>\n<div><b>Cavab<\/b>:<\/div>\n<div>\n<div>A\u015fa\u011f\u0131dak\u0131 parollardan hans\u0131 UCSC-nin parol t\u0259l\u0259bl\u0259rin\u0259 cavab verir? Cavab UcSc4Evr! Bu, a\u015fa\u011f\u0131dak\u0131 UCSC t\u0259l\u0259bl\u0259rinin ham\u0131s\u0131na cavab ver\u0259n yegan\u0259 se\u00e7imdir:<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>42. Kiber h\u00fccum\u00e7ular\u0131n n\u00f6vl\u0259rini sadalay\u0131n<\/b><\/div>\n<div><\/div>\n<div>D\u00f6rd n\u00f6v kiber h\u00fccum\u00e7u var.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>43.SRM dey\u0259rk\u0259n n\u0259yi n\u0259z\u0259rd\u0259 tutursunuz?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>: SRM T\u0259hl\u00fck\u0259sizlik Referans Monitoru m\u0259nas\u0131n\u0131 verir, komp\u00fcter s\u00fcr\u00fcc\u00fcl\u0259rin\u0259 obyekt\u0259 giri\u015f h\u00fcquqlar\u0131n\u0131 verm\u0259k \u00fc\u00e7\u00fcn rutinl\u0259r t\u0259qdim edir.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>56.Komp\u00fcter virusu n\u0259dir?<\/b><\/div>\n<div><b>Cavab<\/b>:<\/div>\n<div>Virus istifad\u0259\u00e7inin raz\u0131l\u0131\u011f\u0131 olmadan h\u0259yata ke\u00e7iril\u0259n z\u0259r\u0259rli proqramd\u0131r. Viruslar CPU vaxt\u0131 v\u0259 yadda\u015f kimi komp\u00fcter resurslar\u0131n\u0131 istehlak ed\u0259 bil\u0259r. B\u0259z\u0259n virus dig\u0259r komp\u00fcter proqramlar\u0131nda d\u0259yi\u015fiklikl\u0259r edir v\u0259 komp\u00fcter sistemin\u0259 z\u0259r\u0259r verm\u0259k \u00fc\u00e7\u00fcn \u00f6z kodunu daxil edir.<\/div>\n<div><\/div>\n<div>Komp\u00fcter virusu a\u015fa\u011f\u0131dak\u0131lar \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r:<\/div>\n<div><\/div>\n<div>\u0130stifad\u0259\u00e7i id v\u0259 parol kimi \u015f\u0259xsi m\u0259lumatlara daxil olun<\/div>\n<div>\u0130stifad\u0259\u00e7iy\u0259 bezdirici mesajlar g\u00f6st\u0259rin<\/div>\n<div>Komp\u00fcterinizd\u0259ki m\u0259lumatlar\u0131n z\u0259d\u0259l\u0259nm\u0259si<\/div>\n<div>\u0130stifad\u0259\u00e7inin d\u00fcym\u0259 vuru\u015flar\u0131n\u0131 qeyd edin<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><b>ARP poisoning n\u0259dir?<\/b><\/div>\n<div><b>\u00a0<\/b><\/div>\n<div><b>Cavab:\u00a0Address Resolution Protocol z\u0259h\u0259rl\u0259nm\u0259si IP \u00fcnvan\u0131n\u0131n \u015f\u0259b\u0259k\u0259 cihaz\u0131nda fiziki \u00fcnvana \u00e7evrildiyi bir h\u00fccum n\u00f6v\u00fcd\u00fcr. Ev sahibi ARP yay\u0131m\u0131 g\u00f6nd\u0259r\u0259c\u0259k v\u0259 b\u00fct\u00fcn q\u0259buledicil\u0259r fiziki \u00fcnvanlar\u0131 il\u0259 cavab ver\u0259c\u0259kl\u0259r. Ba\u015fqa s\u00f6zl\u0259 des\u0259k, ARP z\u0259h\u0259rl\u0259nm\u0259si, \u015f\u0259b\u0259k\u0259y\u0259 qo\u015fulmu\u015f komp\u00fcterin \u0130P \u00fcnvan\u0131 il\u0259 saxta \u00fcnvanlar\u0131 \u0259laq\u0259l\u0259ndirm\u0259k v\u0259 trafiki qa\u00e7\u0131rmaq \u00fc\u00e7\u00fcn ke\u00e7id\u0259 saxta \u00fcnvanlar g\u00f6nd\u0259rilm\u0259sinin ad\u0131d\u0131r.<\/b><\/div>\n<div>Bunlar:<\/div>\n<div><\/div>\n<div>1) kibercinay\u0259tkarlar<\/div>\n<div>2) hacktivistl\u0259r<\/div>\n<div>3) daxili t\u0259hdidl\u0259r(\u0130nsider threats\u0259)<\/div>\n<div>4) d\u00f6vl\u0259t t\u0259r\u0259find\u0259n d\u0259st\u0259kl\u0259n\u0259n h\u00fccum\u00e7ular(State sponsored).<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>45. \u018fl\u00e7atan olan Hacker Al\u0259tl\u0259ri<\/b><\/div>\n<div><\/div>\n<div>A\u015fa\u011f\u0131da faydal\u0131 hack al\u0259tl\u0259rinin siyah\u0131s\u0131 verilmi\u015fdir.<\/div>\n<div><\/div>\n<div>Acunetix<\/div>\n<div>WebInspect<\/div>\n<div>Probably<\/div>\n<div>Netsparker<\/div>\n<div>Angry IP scanner:<\/div>\n<div>Burp Suite<\/div>\n<div>Savvius<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>49.Situasiya #1<\/b><\/div>\n<div><b>Cavab<\/b>:<\/div>\n<div>Bank hesab\u0131n\u0131zla ba\u011fl\u0131 probleml\u0259 \u00fczl\u0259\u015fdiyini bildir\u0259n e-po\u00e7t m\u0259ktubu g\u00f6nd\u0259rir. E-po\u00e7t t\u0259limatlar v\u0259 h\u0259m\u00e7inin hesaba daxil olmaq \u00fc\u00e7\u00fcn ke\u00e7idl\u0259 t\u0259min edilir ki, siz onu d\u00fcz\u0259ld\u0259 bil\u0259siniz. Yuxar\u0131dak\u0131 v\u0259ziyy\u0259td\u0259n n\u0259 n\u0259tic\u0259 \u00e7\u0131xar\u0131rs\u0131n\u0131z? izah edin.<\/div>\n<div>Bu, ist\u0259nm\u0259y\u0259n e-po\u00e7t kimi g\u00f6r\u00fcn\u00fcr. Siz onu spam kimi bildirm\u0259li v\u0259 e-po\u00e7tu d\u0259rhal istifad\u0259 etdiyiniz m\u00fcvafiq veb m\u00fc\u015ft\u0259rid\u0259 (Yahoo Mail, Gmail v\u0259 s.) zibil qutusuna k\u00f6\u00e7\u00fcrm\u0259lisiniz. Bankla ba\u011fl\u0131 h\u0259r hans\u0131 etimadnam\u0259sini onlayn t\u0259qdim etm\u0259zd\u0259n \u0259vv\u0259l, mesaj\u0131n qanuni olub-olmad\u0131\u011f\u0131n\u0131 v\u0259 bankdan oldu\u011funu yoxlamaq \u00fc\u00e7\u00fcn banka z\u0259ng etm\u0259lisiniz.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>50. Simmetrik \u015fifr\u0259l\u0259m\u0259 alqoritmin\u0259 b\u0259zi n\u00fcmun\u0259l\u0259r verin.<\/b><\/div>\n<div><\/div>\n<div>A\u015fa\u011f\u0131da simmetrik \u015fifr\u0259l\u0259m\u0259 alqoritminin b\u0259zi n\u00fcmun\u0259l\u0259ri verilmi\u015fdir.<\/div>\n<div><\/div>\n<div>RCx<\/div>\n<div>Blowfish<\/div>\n<div>Rijndael (AES)<\/div>\n<div>DES<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>51. ECB v\u0259 CBC-nin abreviaturas\u0131 n\u0259dir?<\/b><\/div>\n<div><\/div>\n<div><b>Cavab<\/b>:ECB-nin tam formas\u0131 Elektron Kod Kitab\u0131d\u0131r v\u0259 CBC-nin tam formas\u0131 Cipher Block Chaining-dir.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>52.Casus proqram\u0131 m\u00fc\u0259yy\u0259nl\u0259\u015fdirin.<\/b><\/div>\n<div><b>Cavab:<\/b><\/div>\n<div>Casus proqram t\u0259\u015fkilat v\u0259 ya \u015f\u0259xs haqq\u0131nda m\u0259lumatlar\u0131 o\u011furlamaq m\u0259qs\u0259di da\u015f\u0131yan z\u0259r\u0259rli proqramd\u0131r. Bu z\u0259r\u0259rli proqram t\u0259\u015fkilat\u0131n komp\u00fcter sistemin\u0259 z\u0259r\u0259r ver\u0259 bil\u0259r.<\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><b>53. ARP poisoning n\u0259dir?<\/b><\/div>\n<div><b>\u00a0<\/b><\/div>\n<div><b>Cavab<\/b>:Address Resolution Protocol z\u0259h\u0259rl\u0259nm\u0259si IP \u00fcnvan\u0131n\u0131n \u015f\u0259b\u0259k\u0259 cihaz\u0131nda fiziki \u00fcnvana \u00e7evrildiyi bir h\u00fccum n\u00f6v\u00fcd\u00fcr. Ev sahibi ARP yay\u0131m\u0131 g\u00f6nd\u0259r\u0259c\u0259k v\u0259 b\u00fct\u00fcn q\u0259buledicil\u0259r fiziki \u00fcnvanlar\u0131 il\u0259 cavab ver\u0259c\u0259kl\u0259r. Ba\u015fqa s\u00f6zl\u0259 des\u0259k, ARP z\u0259h\u0259rl\u0259nm\u0259si, \u015f\u0259b\u0259k\u0259y\u0259 qo\u015fulmu\u015f komp\u00fcterin \u0130P \u00fcnvan\u0131 il\u0259 saxta \u00fcnvanlar\u0131 \u0259laq\u0259l\u0259ndirm\u0259k v\u0259 trafiki qa\u00e7\u0131rmaq \u00fc\u00e7\u00fcn ke\u00e7id\u0259 saxta \u00fcnvanlar g\u00f6nd\u0259rilm\u0259sinin ad\u0131d\u0131r.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><b>54. Fiziki olmayan t\u0259hdidl\u0259rin \u00fcmumi n\u00f6vl\u0259rini s\u0131ralay\u0131n:<\/b><\/div>\n<div>Trojans<\/div>\n<div>Adware<\/div>\n<div>Worms<\/div>\n<div>Spyware<\/div>\n<div>DoS Attack<\/div>\n<div>Distributed DoS Attacks<\/div>\n<div>Virus<\/div>\n<div>Key loggers<\/div>\n<div>Phishing<\/div>\n<div>Komp\u00fcter sisteml\u0259rinin resurslar\u0131na icaz\u0259siz giri\u015f<\/div>\n<div><\/div>\n<div><\/div>\n<div><b>55.Nmap n\u0259dir?<\/b><\/div>\n<div><b>Cavab<\/b>: Nmap b\u00fct\u00fcn qo\u015fulmu\u015f cihazlar\u0131 m\u00fc\u0259yy\u0259n etm\u0259k v\u0259 i\u015fl\u0259tdikl\u0259ri \u0259m\u0259liyyat sisteml\u0259ri haqq\u0131nda m\u0259lumat \u00e7atd\u0131rmaq \u00fc\u00e7\u00fcn IP paketl\u0259rind\u0259n istifad\u0259 ed\u0259n \u015f\u0259b\u0259k\u0259 skan al\u0259tidir.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><b>56.Sistem \u0259sasl\u0131 h\u00fccumlar\u0131n b\u0259zi n\u00fcmun\u0259l\u0259ri<\/b><\/div>\n<div>Virus<\/div>\n<div>Backdoors<\/div>\n<div>Bots<\/div>\n<div>Worm<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><b>57.Veb serverin t\u0259hl\u00fck\u0259sizliyini t\u0259min etm\u0259k \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar at\u0131lmal\u0131d\u0131r?<\/b><\/div>\n<div><b>Cavab:<\/b><\/div>\n<div>Update the ownership of the file<\/div>\n<div>Keep your webserver up-to-date<\/div>\n<div>Disable all extra modules<\/div>\n<div>Delete default scripts<\/div>\n<div>\n<h2 style=\"text-align: right;\"><em><strong>M\u00fc\u0259llif:\u00a0<span style=\"color: #ff0000;\"><a style=\"color: #ff0000;\" href=\"https:\/\/www.linkedin.com\/in\/orkhan-jalalove\/\">Orkhan Jalalov<\/a><\/span><\/strong><\/em><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"margin: 20px 0;\"><div class=\"qrcswholewtapper\" style=\"text-align:left;\"><div class=\"qrcprowrapper\"  id=\"qrcwraa2leds\"><div class=\"qrc_canvass\" id=\"qrc_cuttenpages_2\" style=\"display:inline-block\" data-text=\"https:\/\/yusif.az\/main\/?p=6777\"><\/div><div><a download=\"Kibert\u0259hl\u00fck\u0259sizlik sah\u0259sind\u0259 veril\u0259n interv\u00fc suallar\u0131.png\" class=\"qrcdownloads\" id=\"worign\">\r\n           <button type=\"button\" style=\"min-width:110px;background:#44d813;color:#000;font-weight: 600;border: 1px solid #44d813;border-radius:20px;font-size:12px;padding: 6px 0;\" class=\"uqr_code_btn\">QR kodu Y\u00fckl\u0259 \ud83e\udc0b<\/button>\r\n           <\/a><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>A\u015fa\u011f\u0131da b\u0259zi tipik interv\u00fc suallar\u0131 t\u0259qdim edir\u0259m, h\u0259m\u00e7inin suallar\u0131n cavablar\u0131 il\u0259 ba\u011fl\u0131 q\u0131sa izahlar da \u0259lav\u0259 edir\u0259m: &nbsp; 1. Kriptoqrafiya n\u0259dir? Cavab: Kriptoqrafiya m\u0259lumat\u0131n icaz\u0259 verilm\u0259diyi \u00fc\u00e7\u00fcnc\u00fc t\u0259r\u0259fl\u0259rd\u0259n m\u0259lumat\u0131 qorumaq \u00fc\u00e7\u00fcn m\u0259xfi m\u0259lumatlar\u0131 kodla\u015fd\u0131r\u0131lm\u0131\u015f \u015f\u0259kild\u0259 \u00e7evirm\u0259k v\u0259 \u00f6t\u00fcrm\u0259k \u00fcsuludur. 3. IDS v\u0259 IPS aras\u0131ndak\u0131 f\u0259rq n\u0259dir? Cavab: IDS Intrusion Detection System\u2019dir v\u0259 o, yaln\u0131z m\u00fcdaxil\u0259l\u0259ri [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6778,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,3],"tags":[],"class_list":["post-6777","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sbk-texnalogiyasi","category-komputerlr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kibert\u0259hl\u00fck\u0259sizlik sah\u0259sind\u0259 veril\u0259n interv\u00fc suallar\u0131 - www.YUSIF.az IT B\u00d6LM\u018fS\u0130<\/title>\n<meta name=\"description\" content=\"A\u015fa\u011f\u0131da b\u0259zi tipik interv\u00fc suallar\u0131 t\u0259qdim edir\u0259m, h\u0259m\u00e7inin suallar\u0131n cavablar\u0131 il\u0259 ba\u011fl\u0131 q\u0131sa izahlar da \u0259lav\u0259 edir\u0259m:1. Kriptoqrafiya n\u0259dir?Cavab: Kriptoqrafiya m\u0259lumat\u0131n icaz\u0259 verilm\u0259diyi \u00fc\u00e7\u00fcnc\u00fc t\u0259r\u0259fl\u0259rd\u0259n m\u0259lumat\u0131 qorumaq \u00fc\u00e7\u00fcn m\u0259xfi m\u0259lumatlar\u0131 kodla\u015fd\u0131r\u0131lm\u0131\u015f \u015f\u0259kild\u0259 \u00e7evirm\u0259k v\u0259 \u00f6t\u00fcrm\u0259k \u00fcsuludur.3. IDS v\u0259 IPS aras\u0131ndak\u0131 f\u0259rq n\u0259dir?Cavab: IDS Intrusion Detection System\u2019dir v\u0259 o, yaln\u0131z m\u00fcdaxil\u0259l\u0259ri a\u015fkarlay\u0131r v\u0259 administrator is\u0259 m\u00fcdaxil\u0259nin qar\u015f\u0131s\u0131n\u0131 almal\u0131d\u0131r.Halbuki, IPS y\u0259ni Intrusion Prevention System-d\u0259 sistem m\u00fcdaxil\u0259ni a\u015fkarlay\u0131r v\u0259 h\u0259m\u00e7inin m\u00fcdaxil\u0259nin qar\u015f\u0131s\u0131n\u0131 almaq \u00fc\u00e7\u00fcn t\u0259dbirl\u0259r g\u00f6r\u00fcr.4. CIA \u00fc\u00e7buca\u011f\u0131n\u0131 a\u00e7\u0131qlay\u0131nCavab: CIA-\u0131n a\u00e7\u0131l\u0131\u015f\u0131 Confidentiality(Konfidensiall\u0131q), Integrity(taml\u0131q) v\u0259 Availability(\u0259l\u00e7atanl\u0131q)-d\u0131r. CIA \u0130nformasiya T\u0259hl\u00fck\u0259sizliyi siyas\u0259tl\u0259rin\u0259 r\u0259hb\u0259rlik etm\u0259k \u00fc\u00e7\u00fcn haz\u0131rlanm\u0131\u015f modeldir. Bu, t\u0259\u015fkilatlar t\u0259r\u0259find\u0259n istifad\u0259 edil\u0259n \u0259n m\u0259\u015fhur modell\u0259rd\u0259n biridir.Konfidensiall\u0131qM\u0259lumat yaln\u0131z s\u0259lahiyy\u0259tli i\u015f\u00e7il\u0259r \u00fc\u00e7\u00fcn \u0259l\u00e7atan v\u0259 oxuna bil\u0259n olmal\u0131d\u0131r. O, icaz\u0259siz i\u015f\u00e7il\u0259r t\u0259r\u0259find\u0259n \u0259l\u00e7atan olmamal\u0131d\u0131r. Kims\u0259 m\u0259lumatlara daxil olmaq \u00fc\u00e7\u00fcn hakerd\u0259n istifad\u0259 ed\u0259rs\u0259, m\u0259lumat g\u00fccl\u00fc \u015f\u0259kild\u0259 \u015fifr\u0259l\u0259nm\u0259lidir ki, m\u0259lumat \u0259ld\u0259 olunsa bel\u0259, oxunaq v\u0259 ya ba\u015fa d\u00fc\u015f\u00fcl\u0259n olmas\u0131n.Taml\u0131qM\u0259lumatlar\u0131n icaz\u0259si olmayan \u015f\u0259xsl\u0259r t\u0259r\u0259find\u0259n d\u0259yi\u015fdirilm\u0259diyind\u0259n \u0259min olmaq \u00fc\u00e7\u00fcnd\u00fcr. D\u00fcr\u00fcstl\u00fck m\u0259lumatlar\u0131n icaz\u0259si olmayan i\u015f\u00e7il\u0259r t\u0259r\u0259find\u0259n pozulmamas\u0131n\u0131 v\u0259 ya d\u0259yi\u015fdirilm\u0259m\u0259sini t\u0259min edir. S\u0259lahiyy\u0259tli \u015f\u0259xs\/sistem m\u0259lumatlar\u0131 d\u0259yi\u015fdirm\u0259y\u0259 \u00e7al\u0131\u015f\u0131rsa v\u0259 d\u0259yi\u015fiklik u\u011fursuz olarsa, m\u0259lumat geri qaytar\u0131lmal\u0131 v\u0259 z\u0259d\u0259l\u0259nm\u0259m\u0259lidir.\u018fl\u00e7atanl\u0131qM\u0259lumat istifad\u0259\u00e7i t\u0259l\u0259b etdiyi zaman istifad\u0259\u00e7i \u00fc\u00e7\u00fcn \u0259l\u00e7atan olmal\u0131d\u0131r. Avadanl\u0131\u011f\u0131n saxlanmas\u0131, m\u00fcnt\u0259z\u0259m olaraq t\u0259kmill\u0259\u015fdirilm\u0259si, M\u0259lumatlar\u0131n Yed\u0259kl\u0259nm\u0259si v\u0259 B\u0259rpas\u0131, \u015e\u0259b\u0259k\u0259 Darbo\u011fazlar\u0131na diqq\u0259t yetirilm\u0259lidir.5. \u015eifr\u0259l\u0259m\u0259 Hashing-d\u0259n n\u0259 il\u0259 f\u0259rql\u0259nir?\u00a0Cavab: H\u0259m \u015eifr\u0259l\u0259m\u0259, h\u0259m d\u0259 Hashing oxuna bil\u0259n m\u0259lumatlar\u0131 oxunmayan formata \u00e7evirm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunur. F\u0259rq ondad\u0131r ki, \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat \u015fifr\u0259nin a\u00e7\u0131lmas\u0131 prosesi il\u0259 yenid\u0259n orijinal m\u0259lumatlara \u00e7evril\u0259 bil\u0259r, lakin hash edilmi\u015f m\u0259lumatlar orijinal m\u0259lumatlara qaytar\u0131la bilm\u0259z6. Firewall n\u0259dir v\u0259 ondan n\u0259 \u00fc\u00e7\u00fcn istifad\u0259 olunur?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0Cavab:Firewall \u015f\u0259b\u0259k\u0259 trafikini izl\u0259y\u0259n v\u0259 idar\u0259 ed\u0259n sistem\/\u015f\u0259b\u0259k\u0259 s\u0259rh\u0259dl\u0259rind\u0259 qurulmu\u015f \u015f\u0259b\u0259k\u0259 t\u0259hl\u00fck\u0259sizlik sistemidir.Firewalllar \u0259sas\u0259n sistemi\/\u015f\u0259b\u0259k\u0259ni viruslar, qurdlar, z\u0259r\u0259rli proqramlar v\u0259 s.-d\u0259n qorumaq \u00fc\u00e7\u00fcn istifad\u0259 olunur. Firewalllar h\u0259m\u00e7inin uzaqdan giri\u015fin(Remote Access) v\u0259 m\u0259zmunun filtrl\u0259nm\u0259sinin qar\u015f\u0131s\u0131n\u0131 almaq \u00fc\u00e7\u00fcn d\u0259 ola bil\u0259r.7. VA (Z\u0259ifliyin Qiym\u0259tl\u0259ndirilm\u0259si) v\u0259 PT (Penetrasiya Testi) aras\u0131nda f\u0259rq n\u0259dir?Cavab:Vulnerability Assessment qar\u015f\u0131 sistemd\u0259 q\u00fcsurlar\u0131n tap\u0131lmas\u0131 prosesidir. T\u0259\u015fkilatlar sisteml\u0259rinin\/\u015f\u0259b\u0259k\u0259l\u0259rinin q\u00fcsurlar\u0131 v\u0259 ya z\u0259if t\u0259r\u0259fl\u0259ri oldu\u011funu bilir v\u0259 bu q\u00fcsurlar\u0131 tapmaq v\u0259 d\u00fcz\u0259ltm\u0259k \u00fc\u00e7\u00fcn q\u00fcsurlar\u0131 prioritetl\u0259\u015fdirm\u0259k ist\u0259yir.Penetration Testing h\u0259d\u0259fd\u0259 z\u0259iflikl\u0259rin tap\u0131lmas\u0131 prosesidir. T\u0259\u015fkilatlar d\u00fc\u015f\u00fcn\u0259 bil\u0259c\u0259kl\u0259ri b\u00fct\u00fcn t\u0259hl\u00fck\u0259sizlik t\u0259dbirl\u0259rini qurublar.Onlar\u0131n sistemini\/\u015f\u0259b\u0259k\u0259sini s\u0131nd\u0131rmaq \u00fc\u00e7\u00fcn ba\u015fqa yol olub-olmad\u0131\u011f\u0131n\u0131 bilm\u0259k v\u0259 yoxlamaq \u00fc\u00e7\u00fcn bu xidm\u0259td\u0259n istifad\u0259 edirl\u0259r.8.\u00dc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma n\u0259dir?Cavab:\u00a0\u00dc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma, host v\u0259 m\u00fc\u015ft\u0259ri aras\u0131nda \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn TCP\/IP \u015f\u0259b\u0259k\u0259sind\u0259 istifad\u0259 edil\u0259n \u00fcsuldur. Bu, \u00fc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma adlan\u0131r, \u00e7\u00fcnki bu, m\u00fc\u015ft\u0259ri v\u0259 serverin paket m\u00fcbadil\u0259si apard\u0131\u011f\u0131 \u00fc\u00e7 add\u0131ml\u0131 bir \u00fcsuldur. \u00dc\u00e7 add\u0131m a\u015fa\u011f\u0131dak\u0131lard\u0131r:1.\u00a0 \u00a0M\u00fc\u015ft\u0259ri server\u0259 SYN (Sinxronizasiya) paketini g\u00f6nd\u0259rir, serverin i\u015fl\u0259k v\u0259ziyy\u0259td\u0259 olub olmad\u0131\u011f\u0131n\u0131 v\u0259 ya a\u00e7\u0131q portlar\u0131n olub olmad\u0131\u011f\u0131n\u0131 yoxlay\u0131r.2.\u00a0 \u00a0Server a\u00e7\u0131q portlar\u0131 varsa, m\u00fc\u015ft\u0259riy\u0259 SYN-ACK paketini g\u00f6nd\u0259rir3.\u00a0 \u00a0M\u00fc\u015ft\u0259ri bunu q\u0259bul edir v\u0259 server\u0259 ACK (T\u0259qdimat) paketi g\u00f6nd\u0259rir.9. Veb T\u0259tbiqind\u0259n al\u0131na bil\u0259n cavab kodlar\u0131 hans\u0131lard\u0131r?Cavab:\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a01xx \u2013 M\u0259lumat xarakterli cavablar(Informational responses)2xx \u2013 U\u011fur(Success)3xx \u2013 Yenid\u0259n y\u00f6nl\u0259ndirm\u0259(Redirection)4xx \u2013 M\u00fc\u015ft\u0259ri t\u0259r\u0259f x\u0259tas\u0131(Client-side error)5xx \u2013 Server t\u0259r\u0259f x\u0259tas\u0131(Server-side error)10. Traceroute n\u0259dir?Cavab:\u00a0Traceroute paketin yolunu g\u00f6st\u0259r\u0259n bir vasit\u0259dir. O, paketin ke\u00e7diyi b\u00fct\u00fcn n\u00f6qt\u0259l\u0259ri (\u0259sas\u0259n mar\u015frutla\u015fd\u0131r\u0131c\u0131lar) sadalay\u0131r. Bu, \u0259sas\u0259n paket t\u0259yinat yerin\u0259 \u00e7atmad\u0131qda istifad\u0259 olunur. Traceroute, nasazl\u0131q n\u00f6qt\u0259sini m\u00fc\u0259yy\u0259n etm\u0259k \u00fc\u00e7\u00fcn \u0259laq\u0259nin harada dayand\u0131\u011f\u0131n\u0131 v\u0259 ya pozuldu\u011funu yoxlamaq \u00fc\u00e7\u00fcn istifad\u0259 olunur.11. Firewall qurmaq \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar var?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Cavab:1.\u00a0 \u00a0Username\/password: firewall cihaz\u0131 \u00fc\u00e7\u00fcn standart parolu d\u0259yi\u015fdirin2.\u00a0 \u00a0Remote administration: Uzaqdan idar\u0259etm\u0259 funksiyas\u0131n\u0131 s\u00f6nd\u00fcr\u00fcn3.\u00a0 \u00a0Port forwarding: Veb server v\u0259 ya FTP server kimi m\u00fc\u0259yy\u0259n proqramlar\u0131n d\u00fczg\u00fcn i\u015fl\u0259m\u0259si \u00fc\u00e7\u00fcn m\u00fcvafiq port y\u00f6nl\u0259ndirm\u0259sini konfiqurasiya edin4.\u00a0 \u00a0DHCP Server: Firewallun m\u00f6vcud DHCP serveri il\u0259 \u015f\u0259b\u0259k\u0259y\u0259 qura\u015fd\u0131r\u0131lmas\u0131, firewallun DHCP-si deaktiv edilm\u0259yinc\u0259 m\u00fcnaqi\u015f\u0259y\u0259 s\u0259b\u0259b olacaq.5.\u00a0 \u00a0Logging: Firewall probleml\u0259rini v\u0259 ya potensial h\u00fccumlar\u0131 aradan qald\u0131rmaq \u00fc\u00e7\u00fcn giri\u015fin aktiv oldu\u011fundan \u0259min olun v\u0259 log-lara nec\u0259 baxmaq laz\u0131m oldu\u011funu anlay\u0131n.6.\u00a0 \u00a0Policies: M\u00f6hk\u0259m t\u0259hl\u00fck\u0259sizlik siyas\u0259tl\u0259riniz olmal\u0131 v\u0259 Firewall-un h\u0259min siyas\u0259tl\u0259ri t\u0259tbiq etm\u0259k \u00fc\u00e7\u00fcn konfiqurasiya edildiyin\u0259 \u0259min olmal\u0131s\u0131n\u0131z.12. SSL \u015eifr\u0259l\u0259m\u0259sini izah edinCavab:\u00a0 \u00a0\u00a0SSL (Secure Sockets Layer) Veb Server v\u0259 Brauzer aras\u0131nda \u015fifr\u0259l\u0259nmi\u015f \u0259laq\u0259l\u0259r yaradan s\u0259naye standartl\u0131 t\u0259hl\u00fck\u0259sizlik texnologiyas\u0131d\u0131r. Bu, m\u0259lumatlar\u0131n m\u0259xfiliyini qorumaq v\u0259 onlayn \u0259m\u0259liyyatlarda m\u0259lumat\u0131 qorumaq \u00fc\u00e7\u00fcn istifad\u0259 olunur.SSL ba\u011flant\u0131s\u0131 qurmaq \u00fc\u00e7\u00fcn add\u0131mlar a\u015fa\u011f\u0131dak\u0131 kimidir:1.\u00a0 \u00a0Brauzer SSL il\u0259 qorunan veb server\u0259 qo\u015fulma\u011fa \u00e7al\u0131\u015f\u0131r2.\u00a0 \u00a0Brauzer SSL sertifikat\u0131n\u0131n sur\u0259tini brauzer\u0259 g\u00f6nd\u0259rir3.\u00a0 \u00a0Brauzer SSL sertifikat\u0131n\u0131n etibarl\u0131 olub olmad\u0131\u011f\u0131n\u0131 yoxlay\u0131r. Etibarl\u0131d\u0131rsa, o zaman brauzer veb server\u0259 \u015fifr\u0259li \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn mesaj g\u00f6nd\u0259rir4.\u00a0 \u00a0Veb server SSL \u015fifr\u0259li ba\u011flant\u0131ya ba\u015flamaq \u00fc\u00e7\u00fcn t\u0259sdiq g\u00f6nd\u0259rir5. SSL \u015fifr\u0259li \u0259lqa\u0259 brauzer v\u0259 veb server aras\u0131nda ba\u015f verir13. Serverin t\u0259hl\u00fck\u0259sizliyini t\u0259min etm\u0259k \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar\u0131 atacaqs\u0131n\u0131z?Cavab:\u00a0 \u00a0 \u00a0T\u0259hl\u00fck\u0259siz serverl\u0259r m\u0259lumatlar\u0131 icaz\u0259siz \u0259l\u0259 ke\u00e7irm\u0259kd\u0259n qorumaq \u00fc\u00e7\u00fcn m\u0259lumatlar\u0131n \u015fifr\u0259l\u0259nm\u0259si v\u0259 \u015fifr\u0259sinin a\u00e7\u0131lmas\u0131 \u00fc\u00e7\u00fcn Secure Sockets Layer (SSL) protokolundan istifad\u0259 edir.Serveri qorumaq \u00fc\u00e7\u00fcn d\u00f6rd sad\u0259 yol var:Add\u0131m 1: Root v\u0259 administrator istifad\u0259\u00e7il\u0259riniz \u00fc\u00e7\u00fcn t\u0259hl\u00fck\u0259siz parolunuz oldu\u011fundan \u0259min olunAdd\u0131m 2: Sizin etm\u0259li oldu\u011funuz n\u00f6vb\u0259ti \u015fey sisteminizd\u0259 yeni istifad\u0259\u00e7il\u0259r yaratmaqd\u0131r. Bunlar sistemi idar\u0259 etm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 etdiyiniz istifad\u0259\u00e7il\u0259r olacaqAdd\u0131m 3: default root\/administrator hesablar\u0131ndan uzaqdan giri\u015fi silinAdd\u0131m 4: N\u00f6vb\u0259ti add\u0131m uzaqdan giri\u015f \u00fc\u00e7\u00fcn Firewall qaydalar\u0131n\u0131z\u0131 konfiqurasiya etm\u0259kdir14. M\u0259lumat s\u0131zmas\u0131n\u0131(Data Leakage) izah edinCvaab: M\u0259lumat s\u0131zmas\u0131 m\u0259lumatlar\u0131n t\u0259\u015fkilat daxilind\u0259n icaz\u0259siz k\u0259nar t\u0259yinat yerin\u0259 q\u0259sd\u0259n v\u0259 ya ist\u0259m\u0259d\u0259n \u00f6t\u00fcr\u00fclm\u0259sidir. Bu, m\u0259xfi m\u0259lumat\u0131n icaz\u0259siz quruma a\u00e7\u0131qlanmas\u0131d\u0131r.M\u0259lumat s\u0131zmas\u0131 nec\u0259 ba\u015f verdiyin\u0259 g\u00f6r\u0259 3 kateqoriyaya b\u00f6l\u00fcn\u0259 bil\u0259r:1. T\u0259sad\u00fcfi pozulma: M\u00fc\u0259ssis\u0259 s\u0259hv v\u0259 ya kobud n\u00f6qteyi-n\u0259z\u0259rd\u0259n icaz\u0259siz \u015f\u0259xs\u0259 m\u0259lumat g\u00f6nd\u0259rir2. Q\u0259sd\u0259n pozma: S\u0259lahiyy\u0259tli qurum m\u0259qs\u0259dli \u015f\u0259kild\u0259 icaz\u0259siz quruma m\u0259lumatlar\u0131 g\u00f6nd\u0259rir3. Sistem Hack: Hacking \u00fcsullar\u0131 m\u0259lumat s\u0131zmas\u0131na s\u0259b\u0259b olmaq \u00fc\u00e7\u00fcn istifad\u0259 olunurDLP (Data Leakage Prevention) Al\u0259tl\u0259ri kimi tan\u0131nan al\u0259tl\u0259r, proqram t\u0259minat\u0131 v\u0259 strategiyalardan istifad\u0259 etm\u0259kl\u0259 m\u0259lumat s\u0131zmas\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 almaq olar.15. \u00dcmumi kiberh\u00fccumlardan b\u0259zil\u0259ri hans\u0131lard\u0131r?Cavab: A\u015fa\u011f\u0131da sisteminiz\u0259 m\u0259nfi t\u0259sir g\u00f6st\u0259r\u0259 bil\u0259c\u0259k b\u0259zi \u00fcmumi kiberh\u00fccumlar verilmi\u015fdir.MalwarePhishingPassword AttacksDDoSMan in the MiddleDrive-By DownloadsMalvertisingRogue Software16. Port Scanning n\u0259dir?\u00a0 \u00a0Cavab: Port Skanlama, hostda m\u00f6vcud olan a\u00e7\u0131q portlar\u0131 v\u0259 xidm\u0259ti m\u00fc\u0259yy\u0259n etm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259n texnikad\u0131r. Hakerl\u0259r z\u0259iflikl\u0259rd\u0259n istifad\u0259 etm\u0259k \u00fc\u00e7\u00fcn faydal\u0131 ola bil\u0259c\u0259k m\u0259lumatlar\u0131 tapmaq \u00fc\u00e7\u00fcn port skan\u0131ndan istifad\u0259 edirl\u0259r.\u0130dar\u0259\u00e7il\u0259r \u015f\u0259b\u0259k\u0259nin t\u0259hl\u00fck\u0259sizlik siyas\u0259tl\u0259rini yoxlamaq \u00fc\u00e7\u00fcn Port Skanlamas\u0131ndan istifad\u0259 edirl\u0259r.\u00dcmumi Port Skanlama Texnikalar\u0131ndan b\u0259zil\u0259ri bunlard\u0131r:Ping ScanTCP Half-OpenTCP ConnectUDPStealth Scanning17. Brute Force Attack n\u0259dir? Bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 ala bil\u0259rsiniz?\u00a0 \u00a0Cavab: Brute Force, m\u00fcmk\u00fcn etimadnam\u0259l\u0259rin b\u00fct\u00fcn d\u0259yi\u015fm\u0259l\u0259rini v\u0259 kombinasiyalar\u0131n\u0131 t\u0259krar-t\u0259krar s\u0131namaqla d\u00fczg\u00fcn etimadnam\u0259l\u0259ri tapmaq \u00fcsuludur.\u018fks\u0259r hallarda Brute Force h\u00fccumlar\u0131 avtomatla\u015fd\u0131r\u0131l\u0131r, burada al\u0259t\/proqram avtomatik olaraq etimadnam\u0259l\u0259r siyah\u0131s\u0131 il\u0259 daxil olma\u011fa \u00e7al\u0131\u015f\u0131r. Brute Force h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 alma\u011f\u0131n m\u00fcxt\u0259lif yollar\u0131 var.Onlardan b\u0259zil\u0259ri bunlard\u0131r:Parolun uzunlu\u011fu: Siz parol \u00fc\u00e7\u00fcn minimum uzunluq t\u0259yin ed\u0259 bil\u0259rsiniz. \u015eifr\u0259 n\u0259 q\u0259d\u0259r uzun olsa, onu tapmaq bir o q\u0259d\u0259r \u00e7\u0259tindir.\u015eifr\u0259 M\u00fcr\u0259kk\u0259bliyi: Parolda simvollar\u0131n m\u00fcxt\u0259lif formatlar\u0131n\u0131n daxil edilm\u0259si kobud g\u00fcc h\u00fccumlar\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir. X\u00fcsusi simvollar v\u0259 b\u00f6y\u00fck v\u0259 ki\u00e7ik h\u0259rfl\u0259rl\u0259 birlikd\u0259 alfa-r\u0259q\u0259m parollar\u0131ndan istifad\u0259 parol m\u00fcr\u0259kk\u0259bliyini art\u0131r\u0131r v\u0259 s\u0131nd\u0131r\u0131lmas\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir.Giri\u015f c\u0259hdl\u0259rinin m\u0259hdudla\u015fd\u0131r\u0131lmas\u0131: Giri\u015f u\u011fursuzluqlar\u0131na limit t\u0259yin edin. M\u0259s\u0259l\u0259n, giri\u015f x\u0259talar\u0131 \u00fc\u00e7\u00fcn limiti 3 kimi t\u0259yin ed\u0259 bil\u0259rsiniz. Bel\u0259likl\u0259, ard\u0131c\u0131l 3 giri\u015f u\u011fursuzlu\u011fu olduqda, istifad\u0259\u00e7inin bir m\u00fcdd\u0259t daxil olmas\u0131n\u0131 m\u0259hdudla\u015fd\u0131r\u0131n v\u0259 ya n\u00f6vb\u0259ti d\u0259f\u0259 daxil olmas\u0131, istifad\u0259 etm\u0259si \u00fc\u00e7\u00fcn E-po\u00e7t v\u0259 ya OTP g\u00f6nd\u0259rin. Brute Force avtomatla\u015fd\u0131r\u0131lm\u0131\u015f proses oldu\u011fundan, giri\u015f c\u0259hdl\u0259rini m\u0259hdudla\u015fd\u0131rmaq Brute Force prosesini pozacaq.18. OSI modelinin m\u00fcxt\u0259lif t\u0259b\u0259q\u0259l\u0259ri hans\u0131lard\u0131r?\u00a0 \u00a0 \u00a0Cavab: OSI modeli, proqramlar\u0131n \u015f\u0259b\u0259k\u0259 \u00fcz\u0259rind\u0259n nec\u0259 \u0259laq\u0259 saxlayaca\u011f\u0131na dair \u0259laq\u0259li istinad modelidir. OSI referans\u0131n\u0131n m\u0259qs\u0259di r\u0259q\u0259msal kommunikasiya m\u0259hsullar\u0131 v\u0259 software proqramlar\u0131n\u0131n qar\u015f\u0131l\u0131ql\u0131 f\u0259aliyy\u0259t g\u00f6st\u0259r\u0259 bilm\u0259si \u00fc\u00e7\u00fcn sat\u0131c\u0131lara v\u0259 t\u0259rtibat\u00e7\u0131lara r\u0259hb\u0259rlik etm\u0259kdir.Fiziki s\u0259viyy\u0259(Physical): R\u0259q\u0259msal m\u0259lumatlar\u0131n rabit\u0259 vasit\u0259si il\u0259 g\u00f6nd\u0259ricid\u0259n al\u0131c\u0131ya \u00f6t\u00fcr\u00fclm\u0259sin\u0259 cavabdehdirData Link Layer: Veril\u0259nl\u0259rin fiziki ke\u00e7id\u0259 v\u0259 oradan h\u0259r\u0259k\u0259tini idar\u0259 edir. O, h\u0259m\u00e7inin m\u0259lumat bitl\u0259rinin kodla\u015fd\u0131r\u0131lmas\u0131 v\u0259 dekodlanmas\u0131na cavabdehdir.\u015e\u0259b\u0259k\u0259 s\u0259viyy\u0259si: Paketin y\u00f6nl\u0259ndirilm\u0259si v\u0259 \u015f\u0259b\u0259k\u0259 rabit\u0259si \u00fc\u00e7\u00fcn mar\u015frutla\u015fd\u0131rma yollar\u0131n\u0131n t\u0259min edilm\u0259sin\u0259 cavabdehdir.N\u0259qliyyat Layeri: \u015e\u0259b\u0259k\u0259 \u00fcz\u0259rind\u0259n end-to-end rabit\u0259y\u0259 cavabdehdir. O, m\u0259lumat\u0131 yuxar\u0131dak\u0131 t\u0259b\u0259q\u0259d\u0259n ay\u0131r\u0131r v\u0259 \u015e\u0259b\u0259k\u0259 Layerin\u0259 \u00f6t\u00fcr\u00fcr v\u0259 sonra b\u00fct\u00fcn m\u0259lumatlar\u0131n q\u0259buledicinin sonuna u\u011furla \u00e7atmas\u0131n\u0131 t\u0259min edir.Session Layer: G\u00f6nd\u0259r\u0259n v\u0259 q\u0259bul ed\u0259n aras\u0131nda \u0259laq\u0259ni idar\u0259 edir. O, sessiyan\u0131n ba\u015flamas\u0131, ba\u015fa \u00e7atmas\u0131 v\u0259 idar\u0259 edilm\u0259sin\u0259, g\u00f6nd\u0259rici il\u0259 q\u0259buledici aras\u0131nda qar\u015f\u0131l\u0131ql\u0131 \u0259laq\u0259nin qurulmas\u0131na, saxlanmas\u0131na v\u0259 sinxronla\u015fd\u0131r\u0131lmas\u0131na cavabdehdir.T\u0259qdimat Layeri: Bu, xam dataqramlar v\u0259 ya paketl\u0259r g\u00f6nd\u0259rm\u0259k \u0259v\u0259zin\u0259 veril\u0259nl\u0259rin d\u00fczg\u00fcn formatda v\u0259 m\u0259lumat strukturunda t\u0259qdim edilm\u0259si il\u0259 m\u0259\u015f\u011ful olur.T\u0259tbiq Layeri: T\u0259tbiq v\u0259 \u015f\u0259b\u0259k\u0259 aras\u0131nda interfeys t\u0259min edir. O, prosesd\u0259n proses\u0259 rabit\u0259y\u0259 diqq\u0259t yetirir v\u0259 \u00fcnsiyy\u0259t interfeysini t\u0259min edir.\u00a0 \u00a0\u00a019. VPN n\u0259dir?Cavab: Dem\u0259k olar ki, b\u00fct\u00fcn Kibert\u0259hl\u00fck\u0259sizlik M\u00fcsahib\u0259 Suallar\u0131na bu sual daxil edilir. VPN Virtual \u015e\u0259xsi \u015e\u0259b\u0259k\u0259 dem\u0259kdir. T\u0259hl\u00fck\u0259siz v\u0259 \u015fifr\u0259li \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn istifad\u0259 olunur. Bir VPN istifad\u0259 ed\u0259rk\u0259n, m\u00fc\u015ft\u0259rid\u0259n g\u0259l\u0259n m\u0259lumatlar VPN-d\u0259 \u015fifr\u0259l\u0259ndiyi bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir v\u0259 sonra internet vasit\u0259sil\u0259 ba\u015fqa bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir.Bu zaman veril\u0259nl\u0259rin \u015fifr\u0259si a\u00e7\u0131l\u0131r v\u0259 server\u0259 g\u00f6nd\u0259rilir. Server cavab g\u00f6nd\u0259rdikd\u0259, cavab VPN-in \u015fifr\u0259l\u0259ndiyi bir n\u00f6qt\u0259y\u0259 v\u0259 bu \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat VPN-in \u015fifr\u0259sinin a\u00e7\u0131ld\u0131\u011f\u0131 ba\u015fqa bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir. V\u0259 n\u0259hay\u0259t, \u015fifr\u0259si a\u00e7\u0131lm\u0131\u015f m\u0259lumatlar m\u00fc\u015ft\u0259riy\u0259 g\u00f6nd\u0259rilir. VPN-d\u0259n istifad\u0259 etm\u0259yin b\u00fct\u00fcn m\u0259qs\u0259di \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat \u00f6t\u00fcr\u00fclm\u0259sini t\u0259min etm\u0259kdir.20. \u015e\u0259b\u0259k\u0259d\u0259 Risk, Z\u0259iflik v\u0259 T\u0259hdid dedikd\u0259 n\u0259 ba\u015fa d\u00fc\u015f\u00fcrs\u00fcn\u00fcz?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Cvaab: T\u0259hdid: Sistem\u0259 v\u0259 ya t\u0259\u015fkilata z\u0259r\u0259r vurma potensial\u0131 olan kims\u0259Z\u0259iflik: Potensial haker t\u0259r\u0259find\u0259n istifad\u0259 edil\u0259 bil\u0259n sistemd\u0259ki z\u0259iflikRisk: T\u0259hl\u00fck\u0259li z\u0259iflikd\u0259n istifad\u0259 etdikd\u0259 itki v\u0259 ya z\u0259d\u0259l\u0259nm\u0259 potensial\u013121. Black Hat, White Hat v\u0259 Gray Hat hakerl\u0259ri n\u0259dir?\u00a0 \u00a0Cavab:Blach Hat hakerl\u0259r komp\u00fcter \u015f\u0259b\u0259k\u0259l\u0259rin\u0259 m\u00fcdaxil\u0259 haqq\u0131nda geni\u015f biliy\u0259 malik olmaqlar\u0131 il\u0259 tan\u0131n\u0131rlar. Onlar bu sisteml\u0259r\u0259 daxil olmaq \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259n z\u0259r\u0259rli proqramlar yaza bilirl\u0259r. Bu tip hakerl\u0259r m\u0259lumat o\u011furlamaq v\u0259 ya s\u0131nd\u0131r\u0131lm\u0131\u015f sistemd\u0259n z\u0259r\u0259rli m\u0259qs\u0259dl\u0259r \u00fc\u00e7\u00fcn \u00f6z bacar\u0131qlar\u0131ndan sui-istifad\u0259 edirl\u0259r.White Hat hakerl\u0259r \u00f6z s\u0259lahiyy\u0259tl\u0259rini yax\u015f\u0131 i\u015fl\u0259r \u00fc\u00e7\u00fcn istifad\u0259 edirl\u0259r v\u0259 buna g\u00f6r\u0259 d\u0259 onlara Etik Hakerl\u0259r deyilir. Onlar Black Hat hackerler il\u0259 eyni biliy\u0259 malik olurlar. Bunlar \u0259sas\u0259n \u015firk\u0259tl\u0259r t\u0259r\u0259find\u0259n sisteml\u0259rd\u0259 z\u0259iflikl\u0259ri v\u0259 t\u0259hl\u00fck\u0259sizlik bo\u015fluqlar\u0131n\u0131 tapma\u011fa v\u0259 d\u00fcz\u0259ltm\u0259y\u0259 \u00e7al\u0131\u015fan bir t\u0259hl\u00fck\u0259sizlik m\u00fct\u0259x\u0259ssisi kimi i\u015f\u0259 g\u00f6t\u00fcr\u00fcl\u00fcrl\u0259r. Onlar t\u0259hl\u00fck\u0259sizliyi yax\u015f\u0131la\u015fd\u0131rmaq \u00fc\u00e7\u00fcn \u00f6z bacar\u0131qlar\u0131ndan istifad\u0259 edirl\u0259r.Gray Hat hakerl\u0259r White v\u0259 Black Hat hakerinin birl\u0259\u015fm\u0259sidir. Sahibinin icaz\u0259si olmadan sistem z\u0259iflikl\u0259rini axtar\u0131rlar. H\u0259r hans\u0131 bir z\u0259iflik a\u015fkar ed\u0259rl\u0259rs\u0259, bu bar\u0259d\u0259 sahibin\u0259 m\u0259lumat verirl\u0259r. Black Hat hakerl\u0259rd\u0259n f\u0259rqli olaraq, onlar a\u015fkar edilmi\u015f z\u0259iflikl\u0259rd\u0259n istifad\u0259 etmirl\u0259r.22.XSS h\u00fccumunu izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?Cavab:XSS (Saytlararas\u0131 Skriptl\u0259m\u0259) hakerl\u0259r\u0259 veb s\u0259hif\u0259l\u0259r\u0259 z\u0259r\u0259rli client-side skriptl\u0259ri yeritm\u0259y\u0259 imkan ver\u0259n kiberh\u00fccumdur. XSS sessiyalar\u0131 v\u0259 kukil\u0259ri o\u011furlamaq, DOM-u d\u0259yi\u015fdirm\u0259k, remote code execution, serveri s\u0131nd\u0131rmaq v\u0259 s. \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r.XSS-in n\u00f6vl\u0259ri-\u00a0 \u00a0 \u00a0 \u00a0Reflected XSS-\u00a0 \u00a0 \u00a0 \u00a0Stored XSS-\u00a0 \u00a0 \u00a0 \u00a0DOM Based XSSA\u015fa\u011f\u0131dak\u0131 t\u0259cr\u00fcb\u0259l\u0259rd\u0259n istifad\u0259 etm\u0259kl\u0259 XSS h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:\u0130stifad\u0259\u00e7i daxiletm\u0259l\u0259rini t\u0259sdiql\u0259yin (Validate user inputs)\u00b7\u00a0 \u00a0 \u00a0 \u00a0\u0130stifad\u0259\u00e7i giri\u015fl\u0259rini t\u0259mizl\u0259yin (Sanitize user inputs)X\u00fcsusi simvollar\u0131 kodlay\u0131n(Encode special characters)Anti-XSS xidm\u0259tl\u0259rind\u0259n\/al\u0259tl\u0259rind\u0259n istifad\u0259 edin (Use Anti-XSS services\/tools)XSS HTML Filtrind\u0259n istifad\u0259 edin(Use XSS HTML Filter)24. Botnet n\u0259dir?Cavab: Botnet, h\u0259r bir cihaz\u0131n \u00fcz\u0259rind\u0259 bir v\u0259 ya daha \u00e7ox botun i\u015fl\u0259diyi internet\u0259 qo\u015fulmu\u015f bir s\u0131ra cihazlard\u0131r.Qur\u011fulardak\u0131 botlar v\u0259 z\u0259r\u0259rli skriptl\u0259r qurban\u0131 s\u0131nd\u0131rmaq \u00fc\u00e7\u00fcn istifad\u0259 olunurdu. Botnetl\u0259r m\u0259lumatlar\u0131 o\u011furlamaq, spam g\u00f6nd\u0259rm\u0259k v\u0259 DDOS h\u00fccumunu h\u0259yata ke\u00e7irm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r.25. SSL v\u0259 TLS-I a\u00e7\u0131qlay\u0131n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0Cavab: SSL g\u00f6nd\u0259r\u0259nin \u015f\u0259xsiyy\u0259tini yoxlamaq \u00fc\u00e7\u00fcn n\u0259z\u0259rd\u0259 tutulub, lakin o, bundan ba\u015fqa he\u00e7 n\u0259 axtarm\u0131r. SSL dan\u0131\u015fd\u0131\u011f\u0131n\u0131z insan\u0131 izl\u0259m\u0259y\u0259 k\u00f6m\u0259k ed\u0259 bil\u0259r, lakin bu da b\u0259z\u0259n aldad\u0131la bil\u0259r.TLS h\u0259m\u00e7inin SSL kimi eynil\u0259\u015fdirm\u0259 vasit\u0259sidir, lakin daha yax\u015f\u0131 t\u0259hl\u00fck\u0259sizlik x\u00fcsusiyy\u0259tl\u0259ri t\u0259klif edir. M\u0259lumatlara \u0259lav\u0259 qorunma t\u0259min edir v\u0259 buna g\u00f6r\u0259 d\u0259 SSL v\u0259 TLS daha yax\u015f\u0131 qorunmaq \u00fc\u00e7\u00fcn tez-tez birlikd\u0259 istifad\u0259 olunur.26. 2FA n\u0259dir v\u0259 ictimai vebsaytlar \u00fc\u00e7\u00fcn nec\u0259 t\u0259tbiq oluna bil\u0259r?\u00a0 \u00a0Cavab: &quot;\u00c7ox faktorlu autentifikasiya&quot; kimi tan\u0131nan \u0259lav\u0259 t\u0259hl\u00fck\u0259sizlik s\u0259viyy\u0259sidir.Yaln\u0131z parol v\u0259 istifad\u0259\u00e7i ad\u0131 deyil, h\u0259m d\u0259 yaln\u0131z v\u0259 yaln\u0131z h\u0259min istifad\u0259\u00e7inin onlarda olan bir \u015feyi, y\u0259ni ancaq onlar\u0131n bilm\u0259li olduqlar\u0131 v\u0259 ya d\u0259rhal \u0259ld\u0259 etm\u0259li oldu\u011fu bir m\u0259lumat\u0131, m\u0259s\u0259l\u0259n, fiziki token t\u0259l\u0259b edir.Authenticator proqramlar\u0131 m\u0259tn, s\u0259sli z\u0259ng v\u0259 ya e-po\u00e7t vasit\u0259sil\u0259 do\u011frulama kodu \u0259ld\u0259 etm\u0259k ehtiyac\u0131n\u0131 \u0259v\u0259z edir.Bu Proqramlara n\u00fcmun\u0259 kimi Google Authenticator v\u0259 Autify kimi proqramlar\u0131 g\u00f6st\u0259rm\u0259k olar.27. Fi\u015finqi izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?Cavab:Fi\u015finq kiberh\u00fccumdur ki, burada haker etibarl\u0131 \u015f\u0259xs v\u0259 ya biznes kimi maskalan\u0131r v\u0259 saxta e-po\u00e7t v\u0259 ya ani mesaj vasit\u0259sil\u0259 h\u0259ssas maliyy\u0259 v\u0259 ya \u015f\u0259xsi m\u0259lumatlar\u0131 o\u011furlama\u011fa \u00e7al\u0131\u015f\u0131rA\u015fa\u011f\u0131dak\u0131 \u00fcsullardan istifad\u0259 etm\u0259kl\u0259 fi\u015finq h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:\u00b7\u00a0 \u00a0 \u00a0 \u00a0Etibar etm\u0259diyiniz veb s\u0259hif\u0259l\u0259r\u0259 h\u0259ssas m\u0259lumatlar\u0131 daxil etm\u0259yin\u00b7\u00a0 \u00a0 \u00a0 \u00a0Sayt\u0131n t\u0259hl\u00fck\u0259sizliyini yoxlay\u0131n\u00b7\u00a0 \u00a0 \u00a0 \u00a0Firewall-lardan istifad\u0259 edin\u00b7\u00a0 \u00a0 \u00a0 \u00a0\u0130nternet T\u0259hl\u00fck\u0259sizliyi olan AntiVirus Proqram\u0131ndan istifad\u0259 edin\u00b7\u00a0 \u00a0 \u00a0 \u00a0Anti-Fi\u015finq Al\u0259tl\u0259r Panelind\u0259n istifad\u0259 edin28. SQL Enjeksiyonunu izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?Cavab: SQL Injection (SQLi) t\u0259cav\u00fczkar\u0131n veb t\u0259tbiqinin veril\u0259nl\u0259r bazas\u0131 serverin\u0259 n\u0259zar\u0259t etm\u0259k \u00fc\u00e7\u00fcn z\u0259r\u0259rli SQL sor\u011fular\u0131n\u0131 yerin\u0259 yetirm\u0259k \u00fc\u00e7\u00fcn server\u0259 g\u00f6nd\u0259ril\u0259n m\u0259lumatlar\u0131 manipulyasiya etdiyi, bununla da icaz\u0259siz m\u0259lumatlara daxil olmaq, d\u0259yi\u015fdirm\u0259k v\u0259 silm\u0259k \u00fc\u00e7\u00fcn kod yeritm\u0259 h\u00fccumudur. Bu h\u00fccum \u0259sas\u0259n veril\u0259nl\u0259r bazas\u0131 serverl\u0259rini \u0259l\u0259 ke\u00e7irm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunur.A\u015fa\u011f\u0131dak\u0131 t\u0259cr\u00fcb\u0259l\u0259rd\u0259n istifad\u0259 etm\u0259kl\u0259 SQL Injection h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:\u00b7\u00a0 \u00a0 \u00a0 \u00a0Haz\u0131rlanm\u0131\u015f ifad\u0259l\u0259ri daxil edin (parametrl\u0259\u015fdirilmi\u015f sor\u011fularla)\u00b7\u00a0 \u00a0 \u00a0 \u00a0Saxlan\u0131lan Prosedurlardan istifad\u0259 edin\u0130stifad\u0259\u00e7i daxiletm\u0259sini t\u0259sdiq edin(Validate user input)\u00b7\u00a0 \u00a0 \u00a0 \u00a0Error mesaj\u0131ndan m\u0259lumatlar\u0131 gizl\u0259din\u00b7\u00a0 \u00a0 \u00a0 \u00a0Sisteminizi yenil\u0259yinVeril\u0259nl\u0259r bazas\u0131 etimadnam\u0259sini ayr\u0131 v\u0259 \u015fifr\u0259l\u0259nmi\u015f \u015f\u0259kild\u0259 saxlay\u0131nShell v\u0259 ehtiyac\u0131n\u0131z olmayan h\u0259r hans\u0131 dig\u0259r funksiyalar\u0131 s\u00f6nd\u00fcr\u00fcn29. T\u0259hl\u00fck\u0259sizlik s\u0259hv konfiqurasiyas\u0131(security misconfiguration) n\u0259dir?Cavab:Security Misconfiguration t\u0259hl\u00fck\u0259siz olmayan konfiqurasiya se\u00e7imi s\u0259b\u0259bind\u0259n proqram\/\u015f\u0259b\u0259k\u0259\/cihaz h\u00fccuma m\u0259ruz qald\u0131qda ba\u015f ver\u0259 bil\u0259c\u0259k z\u0259iflikdir. Bu, standart istifad\u0259\u00e7i ad\u0131\/parolun d\u0259yi\u015fm\u0259z saxlan\u0131lmas\u0131 q\u0259d\u0259r sad\u0259 ola bil\u0259r.30. Remote Desktop Protocol (RDP) n\u0259dir?Cavab:-\u00a0 \u00a0 \u00a0 \u00a0RDP (Remote Desktop Protocol) x\u00fcsusi olaraq m\u00fc\u015ft\u0259ri cihazlar\u0131, istifad\u0259\u00e7il\u0259r v\u0259 virtual \u015f\u0259b\u0259k\u0259 serveri aras\u0131nda proqram m\u0259lumatlar\u0131n\u0131n \u00f6t\u00fcr\u00fclm\u0259si t\u0259hl\u00fck\u0259sizliyi v\u0259 \u015fifr\u0259l\u0259m\u0259si \u00fc\u00e7\u00fcn n\u0259z\u0259rd\u0259 tutulmu\u015f Microsoft protokoludur.-\u00a0 \u00a0 \u00a0 \u00a0Bu, administratorlara f\u0259rdi abun\u0259\u00e7il\u0259rin qar\u015f\u0131la\u015fd\u0131\u011f\u0131 probleml\u0259ri uzaqdan qiym\u0259tl\u0259ndirm\u0259y\u0259 v\u0259 h\u0259ll etm\u0259y\u0259 imkan verir.-\u00a0 \u00a0 \u00a0 \u00a0O, \u00e7oxn\u00f6qt\u0259li \u00f6t\u00fcrm\u0259 t\u0259min etm\u0259kl\u0259 64.000-\u0259 q\u0259d\u0259r ayr\u0131 m\u0259lumat kanal\u0131n\u0131 d\u0259st\u0259kl\u0259yir.31. Address Resolution Protocol (ARP) n\u0259 \u00fc\u00e7\u00fcn istifad\u0259 olunur?Cavab: ARP x\u00fcsusi olaraq IP \u015f\u0259b\u0259k\u0259 \u00fcnvanlar\u0131n\u0131 Ethernet \u00fcnvanlar\u0131 kimi fiziki \u00fcnvanlarla \u0259laq\u0259l\u0259ndirm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunan protokoldur.32 bitlik \u00fcnvanlar\u0131 48 bitlik \u00fcnvanlara v\u0259 \u0259ksin\u0259 t\u0259rc\u00fcm\u0259 edir. Bu laz\u0131md\u0131r, \u00e7\u00fcnki bu g\u00fcn istifad\u0259 etdiyimiz internet protokolunun (IP) \u0259n \u00fcmumi s\u0259viyy\u0259si 32 bit uzunlu\u011funda v\u0259 MAC \u00fcnvanlar\u0131 48 bit uzunlu\u011fundad\u0131r.33. \u015e\u0259b\u0259k\u0259 t\u0259hl\u00fck\u0259sizliyi \u00fc\u00e7\u00fcn autentifikasiyan\u0131n \u00fcmumi \u00fcsullar\u0131 hans\u0131lard\u0131r?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Cavab: Biometrics - Bu, istifad\u0259\u00e7inin \u015f\u0259xsiyy\u0259tini yoxlamaq \u00fc\u00e7\u00fcn x\u00fcsusi olaraq istifad\u0259 edil\u0259n m\u0259lum v\u0259 qeyd\u0259 al\u0131nm\u0131\u015f fiziki atributudurToken - Sisteml\u0259r\u0259 daxil olmaq \u00fc\u00e7\u00fcn tokenl\u0259rd\u0259n d\u0259 istifad\u0259 olunur. Bu, hakerl\u0259rin etimadnam\u0259l\u0259r\u0259 malik olduqlar\u0131 halda hesablara daxil olmalar\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir.Transaction Authentication - Bird\u0259f\u0259lik pin v\u0259 ya parol, onlar\u0131n \u015f\u0259xsiyy\u0259tini t\u0259sdiql\u0259y\u0259n onlayn \u0259m\u0259liyyatlar\u0131n i\u015fl\u0259nm\u0259si zaman\u0131 istifad\u0259 olunur.Multi-Factor Authentication - Bu, bird\u0259n \u00e7ox autentifikasiya metoduna ehtiyac\u0131 olan bir t\u0259hl\u00fck\u0259sizlik sistemidir.Out-of-Band Authentication - Bu autentifikasiya iki f\u0259rqli kanaldan v\u0259 ya \u015f\u0259b\u0259k\u0259d\u0259n iki f\u0259rqli siqnal t\u0259l\u0259b edir. Bu, onlayn bank\u00e7\u0131l\u0131qda h\u00fccumlar\u0131n \u0259ks\u0259riyy\u0259tinin hack v\u0259 \u015f\u0259xsiyy\u0259t o\u011furlanmas\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 al\u0131r.34. Hashing v\u0259 Salting aras\u0131ndak\u0131 f\u0259rq n\u0259dir?Cavab:\u00a0 \u00a0 Hashing \u0259sas\u0259n autentifikasiya \u00fc\u00e7\u00fcn istifad\u0259 olunur v\u0259 m\u0259lumatlar\u0131n sabit uzunluqlu d\u0259y\u0259r\u0259 planla\u015fd\u0131r\u0131ld\u0131\u011f\u0131 birt\u0259r\u0259fli funksiyad\u0131r.Salting hash \u00fc\u00e7\u00fcn \u0259lav\u0259 bir add\u0131md\u0131r, burada \u015fifr\u0259y\u0259 salt \u0259lav\u0259 olunur v\u0259 o \u015f\u0259kild\u0259 hashl\u0259nir35. Stored v\u0259 Reflected XSS aras\u0131ndak\u0131 f\u0259rq n\u0259dir?Cavab: Stored XSS attacks - Enjekte edilmi\u015f skriptl\u0259rin h\u0259d\u0259f serverl\u0259rd\u0259 qal\u0131c\u0131 olaraq saxland\u0131\u011f\u0131 h\u00fccumlara deyilir. Bununla birlikd\u0259 qurban saxlan\u0131lan m\u0259lumatlar\u0131 h\u0259r d\u0259f\u0259 t\u0259l\u0259b etdikd\u0259 z\u0259r\u0259rli script yenid\u0259n i\u015f\u0259 d\u00fc\u015f\u00fcr.Reflected XSS Attacks \u2013 Stored XSS-d\u0259n f\u0259rqli olaraq bu tip XSS serverd\u0259 qal\u0131c\u0131 olaraq qalm\u0131r v\u0259 bir anl\u0131q ba\u015f verir v\u0259 bitir.37. \u015e\u0259xsiyy\u0259t o\u011furlu\u011funun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?\u00a0 \u00a0 \u00a0 \u00a0\u00a0\u00b7\u00a0 \u00a0 \u00a0 \u015e\u0259xsi qeydl\u0259rinizi qoruyun.\u00b7\u00a0 \u00a0 \u00a0 M\u0259xfi m\u0259lumatlar\u0131n onlayn payla\u015f\u0131lmas\u0131ndan \u00e7\u0259kinin.\u00b7\u00a0 \u00a0 \u00a0 G\u00fccl\u00fc parollardan istifad\u0259 edin v\u0259 onlar\u0131 m\u00fcnt\u0259z\u0259m olaraq d\u0259yi\u015fdirin.\u00b7\u00a0 \u00a0 \u00a0 Etibars\u0131z saytlarda bank m\u0259lumatlar\u0131n\u0131z\u0131 t\u0259qdim etm\u0259yin.\u00b7\u00a0 \u00a0 \u00a0 \u0130l\u0259ri s\u0259viyy\u0259 firewall v\u0259 spyware al\u0259tl\u0259ri vasit\u0259l\u0259ri il\u0259 sisteminizi qoruyun.\u00b7\u00a0 \u00a0 \u00a0 Brauzerl\u0259rinizi, sisteminizi v\u0259 proqram t\u0259minat\u0131n\u0131z\u0131 \u0259n son versiyada tutun.38. LAN daxilind\u0259 port bloklanmas\u0131 n\u0259dir?\u00a0 \u00a0Cavab: Bu, istifad\u0259\u00e7il\u0259rin yerli \u015f\u0259b\u0259k\u0259 daxilind\u0259 bir s\u0131ra xidm\u0259tl\u0259r\u0259 daxil olmas\u0131n\u0131 m\u0259hdudla\u015fd\u0131rma\u011fa k\u00f6m\u0259k edir. \u018fsas m\u0259qs\u0259d m\u0259nb\u0259nin portlar vasit\u0259sil\u0259 t\u0259yinat adresin\u0259 \u00e7\u0131x\u0131\u015f t\u0259min etm\u0259sini dayand\u0131rmaqd\u0131r. B\u00fct\u00fcn proqramlar portlarda i\u015fl\u0259diyi \u00fc\u00e7\u00fcn icaz\u0259siz giri\u015fi m\u0259hdudla\u015fd\u0131rmaq \u00fc\u00e7\u00fcn portlar\u0131 bloklamaq laz\u0131md\u0131r ki, bu da \u015f\u0259b\u0259k\u0259 infrastrukturunda t\u0259hl\u00fck\u0259sizlik z\u0259ifliyini poza bil\u0259r.41. Veril\u0259nl\u0259r bazas\u0131ndan \u00e7\u0131xar\u0131lan a\u015fa\u011f\u0131dak\u0131 parollar\u0131n siyah\u0131s\u0131na bax\u0131n:\u00a0\u00a0A. Password1B. @#$)*&amp;^%C. UcSc4Evr!D. akHGksmLNCavab:A\u015fa\u011f\u0131dak\u0131 parollardan hans\u0131 UCSC-nin parol t\u0259l\u0259bl\u0259rin\u0259 cavab verir? Cavab UcSc4Evr! Bu, a\u015fa\u011f\u0131dak\u0131 UCSC t\u0259l\u0259bl\u0259rinin ham\u0131s\u0131na cavab ver\u0259n yegan\u0259 se\u00e7imdir:42. Kiber h\u00fccum\u00e7ular\u0131n n\u00f6vl\u0259rini sadalay\u0131nD\u00f6rd n\u00f6v kiber h\u00fccum\u00e7u var.43.SRM dey\u0259rk\u0259n n\u0259yi n\u0259z\u0259rd\u0259 tutursunuz?Cavab: SRM T\u0259hl\u00fck\u0259sizlik Referans Monitoru m\u0259nas\u0131n\u0131 verir, komp\u00fcter s\u00fcr\u00fcc\u00fcl\u0259rin\u0259 obyekt\u0259 giri\u015f h\u00fcquqlar\u0131n\u0131 verm\u0259k \u00fc\u00e7\u00fcn rutinl\u0259r t\u0259qdim edir.56.Komp\u00fcter virusu n\u0259dir?Cavab:Virus istifad\u0259\u00e7inin raz\u0131l\u0131\u011f\u0131 olmadan h\u0259yata ke\u00e7iril\u0259n z\u0259r\u0259rli proqramd\u0131r. Viruslar CPU vaxt\u0131 v\u0259 yadda\u015f kimi komp\u00fcter resurslar\u0131n\u0131 istehlak ed\u0259 bil\u0259r. B\u0259z\u0259n virus dig\u0259r komp\u00fcter proqramlar\u0131nda d\u0259yi\u015fiklikl\u0259r edir v\u0259 komp\u00fcter sistemin\u0259 z\u0259r\u0259r verm\u0259k \u00fc\u00e7\u00fcn \u00f6z kodunu daxil edir.Komp\u00fcter virusu a\u015fa\u011f\u0131dak\u0131lar \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r:\u0130stifad\u0259\u00e7i id v\u0259 parol kimi \u015f\u0259xsi m\u0259lumatlara daxil olun\u0130stifad\u0259\u00e7iy\u0259 bezdirici mesajlar g\u00f6st\u0259rinKomp\u00fcterinizd\u0259ki m\u0259lumatlar\u0131n z\u0259d\u0259l\u0259nm\u0259si\u0130stifad\u0259\u00e7inin d\u00fcym\u0259 vuru\u015flar\u0131n\u0131 qeyd edinARP poisoning n\u0259dir?Cavab:\u00a0Address Resolution Protocol z\u0259h\u0259rl\u0259nm\u0259si IP \u00fcnvan\u0131n\u0131n \u015f\u0259b\u0259k\u0259 cihaz\u0131nda fiziki \u00fcnvana \u00e7evrildiyi bir h\u00fccum n\u00f6v\u00fcd\u00fcr. Ev sahibi ARP yay\u0131m\u0131 g\u00f6nd\u0259r\u0259c\u0259k v\u0259 b\u00fct\u00fcn q\u0259buledicil\u0259r fiziki \u00fcnvanlar\u0131 il\u0259 cavab ver\u0259c\u0259kl\u0259r. Ba\u015fqa s\u00f6zl\u0259 des\u0259k, ARP z\u0259h\u0259rl\u0259nm\u0259si, \u015f\u0259b\u0259k\u0259y\u0259 qo\u015fulmu\u015f komp\u00fcterin \u0130P \u00fcnvan\u0131 il\u0259 saxta \u00fcnvanlar\u0131 \u0259laq\u0259l\u0259ndirm\u0259k v\u0259 trafiki qa\u00e7\u0131rmaq \u00fc\u00e7\u00fcn ke\u00e7id\u0259 saxta \u00fcnvanlar g\u00f6nd\u0259rilm\u0259sinin ad\u0131d\u0131r.Bunlar:1) kibercinay\u0259tkarlar2) hacktivistl\u0259r3) daxili t\u0259hdidl\u0259r(\u0130nsider threats\u0259)4) d\u00f6vl\u0259t t\u0259r\u0259find\u0259n d\u0259st\u0259kl\u0259n\u0259n h\u00fccum\u00e7ular(State sponsored).45. \u018fl\u00e7atan olan Hacker Al\u0259tl\u0259ri\u00a0 \u00a0 \u00a0 \u00a0 \u00a0A\u015fa\u011f\u0131da faydal\u0131 hack al\u0259tl\u0259rinin siyah\u0131s\u0131 verilmi\u015fdir.AcunetixWebInspectProbablyNetsparkerAngry IP scanner:Burp SuiteSavvius49.Situasiya #1Cavab:Bank hesab\u0131n\u0131zla ba\u011fl\u0131 probleml\u0259 \u00fczl\u0259\u015fdiyini bildir\u0259n e-po\u00e7t m\u0259ktubu g\u00f6nd\u0259rir. E-po\u00e7t t\u0259limatlar v\u0259 h\u0259m\u00e7inin hesaba daxil olmaq \u00fc\u00e7\u00fcn ke\u00e7idl\u0259 t\u0259min edilir ki, siz onu d\u00fcz\u0259ld\u0259 bil\u0259siniz. Yuxar\u0131dak\u0131 v\u0259ziyy\u0259td\u0259n n\u0259 n\u0259tic\u0259 \u00e7\u0131xar\u0131rs\u0131n\u0131z? izah edin.Bu, ist\u0259nm\u0259y\u0259n e-po\u00e7t kimi g\u00f6r\u00fcn\u00fcr. Siz onu spam kimi bildirm\u0259li v\u0259 e-po\u00e7tu d\u0259rhal istifad\u0259 etdiyiniz m\u00fcvafiq veb m\u00fc\u015ft\u0259rid\u0259 (Yahoo Mail, Gmail v\u0259 s.) zibil qutusuna k\u00f6\u00e7\u00fcrm\u0259lisiniz. Bankla ba\u011fl\u0131 h\u0259r hans\u0131 etimadnam\u0259sini onlayn t\u0259qdim etm\u0259zd\u0259n \u0259vv\u0259l, mesaj\u0131n qanuni olub-olmad\u0131\u011f\u0131n\u0131 v\u0259 bankdan oldu\u011funu yoxlamaq \u00fc\u00e7\u00fcn banka z\u0259ng etm\u0259lisiniz.50. Simmetrik \u015fifr\u0259l\u0259m\u0259 alqoritmin\u0259 b\u0259zi n\u00fcmun\u0259l\u0259r verin.A\u015fa\u011f\u0131da simmetrik \u015fifr\u0259l\u0259m\u0259 alqoritminin b\u0259zi n\u00fcmun\u0259l\u0259ri verilmi\u015fdir.RCxBlowfishRijndael (AES)DES51. ECB v\u0259 CBC-nin abreviaturas\u0131 n\u0259dir?Cavab:ECB-nin tam formas\u0131 Elektron Kod Kitab\u0131d\u0131r v\u0259 CBC-nin tam formas\u0131 Cipher Block Chaining-dir.52.Casus proqram\u0131 m\u00fc\u0259yy\u0259nl\u0259\u015fdirin.Cavab:Casus proqram t\u0259\u015fkilat v\u0259 ya \u015f\u0259xs haqq\u0131nda m\u0259lumatlar\u0131 o\u011furlamaq m\u0259qs\u0259di da\u015f\u0131yan z\u0259r\u0259rli proqramd\u0131r. Bu z\u0259r\u0259rli proqram t\u0259\u015fkilat\u0131n komp\u00fcter sistemin\u0259 z\u0259r\u0259r ver\u0259 bil\u0259r.53. ARP poisoning n\u0259dir?Cavab:Address Resolution Protocol z\u0259h\u0259rl\u0259nm\u0259si IP \u00fcnvan\u0131n\u0131n \u015f\u0259b\u0259k\u0259 cihaz\u0131nda fiziki \u00fcnvana \u00e7evrildiyi bir h\u00fccum n\u00f6v\u00fcd\u00fcr. Ev sahibi ARP yay\u0131m\u0131 g\u00f6nd\u0259r\u0259c\u0259k v\u0259 b\u00fct\u00fcn q\u0259buledicil\u0259r fiziki \u00fcnvanlar\u0131 il\u0259 cavab ver\u0259c\u0259kl\u0259r. Ba\u015fqa s\u00f6zl\u0259 des\u0259k, ARP z\u0259h\u0259rl\u0259nm\u0259si, \u015f\u0259b\u0259k\u0259y\u0259 qo\u015fulmu\u015f komp\u00fcterin \u0130P \u00fcnvan\u0131 il\u0259 saxta \u00fcnvanlar\u0131 \u0259laq\u0259l\u0259ndirm\u0259k v\u0259 trafiki qa\u00e7\u0131rmaq \u00fc\u00e7\u00fcn ke\u00e7id\u0259 saxta \u00fcnvanlar g\u00f6nd\u0259rilm\u0259sinin ad\u0131d\u0131r.54. Fiziki olmayan t\u0259hdidl\u0259rin \u00fcmumi n\u00f6vl\u0259rini s\u0131ralay\u0131n:TrojansAdwareWormsSpywareDoS AttackDistributed DoS AttacksVirusKey loggersPhishingKomp\u00fcter sisteml\u0259rinin resurslar\u0131na icaz\u0259siz giri\u015f55.Nmap n\u0259dir?Cavab: Nmap b\u00fct\u00fcn qo\u015fulmu\u015f cihazlar\u0131 m\u00fc\u0259yy\u0259n etm\u0259k v\u0259 i\u015fl\u0259tdikl\u0259ri \u0259m\u0259liyyat sisteml\u0259ri haqq\u0131nda m\u0259lumat \u00e7atd\u0131rmaq \u00fc\u00e7\u00fcn IP paketl\u0259rind\u0259n istifad\u0259 ed\u0259n \u015f\u0259b\u0259k\u0259 skan al\u0259tidir.56.Sistem \u0259sasl\u0131 h\u00fccumlar\u0131n b\u0259zi n\u00fcmun\u0259l\u0259riVirusBackdoorsBotsWorm57.Veb serverin t\u0259hl\u00fck\u0259sizliyini t\u0259min etm\u0259k \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar at\u0131lmal\u0131d\u0131r?Cavab:Update the ownership of the fileKeep your webserver up-to-dateDisable all extra modulesDelete default scriptsM\u00fc\u0259llif:\u00a0Orkhan Jalalov\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/yusif.az\/main\/?p=6777\" \/>\n<meta property=\"og:locale\" content=\"az_AZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kibert\u0259hl\u00fck\u0259sizlik sah\u0259sind\u0259 veril\u0259n interv\u00fc suallar\u0131 - www.YUSIF.az IT B\u00d6LM\u018fS\u0130\" \/>\n<meta property=\"og:description\" content=\"A\u015fa\u011f\u0131da b\u0259zi tipik interv\u00fc suallar\u0131 t\u0259qdim edir\u0259m, h\u0259m\u00e7inin suallar\u0131n cavablar\u0131 il\u0259 ba\u011fl\u0131 q\u0131sa izahlar da \u0259lav\u0259 edir\u0259m:1. Kriptoqrafiya n\u0259dir?Cavab: Kriptoqrafiya m\u0259lumat\u0131n icaz\u0259 verilm\u0259diyi \u00fc\u00e7\u00fcnc\u00fc t\u0259r\u0259fl\u0259rd\u0259n m\u0259lumat\u0131 qorumaq \u00fc\u00e7\u00fcn m\u0259xfi m\u0259lumatlar\u0131 kodla\u015fd\u0131r\u0131lm\u0131\u015f \u015f\u0259kild\u0259 \u00e7evirm\u0259k v\u0259 \u00f6t\u00fcrm\u0259k \u00fcsuludur.3. IDS v\u0259 IPS aras\u0131ndak\u0131 f\u0259rq n\u0259dir?Cavab: IDS Intrusion Detection System\u2019dir v\u0259 o, yaln\u0131z m\u00fcdaxil\u0259l\u0259ri a\u015fkarlay\u0131r v\u0259 administrator is\u0259 m\u00fcdaxil\u0259nin qar\u015f\u0131s\u0131n\u0131 almal\u0131d\u0131r.Halbuki, IPS y\u0259ni Intrusion Prevention System-d\u0259 sistem m\u00fcdaxil\u0259ni a\u015fkarlay\u0131r v\u0259 h\u0259m\u00e7inin m\u00fcdaxil\u0259nin qar\u015f\u0131s\u0131n\u0131 almaq \u00fc\u00e7\u00fcn t\u0259dbirl\u0259r g\u00f6r\u00fcr.4. CIA \u00fc\u00e7buca\u011f\u0131n\u0131 a\u00e7\u0131qlay\u0131nCavab: CIA-\u0131n a\u00e7\u0131l\u0131\u015f\u0131 Confidentiality(Konfidensiall\u0131q), Integrity(taml\u0131q) v\u0259 Availability(\u0259l\u00e7atanl\u0131q)-d\u0131r. CIA \u0130nformasiya T\u0259hl\u00fck\u0259sizliyi siyas\u0259tl\u0259rin\u0259 r\u0259hb\u0259rlik etm\u0259k \u00fc\u00e7\u00fcn haz\u0131rlanm\u0131\u015f modeldir. Bu, t\u0259\u015fkilatlar t\u0259r\u0259find\u0259n istifad\u0259 edil\u0259n \u0259n m\u0259\u015fhur modell\u0259rd\u0259n biridir.Konfidensiall\u0131qM\u0259lumat yaln\u0131z s\u0259lahiyy\u0259tli i\u015f\u00e7il\u0259r \u00fc\u00e7\u00fcn \u0259l\u00e7atan v\u0259 oxuna bil\u0259n olmal\u0131d\u0131r. O, icaz\u0259siz i\u015f\u00e7il\u0259r t\u0259r\u0259find\u0259n \u0259l\u00e7atan olmamal\u0131d\u0131r. Kims\u0259 m\u0259lumatlara daxil olmaq \u00fc\u00e7\u00fcn hakerd\u0259n istifad\u0259 ed\u0259rs\u0259, m\u0259lumat g\u00fccl\u00fc \u015f\u0259kild\u0259 \u015fifr\u0259l\u0259nm\u0259lidir ki, m\u0259lumat \u0259ld\u0259 olunsa bel\u0259, oxunaq v\u0259 ya ba\u015fa d\u00fc\u015f\u00fcl\u0259n olmas\u0131n.Taml\u0131qM\u0259lumatlar\u0131n icaz\u0259si olmayan \u015f\u0259xsl\u0259r t\u0259r\u0259find\u0259n d\u0259yi\u015fdirilm\u0259diyind\u0259n \u0259min olmaq \u00fc\u00e7\u00fcnd\u00fcr. D\u00fcr\u00fcstl\u00fck m\u0259lumatlar\u0131n icaz\u0259si olmayan i\u015f\u00e7il\u0259r t\u0259r\u0259find\u0259n pozulmamas\u0131n\u0131 v\u0259 ya d\u0259yi\u015fdirilm\u0259m\u0259sini t\u0259min edir. S\u0259lahiyy\u0259tli \u015f\u0259xs\/sistem m\u0259lumatlar\u0131 d\u0259yi\u015fdirm\u0259y\u0259 \u00e7al\u0131\u015f\u0131rsa v\u0259 d\u0259yi\u015fiklik u\u011fursuz olarsa, m\u0259lumat geri qaytar\u0131lmal\u0131 v\u0259 z\u0259d\u0259l\u0259nm\u0259m\u0259lidir.\u018fl\u00e7atanl\u0131qM\u0259lumat istifad\u0259\u00e7i t\u0259l\u0259b etdiyi zaman istifad\u0259\u00e7i \u00fc\u00e7\u00fcn \u0259l\u00e7atan olmal\u0131d\u0131r. Avadanl\u0131\u011f\u0131n saxlanmas\u0131, m\u00fcnt\u0259z\u0259m olaraq t\u0259kmill\u0259\u015fdirilm\u0259si, M\u0259lumatlar\u0131n Yed\u0259kl\u0259nm\u0259si v\u0259 B\u0259rpas\u0131, \u015e\u0259b\u0259k\u0259 Darbo\u011fazlar\u0131na diqq\u0259t yetirilm\u0259lidir.5. \u015eifr\u0259l\u0259m\u0259 Hashing-d\u0259n n\u0259 il\u0259 f\u0259rql\u0259nir?\u00a0Cavab: H\u0259m \u015eifr\u0259l\u0259m\u0259, h\u0259m d\u0259 Hashing oxuna bil\u0259n m\u0259lumatlar\u0131 oxunmayan formata \u00e7evirm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunur. F\u0259rq ondad\u0131r ki, \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat \u015fifr\u0259nin a\u00e7\u0131lmas\u0131 prosesi il\u0259 yenid\u0259n orijinal m\u0259lumatlara \u00e7evril\u0259 bil\u0259r, lakin hash edilmi\u015f m\u0259lumatlar orijinal m\u0259lumatlara qaytar\u0131la bilm\u0259z6. Firewall n\u0259dir v\u0259 ondan n\u0259 \u00fc\u00e7\u00fcn istifad\u0259 olunur?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0Cavab:Firewall \u015f\u0259b\u0259k\u0259 trafikini izl\u0259y\u0259n v\u0259 idar\u0259 ed\u0259n sistem\/\u015f\u0259b\u0259k\u0259 s\u0259rh\u0259dl\u0259rind\u0259 qurulmu\u015f \u015f\u0259b\u0259k\u0259 t\u0259hl\u00fck\u0259sizlik sistemidir.Firewalllar \u0259sas\u0259n sistemi\/\u015f\u0259b\u0259k\u0259ni viruslar, qurdlar, z\u0259r\u0259rli proqramlar v\u0259 s.-d\u0259n qorumaq \u00fc\u00e7\u00fcn istifad\u0259 olunur. Firewalllar h\u0259m\u00e7inin uzaqdan giri\u015fin(Remote Access) v\u0259 m\u0259zmunun filtrl\u0259nm\u0259sinin qar\u015f\u0131s\u0131n\u0131 almaq \u00fc\u00e7\u00fcn d\u0259 ola bil\u0259r.7. VA (Z\u0259ifliyin Qiym\u0259tl\u0259ndirilm\u0259si) v\u0259 PT (Penetrasiya Testi) aras\u0131nda f\u0259rq n\u0259dir?Cavab:Vulnerability Assessment qar\u015f\u0131 sistemd\u0259 q\u00fcsurlar\u0131n tap\u0131lmas\u0131 prosesidir. T\u0259\u015fkilatlar sisteml\u0259rinin\/\u015f\u0259b\u0259k\u0259l\u0259rinin q\u00fcsurlar\u0131 v\u0259 ya z\u0259if t\u0259r\u0259fl\u0259ri oldu\u011funu bilir v\u0259 bu q\u00fcsurlar\u0131 tapmaq v\u0259 d\u00fcz\u0259ltm\u0259k \u00fc\u00e7\u00fcn q\u00fcsurlar\u0131 prioritetl\u0259\u015fdirm\u0259k ist\u0259yir.Penetration Testing h\u0259d\u0259fd\u0259 z\u0259iflikl\u0259rin tap\u0131lmas\u0131 prosesidir. T\u0259\u015fkilatlar d\u00fc\u015f\u00fcn\u0259 bil\u0259c\u0259kl\u0259ri b\u00fct\u00fcn t\u0259hl\u00fck\u0259sizlik t\u0259dbirl\u0259rini qurublar.Onlar\u0131n sistemini\/\u015f\u0259b\u0259k\u0259sini s\u0131nd\u0131rmaq \u00fc\u00e7\u00fcn ba\u015fqa yol olub-olmad\u0131\u011f\u0131n\u0131 bilm\u0259k v\u0259 yoxlamaq \u00fc\u00e7\u00fcn bu xidm\u0259td\u0259n istifad\u0259 edirl\u0259r.8.\u00dc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma n\u0259dir?Cavab:\u00a0\u00dc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma, host v\u0259 m\u00fc\u015ft\u0259ri aras\u0131nda \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn TCP\/IP \u015f\u0259b\u0259k\u0259sind\u0259 istifad\u0259 edil\u0259n \u00fcsuldur. Bu, \u00fc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma adlan\u0131r, \u00e7\u00fcnki bu, m\u00fc\u015ft\u0259ri v\u0259 serverin paket m\u00fcbadil\u0259si apard\u0131\u011f\u0131 \u00fc\u00e7 add\u0131ml\u0131 bir \u00fcsuldur. \u00dc\u00e7 add\u0131m a\u015fa\u011f\u0131dak\u0131lard\u0131r:1.\u00a0 \u00a0M\u00fc\u015ft\u0259ri server\u0259 SYN (Sinxronizasiya) paketini g\u00f6nd\u0259rir, serverin i\u015fl\u0259k v\u0259ziyy\u0259td\u0259 olub olmad\u0131\u011f\u0131n\u0131 v\u0259 ya a\u00e7\u0131q portlar\u0131n olub olmad\u0131\u011f\u0131n\u0131 yoxlay\u0131r.2.\u00a0 \u00a0Server a\u00e7\u0131q portlar\u0131 varsa, m\u00fc\u015ft\u0259riy\u0259 SYN-ACK paketini g\u00f6nd\u0259rir3.\u00a0 \u00a0M\u00fc\u015ft\u0259ri bunu q\u0259bul edir v\u0259 server\u0259 ACK (T\u0259qdimat) paketi g\u00f6nd\u0259rir.9. Veb T\u0259tbiqind\u0259n al\u0131na bil\u0259n cavab kodlar\u0131 hans\u0131lard\u0131r?Cavab:\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a01xx \u2013 M\u0259lumat xarakterli cavablar(Informational responses)2xx \u2013 U\u011fur(Success)3xx \u2013 Yenid\u0259n y\u00f6nl\u0259ndirm\u0259(Redirection)4xx \u2013 M\u00fc\u015ft\u0259ri t\u0259r\u0259f x\u0259tas\u0131(Client-side error)5xx \u2013 Server t\u0259r\u0259f x\u0259tas\u0131(Server-side error)10. Traceroute n\u0259dir?Cavab:\u00a0Traceroute paketin yolunu g\u00f6st\u0259r\u0259n bir vasit\u0259dir. O, paketin ke\u00e7diyi b\u00fct\u00fcn n\u00f6qt\u0259l\u0259ri (\u0259sas\u0259n mar\u015frutla\u015fd\u0131r\u0131c\u0131lar) sadalay\u0131r. Bu, \u0259sas\u0259n paket t\u0259yinat yerin\u0259 \u00e7atmad\u0131qda istifad\u0259 olunur. Traceroute, nasazl\u0131q n\u00f6qt\u0259sini m\u00fc\u0259yy\u0259n etm\u0259k \u00fc\u00e7\u00fcn \u0259laq\u0259nin harada dayand\u0131\u011f\u0131n\u0131 v\u0259 ya pozuldu\u011funu yoxlamaq \u00fc\u00e7\u00fcn istifad\u0259 olunur.11. Firewall qurmaq \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar var?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Cavab:1.\u00a0 \u00a0Username\/password: firewall cihaz\u0131 \u00fc\u00e7\u00fcn standart parolu d\u0259yi\u015fdirin2.\u00a0 \u00a0Remote administration: Uzaqdan idar\u0259etm\u0259 funksiyas\u0131n\u0131 s\u00f6nd\u00fcr\u00fcn3.\u00a0 \u00a0Port forwarding: Veb server v\u0259 ya FTP server kimi m\u00fc\u0259yy\u0259n proqramlar\u0131n d\u00fczg\u00fcn i\u015fl\u0259m\u0259si \u00fc\u00e7\u00fcn m\u00fcvafiq port y\u00f6nl\u0259ndirm\u0259sini konfiqurasiya edin4.\u00a0 \u00a0DHCP Server: Firewallun m\u00f6vcud DHCP serveri il\u0259 \u015f\u0259b\u0259k\u0259y\u0259 qura\u015fd\u0131r\u0131lmas\u0131, firewallun DHCP-si deaktiv edilm\u0259yinc\u0259 m\u00fcnaqi\u015f\u0259y\u0259 s\u0259b\u0259b olacaq.5.\u00a0 \u00a0Logging: Firewall probleml\u0259rini v\u0259 ya potensial h\u00fccumlar\u0131 aradan qald\u0131rmaq \u00fc\u00e7\u00fcn giri\u015fin aktiv oldu\u011fundan \u0259min olun v\u0259 log-lara nec\u0259 baxmaq laz\u0131m oldu\u011funu anlay\u0131n.6.\u00a0 \u00a0Policies: M\u00f6hk\u0259m t\u0259hl\u00fck\u0259sizlik siyas\u0259tl\u0259riniz olmal\u0131 v\u0259 Firewall-un h\u0259min siyas\u0259tl\u0259ri t\u0259tbiq etm\u0259k \u00fc\u00e7\u00fcn konfiqurasiya edildiyin\u0259 \u0259min olmal\u0131s\u0131n\u0131z.12. SSL \u015eifr\u0259l\u0259m\u0259sini izah edinCavab:\u00a0 \u00a0\u00a0SSL (Secure Sockets Layer) Veb Server v\u0259 Brauzer aras\u0131nda \u015fifr\u0259l\u0259nmi\u015f \u0259laq\u0259l\u0259r yaradan s\u0259naye standartl\u0131 t\u0259hl\u00fck\u0259sizlik texnologiyas\u0131d\u0131r. Bu, m\u0259lumatlar\u0131n m\u0259xfiliyini qorumaq v\u0259 onlayn \u0259m\u0259liyyatlarda m\u0259lumat\u0131 qorumaq \u00fc\u00e7\u00fcn istifad\u0259 olunur.SSL ba\u011flant\u0131s\u0131 qurmaq \u00fc\u00e7\u00fcn add\u0131mlar a\u015fa\u011f\u0131dak\u0131 kimidir:1.\u00a0 \u00a0Brauzer SSL il\u0259 qorunan veb server\u0259 qo\u015fulma\u011fa \u00e7al\u0131\u015f\u0131r2.\u00a0 \u00a0Brauzer SSL sertifikat\u0131n\u0131n sur\u0259tini brauzer\u0259 g\u00f6nd\u0259rir3.\u00a0 \u00a0Brauzer SSL sertifikat\u0131n\u0131n etibarl\u0131 olub olmad\u0131\u011f\u0131n\u0131 yoxlay\u0131r. Etibarl\u0131d\u0131rsa, o zaman brauzer veb server\u0259 \u015fifr\u0259li \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn mesaj g\u00f6nd\u0259rir4.\u00a0 \u00a0Veb server SSL \u015fifr\u0259li ba\u011flant\u0131ya ba\u015flamaq \u00fc\u00e7\u00fcn t\u0259sdiq g\u00f6nd\u0259rir5. SSL \u015fifr\u0259li \u0259lqa\u0259 brauzer v\u0259 veb server aras\u0131nda ba\u015f verir13. Serverin t\u0259hl\u00fck\u0259sizliyini t\u0259min etm\u0259k \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar\u0131 atacaqs\u0131n\u0131z?Cavab:\u00a0 \u00a0 \u00a0T\u0259hl\u00fck\u0259siz serverl\u0259r m\u0259lumatlar\u0131 icaz\u0259siz \u0259l\u0259 ke\u00e7irm\u0259kd\u0259n qorumaq \u00fc\u00e7\u00fcn m\u0259lumatlar\u0131n \u015fifr\u0259l\u0259nm\u0259si v\u0259 \u015fifr\u0259sinin a\u00e7\u0131lmas\u0131 \u00fc\u00e7\u00fcn Secure Sockets Layer (SSL) protokolundan istifad\u0259 edir.Serveri qorumaq \u00fc\u00e7\u00fcn d\u00f6rd sad\u0259 yol var:Add\u0131m 1: Root v\u0259 administrator istifad\u0259\u00e7il\u0259riniz \u00fc\u00e7\u00fcn t\u0259hl\u00fck\u0259siz parolunuz oldu\u011fundan \u0259min olunAdd\u0131m 2: Sizin etm\u0259li oldu\u011funuz n\u00f6vb\u0259ti \u015fey sisteminizd\u0259 yeni istifad\u0259\u00e7il\u0259r yaratmaqd\u0131r. Bunlar sistemi idar\u0259 etm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 etdiyiniz istifad\u0259\u00e7il\u0259r olacaqAdd\u0131m 3: default root\/administrator hesablar\u0131ndan uzaqdan giri\u015fi silinAdd\u0131m 4: N\u00f6vb\u0259ti add\u0131m uzaqdan giri\u015f \u00fc\u00e7\u00fcn Firewall qaydalar\u0131n\u0131z\u0131 konfiqurasiya etm\u0259kdir14. M\u0259lumat s\u0131zmas\u0131n\u0131(Data Leakage) izah edinCvaab: M\u0259lumat s\u0131zmas\u0131 m\u0259lumatlar\u0131n t\u0259\u015fkilat daxilind\u0259n icaz\u0259siz k\u0259nar t\u0259yinat yerin\u0259 q\u0259sd\u0259n v\u0259 ya ist\u0259m\u0259d\u0259n \u00f6t\u00fcr\u00fclm\u0259sidir. Bu, m\u0259xfi m\u0259lumat\u0131n icaz\u0259siz quruma a\u00e7\u0131qlanmas\u0131d\u0131r.M\u0259lumat s\u0131zmas\u0131 nec\u0259 ba\u015f verdiyin\u0259 g\u00f6r\u0259 3 kateqoriyaya b\u00f6l\u00fcn\u0259 bil\u0259r:1. T\u0259sad\u00fcfi pozulma: M\u00fc\u0259ssis\u0259 s\u0259hv v\u0259 ya kobud n\u00f6qteyi-n\u0259z\u0259rd\u0259n icaz\u0259siz \u015f\u0259xs\u0259 m\u0259lumat g\u00f6nd\u0259rir2. Q\u0259sd\u0259n pozma: S\u0259lahiyy\u0259tli qurum m\u0259qs\u0259dli \u015f\u0259kild\u0259 icaz\u0259siz quruma m\u0259lumatlar\u0131 g\u00f6nd\u0259rir3. Sistem Hack: Hacking \u00fcsullar\u0131 m\u0259lumat s\u0131zmas\u0131na s\u0259b\u0259b olmaq \u00fc\u00e7\u00fcn istifad\u0259 olunurDLP (Data Leakage Prevention) Al\u0259tl\u0259ri kimi tan\u0131nan al\u0259tl\u0259r, proqram t\u0259minat\u0131 v\u0259 strategiyalardan istifad\u0259 etm\u0259kl\u0259 m\u0259lumat s\u0131zmas\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 almaq olar.15. \u00dcmumi kiberh\u00fccumlardan b\u0259zil\u0259ri hans\u0131lard\u0131r?Cavab: A\u015fa\u011f\u0131da sisteminiz\u0259 m\u0259nfi t\u0259sir g\u00f6st\u0259r\u0259 bil\u0259c\u0259k b\u0259zi \u00fcmumi kiberh\u00fccumlar verilmi\u015fdir.MalwarePhishingPassword AttacksDDoSMan in the MiddleDrive-By DownloadsMalvertisingRogue Software16. Port Scanning n\u0259dir?\u00a0 \u00a0Cavab: Port Skanlama, hostda m\u00f6vcud olan a\u00e7\u0131q portlar\u0131 v\u0259 xidm\u0259ti m\u00fc\u0259yy\u0259n etm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259n texnikad\u0131r. Hakerl\u0259r z\u0259iflikl\u0259rd\u0259n istifad\u0259 etm\u0259k \u00fc\u00e7\u00fcn faydal\u0131 ola bil\u0259c\u0259k m\u0259lumatlar\u0131 tapmaq \u00fc\u00e7\u00fcn port skan\u0131ndan istifad\u0259 edirl\u0259r.\u0130dar\u0259\u00e7il\u0259r \u015f\u0259b\u0259k\u0259nin t\u0259hl\u00fck\u0259sizlik siyas\u0259tl\u0259rini yoxlamaq \u00fc\u00e7\u00fcn Port Skanlamas\u0131ndan istifad\u0259 edirl\u0259r.\u00dcmumi Port Skanlama Texnikalar\u0131ndan b\u0259zil\u0259ri bunlard\u0131r:Ping ScanTCP Half-OpenTCP ConnectUDPStealth Scanning17. Brute Force Attack n\u0259dir? Bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 ala bil\u0259rsiniz?\u00a0 \u00a0Cavab: Brute Force, m\u00fcmk\u00fcn etimadnam\u0259l\u0259rin b\u00fct\u00fcn d\u0259yi\u015fm\u0259l\u0259rini v\u0259 kombinasiyalar\u0131n\u0131 t\u0259krar-t\u0259krar s\u0131namaqla d\u00fczg\u00fcn etimadnam\u0259l\u0259ri tapmaq \u00fcsuludur.\u018fks\u0259r hallarda Brute Force h\u00fccumlar\u0131 avtomatla\u015fd\u0131r\u0131l\u0131r, burada al\u0259t\/proqram avtomatik olaraq etimadnam\u0259l\u0259r siyah\u0131s\u0131 il\u0259 daxil olma\u011fa \u00e7al\u0131\u015f\u0131r. Brute Force h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 alma\u011f\u0131n m\u00fcxt\u0259lif yollar\u0131 var.Onlardan b\u0259zil\u0259ri bunlard\u0131r:Parolun uzunlu\u011fu: Siz parol \u00fc\u00e7\u00fcn minimum uzunluq t\u0259yin ed\u0259 bil\u0259rsiniz. \u015eifr\u0259 n\u0259 q\u0259d\u0259r uzun olsa, onu tapmaq bir o q\u0259d\u0259r \u00e7\u0259tindir.\u015eifr\u0259 M\u00fcr\u0259kk\u0259bliyi: Parolda simvollar\u0131n m\u00fcxt\u0259lif formatlar\u0131n\u0131n daxil edilm\u0259si kobud g\u00fcc h\u00fccumlar\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir. X\u00fcsusi simvollar v\u0259 b\u00f6y\u00fck v\u0259 ki\u00e7ik h\u0259rfl\u0259rl\u0259 birlikd\u0259 alfa-r\u0259q\u0259m parollar\u0131ndan istifad\u0259 parol m\u00fcr\u0259kk\u0259bliyini art\u0131r\u0131r v\u0259 s\u0131nd\u0131r\u0131lmas\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir.Giri\u015f c\u0259hdl\u0259rinin m\u0259hdudla\u015fd\u0131r\u0131lmas\u0131: Giri\u015f u\u011fursuzluqlar\u0131na limit t\u0259yin edin. M\u0259s\u0259l\u0259n, giri\u015f x\u0259talar\u0131 \u00fc\u00e7\u00fcn limiti 3 kimi t\u0259yin ed\u0259 bil\u0259rsiniz. Bel\u0259likl\u0259, ard\u0131c\u0131l 3 giri\u015f u\u011fursuzlu\u011fu olduqda, istifad\u0259\u00e7inin bir m\u00fcdd\u0259t daxil olmas\u0131n\u0131 m\u0259hdudla\u015fd\u0131r\u0131n v\u0259 ya n\u00f6vb\u0259ti d\u0259f\u0259 daxil olmas\u0131, istifad\u0259 etm\u0259si \u00fc\u00e7\u00fcn E-po\u00e7t v\u0259 ya OTP g\u00f6nd\u0259rin. Brute Force avtomatla\u015fd\u0131r\u0131lm\u0131\u015f proses oldu\u011fundan, giri\u015f c\u0259hdl\u0259rini m\u0259hdudla\u015fd\u0131rmaq Brute Force prosesini pozacaq.18. OSI modelinin m\u00fcxt\u0259lif t\u0259b\u0259q\u0259l\u0259ri hans\u0131lard\u0131r?\u00a0 \u00a0 \u00a0Cavab: OSI modeli, proqramlar\u0131n \u015f\u0259b\u0259k\u0259 \u00fcz\u0259rind\u0259n nec\u0259 \u0259laq\u0259 saxlayaca\u011f\u0131na dair \u0259laq\u0259li istinad modelidir. OSI referans\u0131n\u0131n m\u0259qs\u0259di r\u0259q\u0259msal kommunikasiya m\u0259hsullar\u0131 v\u0259 software proqramlar\u0131n\u0131n qar\u015f\u0131l\u0131ql\u0131 f\u0259aliyy\u0259t g\u00f6st\u0259r\u0259 bilm\u0259si \u00fc\u00e7\u00fcn sat\u0131c\u0131lara v\u0259 t\u0259rtibat\u00e7\u0131lara r\u0259hb\u0259rlik etm\u0259kdir.Fiziki s\u0259viyy\u0259(Physical): R\u0259q\u0259msal m\u0259lumatlar\u0131n rabit\u0259 vasit\u0259si il\u0259 g\u00f6nd\u0259ricid\u0259n al\u0131c\u0131ya \u00f6t\u00fcr\u00fclm\u0259sin\u0259 cavabdehdirData Link Layer: Veril\u0259nl\u0259rin fiziki ke\u00e7id\u0259 v\u0259 oradan h\u0259r\u0259k\u0259tini idar\u0259 edir. O, h\u0259m\u00e7inin m\u0259lumat bitl\u0259rinin kodla\u015fd\u0131r\u0131lmas\u0131 v\u0259 dekodlanmas\u0131na cavabdehdir.\u015e\u0259b\u0259k\u0259 s\u0259viyy\u0259si: Paketin y\u00f6nl\u0259ndirilm\u0259si v\u0259 \u015f\u0259b\u0259k\u0259 rabit\u0259si \u00fc\u00e7\u00fcn mar\u015frutla\u015fd\u0131rma yollar\u0131n\u0131n t\u0259min edilm\u0259sin\u0259 cavabdehdir.N\u0259qliyyat Layeri: \u015e\u0259b\u0259k\u0259 \u00fcz\u0259rind\u0259n end-to-end rabit\u0259y\u0259 cavabdehdir. O, m\u0259lumat\u0131 yuxar\u0131dak\u0131 t\u0259b\u0259q\u0259d\u0259n ay\u0131r\u0131r v\u0259 \u015e\u0259b\u0259k\u0259 Layerin\u0259 \u00f6t\u00fcr\u00fcr v\u0259 sonra b\u00fct\u00fcn m\u0259lumatlar\u0131n q\u0259buledicinin sonuna u\u011furla \u00e7atmas\u0131n\u0131 t\u0259min edir.Session Layer: G\u00f6nd\u0259r\u0259n v\u0259 q\u0259bul ed\u0259n aras\u0131nda \u0259laq\u0259ni idar\u0259 edir. O, sessiyan\u0131n ba\u015flamas\u0131, ba\u015fa \u00e7atmas\u0131 v\u0259 idar\u0259 edilm\u0259sin\u0259, g\u00f6nd\u0259rici il\u0259 q\u0259buledici aras\u0131nda qar\u015f\u0131l\u0131ql\u0131 \u0259laq\u0259nin qurulmas\u0131na, saxlanmas\u0131na v\u0259 sinxronla\u015fd\u0131r\u0131lmas\u0131na cavabdehdir.T\u0259qdimat Layeri: Bu, xam dataqramlar v\u0259 ya paketl\u0259r g\u00f6nd\u0259rm\u0259k \u0259v\u0259zin\u0259 veril\u0259nl\u0259rin d\u00fczg\u00fcn formatda v\u0259 m\u0259lumat strukturunda t\u0259qdim edilm\u0259si il\u0259 m\u0259\u015f\u011ful olur.T\u0259tbiq Layeri: T\u0259tbiq v\u0259 \u015f\u0259b\u0259k\u0259 aras\u0131nda interfeys t\u0259min edir. O, prosesd\u0259n proses\u0259 rabit\u0259y\u0259 diqq\u0259t yetirir v\u0259 \u00fcnsiyy\u0259t interfeysini t\u0259min edir.\u00a0 \u00a0\u00a019. VPN n\u0259dir?Cavab: Dem\u0259k olar ki, b\u00fct\u00fcn Kibert\u0259hl\u00fck\u0259sizlik M\u00fcsahib\u0259 Suallar\u0131na bu sual daxil edilir. VPN Virtual \u015e\u0259xsi \u015e\u0259b\u0259k\u0259 dem\u0259kdir. T\u0259hl\u00fck\u0259siz v\u0259 \u015fifr\u0259li \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn istifad\u0259 olunur. Bir VPN istifad\u0259 ed\u0259rk\u0259n, m\u00fc\u015ft\u0259rid\u0259n g\u0259l\u0259n m\u0259lumatlar VPN-d\u0259 \u015fifr\u0259l\u0259ndiyi bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir v\u0259 sonra internet vasit\u0259sil\u0259 ba\u015fqa bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir.Bu zaman veril\u0259nl\u0259rin \u015fifr\u0259si a\u00e7\u0131l\u0131r v\u0259 server\u0259 g\u00f6nd\u0259rilir. Server cavab g\u00f6nd\u0259rdikd\u0259, cavab VPN-in \u015fifr\u0259l\u0259ndiyi bir n\u00f6qt\u0259y\u0259 v\u0259 bu \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat VPN-in \u015fifr\u0259sinin a\u00e7\u0131ld\u0131\u011f\u0131 ba\u015fqa bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir. V\u0259 n\u0259hay\u0259t, \u015fifr\u0259si a\u00e7\u0131lm\u0131\u015f m\u0259lumatlar m\u00fc\u015ft\u0259riy\u0259 g\u00f6nd\u0259rilir. VPN-d\u0259n istifad\u0259 etm\u0259yin b\u00fct\u00fcn m\u0259qs\u0259di \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat \u00f6t\u00fcr\u00fclm\u0259sini t\u0259min etm\u0259kdir.20. \u015e\u0259b\u0259k\u0259d\u0259 Risk, Z\u0259iflik v\u0259 T\u0259hdid dedikd\u0259 n\u0259 ba\u015fa d\u00fc\u015f\u00fcrs\u00fcn\u00fcz?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Cvaab: T\u0259hdid: Sistem\u0259 v\u0259 ya t\u0259\u015fkilata z\u0259r\u0259r vurma potensial\u0131 olan kims\u0259Z\u0259iflik: Potensial haker t\u0259r\u0259find\u0259n istifad\u0259 edil\u0259 bil\u0259n sistemd\u0259ki z\u0259iflikRisk: T\u0259hl\u00fck\u0259li z\u0259iflikd\u0259n istifad\u0259 etdikd\u0259 itki v\u0259 ya z\u0259d\u0259l\u0259nm\u0259 potensial\u013121. Black Hat, White Hat v\u0259 Gray Hat hakerl\u0259ri n\u0259dir?\u00a0 \u00a0Cavab:Blach Hat hakerl\u0259r komp\u00fcter \u015f\u0259b\u0259k\u0259l\u0259rin\u0259 m\u00fcdaxil\u0259 haqq\u0131nda geni\u015f biliy\u0259 malik olmaqlar\u0131 il\u0259 tan\u0131n\u0131rlar. Onlar bu sisteml\u0259r\u0259 daxil olmaq \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259n z\u0259r\u0259rli proqramlar yaza bilirl\u0259r. Bu tip hakerl\u0259r m\u0259lumat o\u011furlamaq v\u0259 ya s\u0131nd\u0131r\u0131lm\u0131\u015f sistemd\u0259n z\u0259r\u0259rli m\u0259qs\u0259dl\u0259r \u00fc\u00e7\u00fcn \u00f6z bacar\u0131qlar\u0131ndan sui-istifad\u0259 edirl\u0259r.White Hat hakerl\u0259r \u00f6z s\u0259lahiyy\u0259tl\u0259rini yax\u015f\u0131 i\u015fl\u0259r \u00fc\u00e7\u00fcn istifad\u0259 edirl\u0259r v\u0259 buna g\u00f6r\u0259 d\u0259 onlara Etik Hakerl\u0259r deyilir. Onlar Black Hat hackerler il\u0259 eyni biliy\u0259 malik olurlar. Bunlar \u0259sas\u0259n \u015firk\u0259tl\u0259r t\u0259r\u0259find\u0259n sisteml\u0259rd\u0259 z\u0259iflikl\u0259ri v\u0259 t\u0259hl\u00fck\u0259sizlik bo\u015fluqlar\u0131n\u0131 tapma\u011fa v\u0259 d\u00fcz\u0259ltm\u0259y\u0259 \u00e7al\u0131\u015fan bir t\u0259hl\u00fck\u0259sizlik m\u00fct\u0259x\u0259ssisi kimi i\u015f\u0259 g\u00f6t\u00fcr\u00fcl\u00fcrl\u0259r. Onlar t\u0259hl\u00fck\u0259sizliyi yax\u015f\u0131la\u015fd\u0131rmaq \u00fc\u00e7\u00fcn \u00f6z bacar\u0131qlar\u0131ndan istifad\u0259 edirl\u0259r.Gray Hat hakerl\u0259r White v\u0259 Black Hat hakerinin birl\u0259\u015fm\u0259sidir. Sahibinin icaz\u0259si olmadan sistem z\u0259iflikl\u0259rini axtar\u0131rlar. H\u0259r hans\u0131 bir z\u0259iflik a\u015fkar ed\u0259rl\u0259rs\u0259, bu bar\u0259d\u0259 sahibin\u0259 m\u0259lumat verirl\u0259r. Black Hat hakerl\u0259rd\u0259n f\u0259rqli olaraq, onlar a\u015fkar edilmi\u015f z\u0259iflikl\u0259rd\u0259n istifad\u0259 etmirl\u0259r.22.XSS h\u00fccumunu izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?Cavab:XSS (Saytlararas\u0131 Skriptl\u0259m\u0259) hakerl\u0259r\u0259 veb s\u0259hif\u0259l\u0259r\u0259 z\u0259r\u0259rli client-side skriptl\u0259ri yeritm\u0259y\u0259 imkan ver\u0259n kiberh\u00fccumdur. XSS sessiyalar\u0131 v\u0259 kukil\u0259ri o\u011furlamaq, DOM-u d\u0259yi\u015fdirm\u0259k, remote code execution, serveri s\u0131nd\u0131rmaq v\u0259 s. \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r.XSS-in n\u00f6vl\u0259ri-\u00a0 \u00a0 \u00a0 \u00a0Reflected XSS-\u00a0 \u00a0 \u00a0 \u00a0Stored XSS-\u00a0 \u00a0 \u00a0 \u00a0DOM Based XSSA\u015fa\u011f\u0131dak\u0131 t\u0259cr\u00fcb\u0259l\u0259rd\u0259n istifad\u0259 etm\u0259kl\u0259 XSS h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:\u0130stifad\u0259\u00e7i daxiletm\u0259l\u0259rini t\u0259sdiql\u0259yin (Validate user inputs)\u00b7\u00a0 \u00a0 \u00a0 \u00a0\u0130stifad\u0259\u00e7i giri\u015fl\u0259rini t\u0259mizl\u0259yin (Sanitize user inputs)X\u00fcsusi simvollar\u0131 kodlay\u0131n(Encode special characters)Anti-XSS xidm\u0259tl\u0259rind\u0259n\/al\u0259tl\u0259rind\u0259n istifad\u0259 edin (Use Anti-XSS services\/tools)XSS HTML Filtrind\u0259n istifad\u0259 edin(Use XSS HTML Filter)24. Botnet n\u0259dir?Cavab: Botnet, h\u0259r bir cihaz\u0131n \u00fcz\u0259rind\u0259 bir v\u0259 ya daha \u00e7ox botun i\u015fl\u0259diyi internet\u0259 qo\u015fulmu\u015f bir s\u0131ra cihazlard\u0131r.Qur\u011fulardak\u0131 botlar v\u0259 z\u0259r\u0259rli skriptl\u0259r qurban\u0131 s\u0131nd\u0131rmaq \u00fc\u00e7\u00fcn istifad\u0259 olunurdu. Botnetl\u0259r m\u0259lumatlar\u0131 o\u011furlamaq, spam g\u00f6nd\u0259rm\u0259k v\u0259 DDOS h\u00fccumunu h\u0259yata ke\u00e7irm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r.25. SSL v\u0259 TLS-I a\u00e7\u0131qlay\u0131n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0Cavab: SSL g\u00f6nd\u0259r\u0259nin \u015f\u0259xsiyy\u0259tini yoxlamaq \u00fc\u00e7\u00fcn n\u0259z\u0259rd\u0259 tutulub, lakin o, bundan ba\u015fqa he\u00e7 n\u0259 axtarm\u0131r. SSL dan\u0131\u015fd\u0131\u011f\u0131n\u0131z insan\u0131 izl\u0259m\u0259y\u0259 k\u00f6m\u0259k ed\u0259 bil\u0259r, lakin bu da b\u0259z\u0259n aldad\u0131la bil\u0259r.TLS h\u0259m\u00e7inin SSL kimi eynil\u0259\u015fdirm\u0259 vasit\u0259sidir, lakin daha yax\u015f\u0131 t\u0259hl\u00fck\u0259sizlik x\u00fcsusiyy\u0259tl\u0259ri t\u0259klif edir. M\u0259lumatlara \u0259lav\u0259 qorunma t\u0259min edir v\u0259 buna g\u00f6r\u0259 d\u0259 SSL v\u0259 TLS daha yax\u015f\u0131 qorunmaq \u00fc\u00e7\u00fcn tez-tez birlikd\u0259 istifad\u0259 olunur.26. 2FA n\u0259dir v\u0259 ictimai vebsaytlar \u00fc\u00e7\u00fcn nec\u0259 t\u0259tbiq oluna bil\u0259r?\u00a0 \u00a0Cavab: &quot;\u00c7ox faktorlu autentifikasiya&quot; kimi tan\u0131nan \u0259lav\u0259 t\u0259hl\u00fck\u0259sizlik s\u0259viyy\u0259sidir.Yaln\u0131z parol v\u0259 istifad\u0259\u00e7i ad\u0131 deyil, h\u0259m d\u0259 yaln\u0131z v\u0259 yaln\u0131z h\u0259min istifad\u0259\u00e7inin onlarda olan bir \u015feyi, y\u0259ni ancaq onlar\u0131n bilm\u0259li olduqlar\u0131 v\u0259 ya d\u0259rhal \u0259ld\u0259 etm\u0259li oldu\u011fu bir m\u0259lumat\u0131, m\u0259s\u0259l\u0259n, fiziki token t\u0259l\u0259b edir.Authenticator proqramlar\u0131 m\u0259tn, s\u0259sli z\u0259ng v\u0259 ya e-po\u00e7t vasit\u0259sil\u0259 do\u011frulama kodu \u0259ld\u0259 etm\u0259k ehtiyac\u0131n\u0131 \u0259v\u0259z edir.Bu Proqramlara n\u00fcmun\u0259 kimi Google Authenticator v\u0259 Autify kimi proqramlar\u0131 g\u00f6st\u0259rm\u0259k olar.27. Fi\u015finqi izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?Cavab:Fi\u015finq kiberh\u00fccumdur ki, burada haker etibarl\u0131 \u015f\u0259xs v\u0259 ya biznes kimi maskalan\u0131r v\u0259 saxta e-po\u00e7t v\u0259 ya ani mesaj vasit\u0259sil\u0259 h\u0259ssas maliyy\u0259 v\u0259 ya \u015f\u0259xsi m\u0259lumatlar\u0131 o\u011furlama\u011fa \u00e7al\u0131\u015f\u0131rA\u015fa\u011f\u0131dak\u0131 \u00fcsullardan istifad\u0259 etm\u0259kl\u0259 fi\u015finq h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:\u00b7\u00a0 \u00a0 \u00a0 \u00a0Etibar etm\u0259diyiniz veb s\u0259hif\u0259l\u0259r\u0259 h\u0259ssas m\u0259lumatlar\u0131 daxil etm\u0259yin\u00b7\u00a0 \u00a0 \u00a0 \u00a0Sayt\u0131n t\u0259hl\u00fck\u0259sizliyini yoxlay\u0131n\u00b7\u00a0 \u00a0 \u00a0 \u00a0Firewall-lardan istifad\u0259 edin\u00b7\u00a0 \u00a0 \u00a0 \u00a0\u0130nternet T\u0259hl\u00fck\u0259sizliyi olan AntiVirus Proqram\u0131ndan istifad\u0259 edin\u00b7\u00a0 \u00a0 \u00a0 \u00a0Anti-Fi\u015finq Al\u0259tl\u0259r Panelind\u0259n istifad\u0259 edin28. SQL Enjeksiyonunu izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?Cavab: SQL Injection (SQLi) t\u0259cav\u00fczkar\u0131n veb t\u0259tbiqinin veril\u0259nl\u0259r bazas\u0131 serverin\u0259 n\u0259zar\u0259t etm\u0259k \u00fc\u00e7\u00fcn z\u0259r\u0259rli SQL sor\u011fular\u0131n\u0131 yerin\u0259 yetirm\u0259k \u00fc\u00e7\u00fcn server\u0259 g\u00f6nd\u0259ril\u0259n m\u0259lumatlar\u0131 manipulyasiya etdiyi, bununla da icaz\u0259siz m\u0259lumatlara daxil olmaq, d\u0259yi\u015fdirm\u0259k v\u0259 silm\u0259k \u00fc\u00e7\u00fcn kod yeritm\u0259 h\u00fccumudur. Bu h\u00fccum \u0259sas\u0259n veril\u0259nl\u0259r bazas\u0131 serverl\u0259rini \u0259l\u0259 ke\u00e7irm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunur.A\u015fa\u011f\u0131dak\u0131 t\u0259cr\u00fcb\u0259l\u0259rd\u0259n istifad\u0259 etm\u0259kl\u0259 SQL Injection h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:\u00b7\u00a0 \u00a0 \u00a0 \u00a0Haz\u0131rlanm\u0131\u015f ifad\u0259l\u0259ri daxil edin (parametrl\u0259\u015fdirilmi\u015f sor\u011fularla)\u00b7\u00a0 \u00a0 \u00a0 \u00a0Saxlan\u0131lan Prosedurlardan istifad\u0259 edin\u0130stifad\u0259\u00e7i daxiletm\u0259sini t\u0259sdiq edin(Validate user input)\u00b7\u00a0 \u00a0 \u00a0 \u00a0Error mesaj\u0131ndan m\u0259lumatlar\u0131 gizl\u0259din\u00b7\u00a0 \u00a0 \u00a0 \u00a0Sisteminizi yenil\u0259yinVeril\u0259nl\u0259r bazas\u0131 etimadnam\u0259sini ayr\u0131 v\u0259 \u015fifr\u0259l\u0259nmi\u015f \u015f\u0259kild\u0259 saxlay\u0131nShell v\u0259 ehtiyac\u0131n\u0131z olmayan h\u0259r hans\u0131 dig\u0259r funksiyalar\u0131 s\u00f6nd\u00fcr\u00fcn29. T\u0259hl\u00fck\u0259sizlik s\u0259hv konfiqurasiyas\u0131(security misconfiguration) n\u0259dir?Cavab:Security Misconfiguration t\u0259hl\u00fck\u0259siz olmayan konfiqurasiya se\u00e7imi s\u0259b\u0259bind\u0259n proqram\/\u015f\u0259b\u0259k\u0259\/cihaz h\u00fccuma m\u0259ruz qald\u0131qda ba\u015f ver\u0259 bil\u0259c\u0259k z\u0259iflikdir. Bu, standart istifad\u0259\u00e7i ad\u0131\/parolun d\u0259yi\u015fm\u0259z saxlan\u0131lmas\u0131 q\u0259d\u0259r sad\u0259 ola bil\u0259r.30. Remote Desktop Protocol (RDP) n\u0259dir?Cavab:-\u00a0 \u00a0 \u00a0 \u00a0RDP (Remote Desktop Protocol) x\u00fcsusi olaraq m\u00fc\u015ft\u0259ri cihazlar\u0131, istifad\u0259\u00e7il\u0259r v\u0259 virtual \u015f\u0259b\u0259k\u0259 serveri aras\u0131nda proqram m\u0259lumatlar\u0131n\u0131n \u00f6t\u00fcr\u00fclm\u0259si t\u0259hl\u00fck\u0259sizliyi v\u0259 \u015fifr\u0259l\u0259m\u0259si \u00fc\u00e7\u00fcn n\u0259z\u0259rd\u0259 tutulmu\u015f Microsoft protokoludur.-\u00a0 \u00a0 \u00a0 \u00a0Bu, administratorlara f\u0259rdi abun\u0259\u00e7il\u0259rin qar\u015f\u0131la\u015fd\u0131\u011f\u0131 probleml\u0259ri uzaqdan qiym\u0259tl\u0259ndirm\u0259y\u0259 v\u0259 h\u0259ll etm\u0259y\u0259 imkan verir.-\u00a0 \u00a0 \u00a0 \u00a0O, \u00e7oxn\u00f6qt\u0259li \u00f6t\u00fcrm\u0259 t\u0259min etm\u0259kl\u0259 64.000-\u0259 q\u0259d\u0259r ayr\u0131 m\u0259lumat kanal\u0131n\u0131 d\u0259st\u0259kl\u0259yir.31. Address Resolution Protocol (ARP) n\u0259 \u00fc\u00e7\u00fcn istifad\u0259 olunur?Cavab: ARP x\u00fcsusi olaraq IP \u015f\u0259b\u0259k\u0259 \u00fcnvanlar\u0131n\u0131 Ethernet \u00fcnvanlar\u0131 kimi fiziki \u00fcnvanlarla \u0259laq\u0259l\u0259ndirm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunan protokoldur.32 bitlik \u00fcnvanlar\u0131 48 bitlik \u00fcnvanlara v\u0259 \u0259ksin\u0259 t\u0259rc\u00fcm\u0259 edir. Bu laz\u0131md\u0131r, \u00e7\u00fcnki bu g\u00fcn istifad\u0259 etdiyimiz internet protokolunun (IP) \u0259n \u00fcmumi s\u0259viyy\u0259si 32 bit uzunlu\u011funda v\u0259 MAC \u00fcnvanlar\u0131 48 bit uzunlu\u011fundad\u0131r.33. \u015e\u0259b\u0259k\u0259 t\u0259hl\u00fck\u0259sizliyi \u00fc\u00e7\u00fcn autentifikasiyan\u0131n \u00fcmumi \u00fcsullar\u0131 hans\u0131lard\u0131r?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Cavab: Biometrics - Bu, istifad\u0259\u00e7inin \u015f\u0259xsiyy\u0259tini yoxlamaq \u00fc\u00e7\u00fcn x\u00fcsusi olaraq istifad\u0259 edil\u0259n m\u0259lum v\u0259 qeyd\u0259 al\u0131nm\u0131\u015f fiziki atributudurToken - Sisteml\u0259r\u0259 daxil olmaq \u00fc\u00e7\u00fcn tokenl\u0259rd\u0259n d\u0259 istifad\u0259 olunur. Bu, hakerl\u0259rin etimadnam\u0259l\u0259r\u0259 malik olduqlar\u0131 halda hesablara daxil olmalar\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir.Transaction Authentication - Bird\u0259f\u0259lik pin v\u0259 ya parol, onlar\u0131n \u015f\u0259xsiyy\u0259tini t\u0259sdiql\u0259y\u0259n onlayn \u0259m\u0259liyyatlar\u0131n i\u015fl\u0259nm\u0259si zaman\u0131 istifad\u0259 olunur.Multi-Factor Authentication - Bu, bird\u0259n \u00e7ox autentifikasiya metoduna ehtiyac\u0131 olan bir t\u0259hl\u00fck\u0259sizlik sistemidir.Out-of-Band Authentication - Bu autentifikasiya iki f\u0259rqli kanaldan v\u0259 ya \u015f\u0259b\u0259k\u0259d\u0259n iki f\u0259rqli siqnal t\u0259l\u0259b edir. Bu, onlayn bank\u00e7\u0131l\u0131qda h\u00fccumlar\u0131n \u0259ks\u0259riyy\u0259tinin hack v\u0259 \u015f\u0259xsiyy\u0259t o\u011furlanmas\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 al\u0131r.34. Hashing v\u0259 Salting aras\u0131ndak\u0131 f\u0259rq n\u0259dir?Cavab:\u00a0 \u00a0 Hashing \u0259sas\u0259n autentifikasiya \u00fc\u00e7\u00fcn istifad\u0259 olunur v\u0259 m\u0259lumatlar\u0131n sabit uzunluqlu d\u0259y\u0259r\u0259 planla\u015fd\u0131r\u0131ld\u0131\u011f\u0131 birt\u0259r\u0259fli funksiyad\u0131r.Salting hash \u00fc\u00e7\u00fcn \u0259lav\u0259 bir add\u0131md\u0131r, burada \u015fifr\u0259y\u0259 salt \u0259lav\u0259 olunur v\u0259 o \u015f\u0259kild\u0259 hashl\u0259nir35. Stored v\u0259 Reflected XSS aras\u0131ndak\u0131 f\u0259rq n\u0259dir?Cavab: Stored XSS attacks - Enjekte edilmi\u015f skriptl\u0259rin h\u0259d\u0259f serverl\u0259rd\u0259 qal\u0131c\u0131 olaraq saxland\u0131\u011f\u0131 h\u00fccumlara deyilir. Bununla birlikd\u0259 qurban saxlan\u0131lan m\u0259lumatlar\u0131 h\u0259r d\u0259f\u0259 t\u0259l\u0259b etdikd\u0259 z\u0259r\u0259rli script yenid\u0259n i\u015f\u0259 d\u00fc\u015f\u00fcr.Reflected XSS Attacks \u2013 Stored XSS-d\u0259n f\u0259rqli olaraq bu tip XSS serverd\u0259 qal\u0131c\u0131 olaraq qalm\u0131r v\u0259 bir anl\u0131q ba\u015f verir v\u0259 bitir.37. \u015e\u0259xsiyy\u0259t o\u011furlu\u011funun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?\u00a0 \u00a0 \u00a0 \u00a0\u00a0\u00b7\u00a0 \u00a0 \u00a0 \u015e\u0259xsi qeydl\u0259rinizi qoruyun.\u00b7\u00a0 \u00a0 \u00a0 M\u0259xfi m\u0259lumatlar\u0131n onlayn payla\u015f\u0131lmas\u0131ndan \u00e7\u0259kinin.\u00b7\u00a0 \u00a0 \u00a0 G\u00fccl\u00fc parollardan istifad\u0259 edin v\u0259 onlar\u0131 m\u00fcnt\u0259z\u0259m olaraq d\u0259yi\u015fdirin.\u00b7\u00a0 \u00a0 \u00a0 Etibars\u0131z saytlarda bank m\u0259lumatlar\u0131n\u0131z\u0131 t\u0259qdim etm\u0259yin.\u00b7\u00a0 \u00a0 \u00a0 \u0130l\u0259ri s\u0259viyy\u0259 firewall v\u0259 spyware al\u0259tl\u0259ri vasit\u0259l\u0259ri il\u0259 sisteminizi qoruyun.\u00b7\u00a0 \u00a0 \u00a0 Brauzerl\u0259rinizi, sisteminizi v\u0259 proqram t\u0259minat\u0131n\u0131z\u0131 \u0259n son versiyada tutun.38. LAN daxilind\u0259 port bloklanmas\u0131 n\u0259dir?\u00a0 \u00a0Cavab: Bu, istifad\u0259\u00e7il\u0259rin yerli \u015f\u0259b\u0259k\u0259 daxilind\u0259 bir s\u0131ra xidm\u0259tl\u0259r\u0259 daxil olmas\u0131n\u0131 m\u0259hdudla\u015fd\u0131rma\u011fa k\u00f6m\u0259k edir. \u018fsas m\u0259qs\u0259d m\u0259nb\u0259nin portlar vasit\u0259sil\u0259 t\u0259yinat adresin\u0259 \u00e7\u0131x\u0131\u015f t\u0259min etm\u0259sini dayand\u0131rmaqd\u0131r. B\u00fct\u00fcn proqramlar portlarda i\u015fl\u0259diyi \u00fc\u00e7\u00fcn icaz\u0259siz giri\u015fi m\u0259hdudla\u015fd\u0131rmaq \u00fc\u00e7\u00fcn portlar\u0131 bloklamaq laz\u0131md\u0131r ki, bu da \u015f\u0259b\u0259k\u0259 infrastrukturunda t\u0259hl\u00fck\u0259sizlik z\u0259ifliyini poza bil\u0259r.41. Veril\u0259nl\u0259r bazas\u0131ndan \u00e7\u0131xar\u0131lan a\u015fa\u011f\u0131dak\u0131 parollar\u0131n siyah\u0131s\u0131na bax\u0131n:\u00a0\u00a0A. Password1B. @#$)*&amp;^%C. UcSc4Evr!D. akHGksmLNCavab:A\u015fa\u011f\u0131dak\u0131 parollardan hans\u0131 UCSC-nin parol t\u0259l\u0259bl\u0259rin\u0259 cavab verir? Cavab UcSc4Evr! Bu, a\u015fa\u011f\u0131dak\u0131 UCSC t\u0259l\u0259bl\u0259rinin ham\u0131s\u0131na cavab ver\u0259n yegan\u0259 se\u00e7imdir:42. Kiber h\u00fccum\u00e7ular\u0131n n\u00f6vl\u0259rini sadalay\u0131nD\u00f6rd n\u00f6v kiber h\u00fccum\u00e7u var.43.SRM dey\u0259rk\u0259n n\u0259yi n\u0259z\u0259rd\u0259 tutursunuz?Cavab: SRM T\u0259hl\u00fck\u0259sizlik Referans Monitoru m\u0259nas\u0131n\u0131 verir, komp\u00fcter s\u00fcr\u00fcc\u00fcl\u0259rin\u0259 obyekt\u0259 giri\u015f h\u00fcquqlar\u0131n\u0131 verm\u0259k \u00fc\u00e7\u00fcn rutinl\u0259r t\u0259qdim edir.56.Komp\u00fcter virusu n\u0259dir?Cavab:Virus istifad\u0259\u00e7inin raz\u0131l\u0131\u011f\u0131 olmadan h\u0259yata ke\u00e7iril\u0259n z\u0259r\u0259rli proqramd\u0131r. Viruslar CPU vaxt\u0131 v\u0259 yadda\u015f kimi komp\u00fcter resurslar\u0131n\u0131 istehlak ed\u0259 bil\u0259r. B\u0259z\u0259n virus dig\u0259r komp\u00fcter proqramlar\u0131nda d\u0259yi\u015fiklikl\u0259r edir v\u0259 komp\u00fcter sistemin\u0259 z\u0259r\u0259r verm\u0259k \u00fc\u00e7\u00fcn \u00f6z kodunu daxil edir.Komp\u00fcter virusu a\u015fa\u011f\u0131dak\u0131lar \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r:\u0130stifad\u0259\u00e7i id v\u0259 parol kimi \u015f\u0259xsi m\u0259lumatlara daxil olun\u0130stifad\u0259\u00e7iy\u0259 bezdirici mesajlar g\u00f6st\u0259rinKomp\u00fcterinizd\u0259ki m\u0259lumatlar\u0131n z\u0259d\u0259l\u0259nm\u0259si\u0130stifad\u0259\u00e7inin d\u00fcym\u0259 vuru\u015flar\u0131n\u0131 qeyd edinARP poisoning n\u0259dir?Cavab:\u00a0Address Resolution Protocol z\u0259h\u0259rl\u0259nm\u0259si IP \u00fcnvan\u0131n\u0131n \u015f\u0259b\u0259k\u0259 cihaz\u0131nda fiziki \u00fcnvana \u00e7evrildiyi bir h\u00fccum n\u00f6v\u00fcd\u00fcr. Ev sahibi ARP yay\u0131m\u0131 g\u00f6nd\u0259r\u0259c\u0259k v\u0259 b\u00fct\u00fcn q\u0259buledicil\u0259r fiziki \u00fcnvanlar\u0131 il\u0259 cavab ver\u0259c\u0259kl\u0259r. Ba\u015fqa s\u00f6zl\u0259 des\u0259k, ARP z\u0259h\u0259rl\u0259nm\u0259si, \u015f\u0259b\u0259k\u0259y\u0259 qo\u015fulmu\u015f komp\u00fcterin \u0130P \u00fcnvan\u0131 il\u0259 saxta \u00fcnvanlar\u0131 \u0259laq\u0259l\u0259ndirm\u0259k v\u0259 trafiki qa\u00e7\u0131rmaq \u00fc\u00e7\u00fcn ke\u00e7id\u0259 saxta \u00fcnvanlar g\u00f6nd\u0259rilm\u0259sinin ad\u0131d\u0131r.Bunlar:1) kibercinay\u0259tkarlar2) hacktivistl\u0259r3) daxili t\u0259hdidl\u0259r(\u0130nsider threats\u0259)4) d\u00f6vl\u0259t t\u0259r\u0259find\u0259n d\u0259st\u0259kl\u0259n\u0259n h\u00fccum\u00e7ular(State sponsored).45. \u018fl\u00e7atan olan Hacker Al\u0259tl\u0259ri\u00a0 \u00a0 \u00a0 \u00a0 \u00a0A\u015fa\u011f\u0131da faydal\u0131 hack al\u0259tl\u0259rinin siyah\u0131s\u0131 verilmi\u015fdir.AcunetixWebInspectProbablyNetsparkerAngry IP scanner:Burp SuiteSavvius49.Situasiya #1Cavab:Bank hesab\u0131n\u0131zla ba\u011fl\u0131 probleml\u0259 \u00fczl\u0259\u015fdiyini bildir\u0259n e-po\u00e7t m\u0259ktubu g\u00f6nd\u0259rir. E-po\u00e7t t\u0259limatlar v\u0259 h\u0259m\u00e7inin hesaba daxil olmaq \u00fc\u00e7\u00fcn ke\u00e7idl\u0259 t\u0259min edilir ki, siz onu d\u00fcz\u0259ld\u0259 bil\u0259siniz. Yuxar\u0131dak\u0131 v\u0259ziyy\u0259td\u0259n n\u0259 n\u0259tic\u0259 \u00e7\u0131xar\u0131rs\u0131n\u0131z? izah edin.Bu, ist\u0259nm\u0259y\u0259n e-po\u00e7t kimi g\u00f6r\u00fcn\u00fcr. Siz onu spam kimi bildirm\u0259li v\u0259 e-po\u00e7tu d\u0259rhal istifad\u0259 etdiyiniz m\u00fcvafiq veb m\u00fc\u015ft\u0259rid\u0259 (Yahoo Mail, Gmail v\u0259 s.) zibil qutusuna k\u00f6\u00e7\u00fcrm\u0259lisiniz. Bankla ba\u011fl\u0131 h\u0259r hans\u0131 etimadnam\u0259sini onlayn t\u0259qdim etm\u0259zd\u0259n \u0259vv\u0259l, mesaj\u0131n qanuni olub-olmad\u0131\u011f\u0131n\u0131 v\u0259 bankdan oldu\u011funu yoxlamaq \u00fc\u00e7\u00fcn banka z\u0259ng etm\u0259lisiniz.50. Simmetrik \u015fifr\u0259l\u0259m\u0259 alqoritmin\u0259 b\u0259zi n\u00fcmun\u0259l\u0259r verin.A\u015fa\u011f\u0131da simmetrik \u015fifr\u0259l\u0259m\u0259 alqoritminin b\u0259zi n\u00fcmun\u0259l\u0259ri verilmi\u015fdir.RCxBlowfishRijndael (AES)DES51. ECB v\u0259 CBC-nin abreviaturas\u0131 n\u0259dir?Cavab:ECB-nin tam formas\u0131 Elektron Kod Kitab\u0131d\u0131r v\u0259 CBC-nin tam formas\u0131 Cipher Block Chaining-dir.52.Casus proqram\u0131 m\u00fc\u0259yy\u0259nl\u0259\u015fdirin.Cavab:Casus proqram t\u0259\u015fkilat v\u0259 ya \u015f\u0259xs haqq\u0131nda m\u0259lumatlar\u0131 o\u011furlamaq m\u0259qs\u0259di da\u015f\u0131yan z\u0259r\u0259rli proqramd\u0131r. Bu z\u0259r\u0259rli proqram t\u0259\u015fkilat\u0131n komp\u00fcter sistemin\u0259 z\u0259r\u0259r ver\u0259 bil\u0259r.53. ARP poisoning n\u0259dir?Cavab:Address Resolution Protocol z\u0259h\u0259rl\u0259nm\u0259si IP \u00fcnvan\u0131n\u0131n \u015f\u0259b\u0259k\u0259 cihaz\u0131nda fiziki \u00fcnvana \u00e7evrildiyi bir h\u00fccum n\u00f6v\u00fcd\u00fcr. Ev sahibi ARP yay\u0131m\u0131 g\u00f6nd\u0259r\u0259c\u0259k v\u0259 b\u00fct\u00fcn q\u0259buledicil\u0259r fiziki \u00fcnvanlar\u0131 il\u0259 cavab ver\u0259c\u0259kl\u0259r. Ba\u015fqa s\u00f6zl\u0259 des\u0259k, ARP z\u0259h\u0259rl\u0259nm\u0259si, \u015f\u0259b\u0259k\u0259y\u0259 qo\u015fulmu\u015f komp\u00fcterin \u0130P \u00fcnvan\u0131 il\u0259 saxta \u00fcnvanlar\u0131 \u0259laq\u0259l\u0259ndirm\u0259k v\u0259 trafiki qa\u00e7\u0131rmaq \u00fc\u00e7\u00fcn ke\u00e7id\u0259 saxta \u00fcnvanlar g\u00f6nd\u0259rilm\u0259sinin ad\u0131d\u0131r.54. Fiziki olmayan t\u0259hdidl\u0259rin \u00fcmumi n\u00f6vl\u0259rini s\u0131ralay\u0131n:TrojansAdwareWormsSpywareDoS AttackDistributed DoS AttacksVirusKey loggersPhishingKomp\u00fcter sisteml\u0259rinin resurslar\u0131na icaz\u0259siz giri\u015f55.Nmap n\u0259dir?Cavab: Nmap b\u00fct\u00fcn qo\u015fulmu\u015f cihazlar\u0131 m\u00fc\u0259yy\u0259n etm\u0259k v\u0259 i\u015fl\u0259tdikl\u0259ri \u0259m\u0259liyyat sisteml\u0259ri haqq\u0131nda m\u0259lumat \u00e7atd\u0131rmaq \u00fc\u00e7\u00fcn IP paketl\u0259rind\u0259n istifad\u0259 ed\u0259n \u015f\u0259b\u0259k\u0259 skan al\u0259tidir.56.Sistem \u0259sasl\u0131 h\u00fccumlar\u0131n b\u0259zi n\u00fcmun\u0259l\u0259riVirusBackdoorsBotsWorm57.Veb serverin t\u0259hl\u00fck\u0259sizliyini t\u0259min etm\u0259k \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar at\u0131lmal\u0131d\u0131r?Cavab:Update the ownership of the fileKeep your webserver up-to-dateDisable all extra modulesDelete default scriptsM\u00fc\u0259llif:\u00a0Orkhan Jalalov\" \/>\n<meta property=\"og:url\" content=\"https:\/\/yusif.az\/main\/?p=6777\" \/>\n<meta property=\"og:site_name\" content=\"www.YUSIF.az\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-02T07:27:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-02T07:32:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/yusif.az\/main\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-02-112002.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1496\" \/>\n\t<meta property=\"og:image:height\" content=\"549\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"auto61\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"auto61\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/yusif.az\\\/main\\\/?p=6777#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/yusif.az\\\/main\\\/?p=6777\"},\"author\":{\"name\":\"auto61\",\"@id\":\"https:\\\/\\\/yusif.az\\\/main\\\/#\\\/schema\\\/person\\\/904da2c1a1bbe7e501df95c2bc38d146\"},\"headline\":\"Kibert\u0259hl\u00fck\u0259sizlik sah\u0259sind\u0259 veril\u0259n interv\u00fc suallar\u0131\",\"datePublished\":\"2024-10-02T07:27:30+00:00\",\"dateModified\":\"2024-10-02T07:32:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/yusif.az\\\/main\\\/?p=6777\"},\"wordCount\":5069,\"publisher\":{\"@id\":\"https:\\\/\\\/yusif.az\\\/main\\\/#\\\/schema\\\/person\\\/904da2c1a1bbe7e501df95c2bc38d146\"},\"image\":{\"@id\":\"https:\\\/\\\/yusif.az\\\/main\\\/?p=6777#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/yusif.az\\\/main\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Screenshot-2024-10-02-112002.png\",\"articleSection\":[\"IT B\u00d6LM\u018fS\u0130\",\"M\u00dcXT\u018fL\u0130F \\\/ \u0130NFORMAT\u0130KA\"],\"inLanguage\":\"az\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/yusif.az\\\/main\\\/?p=6777\",\"url\":\"https:\\\/\\\/yusif.az\\\/main\\\/?p=6777\",\"name\":\"Kibert\u0259hl\u00fck\u0259sizlik sah\u0259sind\u0259 veril\u0259n interv\u00fc suallar\u0131 - www.YUSIF.az IT B\u00d6LM\u018fS\u0130\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/yusif.az\\\/main\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/yusif.az\\\/main\\\/?p=6777#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/yusif.az\\\/main\\\/?p=6777#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/yusif.az\\\/main\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Screenshot-2024-10-02-112002.png\",\"datePublished\":\"2024-10-02T07:27:30+00:00\",\"dateModified\":\"2024-10-02T07:32:23+00:00\",\"description\":\"A\u015fa\u011f\u0131da b\u0259zi tipik interv\u00fc suallar\u0131 t\u0259qdim edir\u0259m, h\u0259m\u00e7inin suallar\u0131n cavablar\u0131 il\u0259 ba\u011fl\u0131 q\u0131sa izahlar da \u0259lav\u0259 edir\u0259m:1. Kriptoqrafiya n\u0259dir?Cavab: Kriptoqrafiya m\u0259lumat\u0131n icaz\u0259 verilm\u0259diyi \u00fc\u00e7\u00fcnc\u00fc t\u0259r\u0259fl\u0259rd\u0259n m\u0259lumat\u0131 qorumaq \u00fc\u00e7\u00fcn m\u0259xfi m\u0259lumatlar\u0131 kodla\u015fd\u0131r\u0131lm\u0131\u015f \u015f\u0259kild\u0259 \u00e7evirm\u0259k v\u0259 \u00f6t\u00fcrm\u0259k \u00fcsuludur.3. IDS v\u0259 IPS aras\u0131ndak\u0131 f\u0259rq n\u0259dir?Cavab: IDS Intrusion Detection System\u2019dir v\u0259 o, yaln\u0131z m\u00fcdaxil\u0259l\u0259ri a\u015fkarlay\u0131r v\u0259 administrator is\u0259 m\u00fcdaxil\u0259nin qar\u015f\u0131s\u0131n\u0131 almal\u0131d\u0131r.Halbuki, IPS y\u0259ni Intrusion Prevention System-d\u0259 sistem m\u00fcdaxil\u0259ni a\u015fkarlay\u0131r v\u0259 h\u0259m\u00e7inin m\u00fcdaxil\u0259nin qar\u015f\u0131s\u0131n\u0131 almaq \u00fc\u00e7\u00fcn t\u0259dbirl\u0259r g\u00f6r\u00fcr.4. CIA \u00fc\u00e7buca\u011f\u0131n\u0131 a\u00e7\u0131qlay\u0131nCavab: CIA-\u0131n a\u00e7\u0131l\u0131\u015f\u0131 Confidentiality(Konfidensiall\u0131q), Integrity(taml\u0131q) v\u0259 Availability(\u0259l\u00e7atanl\u0131q)-d\u0131r. CIA \u0130nformasiya T\u0259hl\u00fck\u0259sizliyi siyas\u0259tl\u0259rin\u0259 r\u0259hb\u0259rlik etm\u0259k \u00fc\u00e7\u00fcn haz\u0131rlanm\u0131\u015f modeldir. Bu, t\u0259\u015fkilatlar t\u0259r\u0259find\u0259n istifad\u0259 edil\u0259n \u0259n m\u0259\u015fhur modell\u0259rd\u0259n biridir.Konfidensiall\u0131qM\u0259lumat yaln\u0131z s\u0259lahiyy\u0259tli i\u015f\u00e7il\u0259r \u00fc\u00e7\u00fcn \u0259l\u00e7atan v\u0259 oxuna bil\u0259n olmal\u0131d\u0131r. O, icaz\u0259siz i\u015f\u00e7il\u0259r t\u0259r\u0259find\u0259n \u0259l\u00e7atan olmamal\u0131d\u0131r. Kims\u0259 m\u0259lumatlara daxil olmaq \u00fc\u00e7\u00fcn hakerd\u0259n istifad\u0259 ed\u0259rs\u0259, m\u0259lumat g\u00fccl\u00fc \u015f\u0259kild\u0259 \u015fifr\u0259l\u0259nm\u0259lidir ki, m\u0259lumat \u0259ld\u0259 olunsa bel\u0259, oxunaq v\u0259 ya ba\u015fa d\u00fc\u015f\u00fcl\u0259n olmas\u0131n.Taml\u0131qM\u0259lumatlar\u0131n icaz\u0259si olmayan \u015f\u0259xsl\u0259r t\u0259r\u0259find\u0259n d\u0259yi\u015fdirilm\u0259diyind\u0259n \u0259min olmaq \u00fc\u00e7\u00fcnd\u00fcr. D\u00fcr\u00fcstl\u00fck m\u0259lumatlar\u0131n icaz\u0259si olmayan i\u015f\u00e7il\u0259r t\u0259r\u0259find\u0259n pozulmamas\u0131n\u0131 v\u0259 ya d\u0259yi\u015fdirilm\u0259m\u0259sini t\u0259min edir. S\u0259lahiyy\u0259tli \u015f\u0259xs\\\/sistem m\u0259lumatlar\u0131 d\u0259yi\u015fdirm\u0259y\u0259 \u00e7al\u0131\u015f\u0131rsa v\u0259 d\u0259yi\u015fiklik u\u011fursuz olarsa, m\u0259lumat geri qaytar\u0131lmal\u0131 v\u0259 z\u0259d\u0259l\u0259nm\u0259m\u0259lidir.\u018fl\u00e7atanl\u0131qM\u0259lumat istifad\u0259\u00e7i t\u0259l\u0259b etdiyi zaman istifad\u0259\u00e7i \u00fc\u00e7\u00fcn \u0259l\u00e7atan olmal\u0131d\u0131r. Avadanl\u0131\u011f\u0131n saxlanmas\u0131, m\u00fcnt\u0259z\u0259m olaraq t\u0259kmill\u0259\u015fdirilm\u0259si, M\u0259lumatlar\u0131n Yed\u0259kl\u0259nm\u0259si v\u0259 B\u0259rpas\u0131, \u015e\u0259b\u0259k\u0259 Darbo\u011fazlar\u0131na diqq\u0259t yetirilm\u0259lidir.5. \u015eifr\u0259l\u0259m\u0259 Hashing-d\u0259n n\u0259 il\u0259 f\u0259rql\u0259nir?\u00a0Cavab: H\u0259m \u015eifr\u0259l\u0259m\u0259, h\u0259m d\u0259 Hashing oxuna bil\u0259n m\u0259lumatlar\u0131 oxunmayan formata \u00e7evirm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunur. F\u0259rq ondad\u0131r ki, \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat \u015fifr\u0259nin a\u00e7\u0131lmas\u0131 prosesi il\u0259 yenid\u0259n orijinal m\u0259lumatlara \u00e7evril\u0259 bil\u0259r, lakin hash edilmi\u015f m\u0259lumatlar orijinal m\u0259lumatlara qaytar\u0131la bilm\u0259z6. Firewall n\u0259dir v\u0259 ondan n\u0259 \u00fc\u00e7\u00fcn istifad\u0259 olunur?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0Cavab:Firewall \u015f\u0259b\u0259k\u0259 trafikini izl\u0259y\u0259n v\u0259 idar\u0259 ed\u0259n sistem\\\/\u015f\u0259b\u0259k\u0259 s\u0259rh\u0259dl\u0259rind\u0259 qurulmu\u015f \u015f\u0259b\u0259k\u0259 t\u0259hl\u00fck\u0259sizlik sistemidir.Firewalllar \u0259sas\u0259n sistemi\\\/\u015f\u0259b\u0259k\u0259ni viruslar, qurdlar, z\u0259r\u0259rli proqramlar v\u0259 s.-d\u0259n qorumaq \u00fc\u00e7\u00fcn istifad\u0259 olunur. Firewalllar h\u0259m\u00e7inin uzaqdan giri\u015fin(Remote Access) v\u0259 m\u0259zmunun filtrl\u0259nm\u0259sinin qar\u015f\u0131s\u0131n\u0131 almaq \u00fc\u00e7\u00fcn d\u0259 ola bil\u0259r.7. VA (Z\u0259ifliyin Qiym\u0259tl\u0259ndirilm\u0259si) v\u0259 PT (Penetrasiya Testi) aras\u0131nda f\u0259rq n\u0259dir?Cavab:Vulnerability Assessment qar\u015f\u0131 sistemd\u0259 q\u00fcsurlar\u0131n tap\u0131lmas\u0131 prosesidir. T\u0259\u015fkilatlar sisteml\u0259rinin\\\/\u015f\u0259b\u0259k\u0259l\u0259rinin q\u00fcsurlar\u0131 v\u0259 ya z\u0259if t\u0259r\u0259fl\u0259ri oldu\u011funu bilir v\u0259 bu q\u00fcsurlar\u0131 tapmaq v\u0259 d\u00fcz\u0259ltm\u0259k \u00fc\u00e7\u00fcn q\u00fcsurlar\u0131 prioritetl\u0259\u015fdirm\u0259k ist\u0259yir.Penetration Testing h\u0259d\u0259fd\u0259 z\u0259iflikl\u0259rin tap\u0131lmas\u0131 prosesidir. T\u0259\u015fkilatlar d\u00fc\u015f\u00fcn\u0259 bil\u0259c\u0259kl\u0259ri b\u00fct\u00fcn t\u0259hl\u00fck\u0259sizlik t\u0259dbirl\u0259rini qurublar.Onlar\u0131n sistemini\\\/\u015f\u0259b\u0259k\u0259sini s\u0131nd\u0131rmaq \u00fc\u00e7\u00fcn ba\u015fqa yol olub-olmad\u0131\u011f\u0131n\u0131 bilm\u0259k v\u0259 yoxlamaq \u00fc\u00e7\u00fcn bu xidm\u0259td\u0259n istifad\u0259 edirl\u0259r.8.\u00dc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma n\u0259dir?Cavab:\u00a0\u00dc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma, host v\u0259 m\u00fc\u015ft\u0259ri aras\u0131nda \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn TCP\\\/IP \u015f\u0259b\u0259k\u0259sind\u0259 istifad\u0259 edil\u0259n \u00fcsuldur. Bu, \u00fc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma adlan\u0131r, \u00e7\u00fcnki bu, m\u00fc\u015ft\u0259ri v\u0259 serverin paket m\u00fcbadil\u0259si apard\u0131\u011f\u0131 \u00fc\u00e7 add\u0131ml\u0131 bir \u00fcsuldur. \u00dc\u00e7 add\u0131m a\u015fa\u011f\u0131dak\u0131lard\u0131r:1.\u00a0 \u00a0M\u00fc\u015ft\u0259ri server\u0259 SYN (Sinxronizasiya) paketini g\u00f6nd\u0259rir, serverin i\u015fl\u0259k v\u0259ziyy\u0259td\u0259 olub olmad\u0131\u011f\u0131n\u0131 v\u0259 ya a\u00e7\u0131q portlar\u0131n olub olmad\u0131\u011f\u0131n\u0131 yoxlay\u0131r.2.\u00a0 \u00a0Server a\u00e7\u0131q portlar\u0131 varsa, m\u00fc\u015ft\u0259riy\u0259 SYN-ACK paketini g\u00f6nd\u0259rir3.\u00a0 \u00a0M\u00fc\u015ft\u0259ri bunu q\u0259bul edir v\u0259 server\u0259 ACK (T\u0259qdimat) paketi g\u00f6nd\u0259rir.9. Veb T\u0259tbiqind\u0259n al\u0131na bil\u0259n cavab kodlar\u0131 hans\u0131lard\u0131r?Cavab:\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a01xx \u2013 M\u0259lumat xarakterli cavablar(Informational responses)2xx \u2013 U\u011fur(Success)3xx \u2013 Yenid\u0259n y\u00f6nl\u0259ndirm\u0259(Redirection)4xx \u2013 M\u00fc\u015ft\u0259ri t\u0259r\u0259f x\u0259tas\u0131(Client-side error)5xx \u2013 Server t\u0259r\u0259f x\u0259tas\u0131(Server-side error)10. Traceroute n\u0259dir?Cavab:\u00a0Traceroute paketin yolunu g\u00f6st\u0259r\u0259n bir vasit\u0259dir. O, paketin ke\u00e7diyi b\u00fct\u00fcn n\u00f6qt\u0259l\u0259ri (\u0259sas\u0259n mar\u015frutla\u015fd\u0131r\u0131c\u0131lar) sadalay\u0131r. Bu, \u0259sas\u0259n paket t\u0259yinat yerin\u0259 \u00e7atmad\u0131qda istifad\u0259 olunur. Traceroute, nasazl\u0131q n\u00f6qt\u0259sini m\u00fc\u0259yy\u0259n etm\u0259k \u00fc\u00e7\u00fcn \u0259laq\u0259nin harada dayand\u0131\u011f\u0131n\u0131 v\u0259 ya pozuldu\u011funu yoxlamaq \u00fc\u00e7\u00fcn istifad\u0259 olunur.11. Firewall qurmaq \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar var?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Cavab:1.\u00a0 \u00a0Username\\\/password: firewall cihaz\u0131 \u00fc\u00e7\u00fcn standart parolu d\u0259yi\u015fdirin2.\u00a0 \u00a0Remote administration: Uzaqdan idar\u0259etm\u0259 funksiyas\u0131n\u0131 s\u00f6nd\u00fcr\u00fcn3.\u00a0 \u00a0Port forwarding: Veb server v\u0259 ya FTP server kimi m\u00fc\u0259yy\u0259n proqramlar\u0131n d\u00fczg\u00fcn i\u015fl\u0259m\u0259si \u00fc\u00e7\u00fcn m\u00fcvafiq port y\u00f6nl\u0259ndirm\u0259sini konfiqurasiya edin4.\u00a0 \u00a0DHCP Server: Firewallun m\u00f6vcud DHCP serveri il\u0259 \u015f\u0259b\u0259k\u0259y\u0259 qura\u015fd\u0131r\u0131lmas\u0131, firewallun DHCP-si deaktiv edilm\u0259yinc\u0259 m\u00fcnaqi\u015f\u0259y\u0259 s\u0259b\u0259b olacaq.5.\u00a0 \u00a0Logging: Firewall probleml\u0259rini v\u0259 ya potensial h\u00fccumlar\u0131 aradan qald\u0131rmaq \u00fc\u00e7\u00fcn giri\u015fin aktiv oldu\u011fundan \u0259min olun v\u0259 log-lara nec\u0259 baxmaq laz\u0131m oldu\u011funu anlay\u0131n.6.\u00a0 \u00a0Policies: M\u00f6hk\u0259m t\u0259hl\u00fck\u0259sizlik siyas\u0259tl\u0259riniz olmal\u0131 v\u0259 Firewall-un h\u0259min siyas\u0259tl\u0259ri t\u0259tbiq etm\u0259k \u00fc\u00e7\u00fcn konfiqurasiya edildiyin\u0259 \u0259min olmal\u0131s\u0131n\u0131z.12. SSL \u015eifr\u0259l\u0259m\u0259sini izah edinCavab:\u00a0 \u00a0\u00a0SSL (Secure Sockets Layer) Veb Server v\u0259 Brauzer aras\u0131nda \u015fifr\u0259l\u0259nmi\u015f \u0259laq\u0259l\u0259r yaradan s\u0259naye standartl\u0131 t\u0259hl\u00fck\u0259sizlik texnologiyas\u0131d\u0131r. Bu, m\u0259lumatlar\u0131n m\u0259xfiliyini qorumaq v\u0259 onlayn \u0259m\u0259liyyatlarda m\u0259lumat\u0131 qorumaq \u00fc\u00e7\u00fcn istifad\u0259 olunur.SSL ba\u011flant\u0131s\u0131 qurmaq \u00fc\u00e7\u00fcn add\u0131mlar a\u015fa\u011f\u0131dak\u0131 kimidir:1.\u00a0 \u00a0Brauzer SSL il\u0259 qorunan veb server\u0259 qo\u015fulma\u011fa \u00e7al\u0131\u015f\u0131r2.\u00a0 \u00a0Brauzer SSL sertifikat\u0131n\u0131n sur\u0259tini brauzer\u0259 g\u00f6nd\u0259rir3.\u00a0 \u00a0Brauzer SSL sertifikat\u0131n\u0131n etibarl\u0131 olub olmad\u0131\u011f\u0131n\u0131 yoxlay\u0131r. Etibarl\u0131d\u0131rsa, o zaman brauzer veb server\u0259 \u015fifr\u0259li \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn mesaj g\u00f6nd\u0259rir4.\u00a0 \u00a0Veb server SSL \u015fifr\u0259li ba\u011flant\u0131ya ba\u015flamaq \u00fc\u00e7\u00fcn t\u0259sdiq g\u00f6nd\u0259rir5. SSL \u015fifr\u0259li \u0259lqa\u0259 brauzer v\u0259 veb server aras\u0131nda ba\u015f verir13. Serverin t\u0259hl\u00fck\u0259sizliyini t\u0259min etm\u0259k \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar\u0131 atacaqs\u0131n\u0131z?Cavab:\u00a0 \u00a0 \u00a0T\u0259hl\u00fck\u0259siz serverl\u0259r m\u0259lumatlar\u0131 icaz\u0259siz \u0259l\u0259 ke\u00e7irm\u0259kd\u0259n qorumaq \u00fc\u00e7\u00fcn m\u0259lumatlar\u0131n \u015fifr\u0259l\u0259nm\u0259si v\u0259 \u015fifr\u0259sinin a\u00e7\u0131lmas\u0131 \u00fc\u00e7\u00fcn Secure Sockets Layer (SSL) protokolundan istifad\u0259 edir.Serveri qorumaq \u00fc\u00e7\u00fcn d\u00f6rd sad\u0259 yol var:Add\u0131m 1: Root v\u0259 administrator istifad\u0259\u00e7il\u0259riniz \u00fc\u00e7\u00fcn t\u0259hl\u00fck\u0259siz parolunuz oldu\u011fundan \u0259min olunAdd\u0131m 2: Sizin etm\u0259li oldu\u011funuz n\u00f6vb\u0259ti \u015fey sisteminizd\u0259 yeni istifad\u0259\u00e7il\u0259r yaratmaqd\u0131r. Bunlar sistemi idar\u0259 etm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 etdiyiniz istifad\u0259\u00e7il\u0259r olacaqAdd\u0131m 3: default root\\\/administrator hesablar\u0131ndan uzaqdan giri\u015fi silinAdd\u0131m 4: N\u00f6vb\u0259ti add\u0131m uzaqdan giri\u015f \u00fc\u00e7\u00fcn Firewall qaydalar\u0131n\u0131z\u0131 konfiqurasiya etm\u0259kdir14. M\u0259lumat s\u0131zmas\u0131n\u0131(Data Leakage) izah edinCvaab: M\u0259lumat s\u0131zmas\u0131 m\u0259lumatlar\u0131n t\u0259\u015fkilat daxilind\u0259n icaz\u0259siz k\u0259nar t\u0259yinat yerin\u0259 q\u0259sd\u0259n v\u0259 ya ist\u0259m\u0259d\u0259n \u00f6t\u00fcr\u00fclm\u0259sidir. Bu, m\u0259xfi m\u0259lumat\u0131n icaz\u0259siz quruma a\u00e7\u0131qlanmas\u0131d\u0131r.M\u0259lumat s\u0131zmas\u0131 nec\u0259 ba\u015f verdiyin\u0259 g\u00f6r\u0259 3 kateqoriyaya b\u00f6l\u00fcn\u0259 bil\u0259r:1. T\u0259sad\u00fcfi pozulma: M\u00fc\u0259ssis\u0259 s\u0259hv v\u0259 ya kobud n\u00f6qteyi-n\u0259z\u0259rd\u0259n icaz\u0259siz \u015f\u0259xs\u0259 m\u0259lumat g\u00f6nd\u0259rir2. Q\u0259sd\u0259n pozma: S\u0259lahiyy\u0259tli qurum m\u0259qs\u0259dli \u015f\u0259kild\u0259 icaz\u0259siz quruma m\u0259lumatlar\u0131 g\u00f6nd\u0259rir3. Sistem Hack: Hacking \u00fcsullar\u0131 m\u0259lumat s\u0131zmas\u0131na s\u0259b\u0259b olmaq \u00fc\u00e7\u00fcn istifad\u0259 olunurDLP (Data Leakage Prevention) Al\u0259tl\u0259ri kimi tan\u0131nan al\u0259tl\u0259r, proqram t\u0259minat\u0131 v\u0259 strategiyalardan istifad\u0259 etm\u0259kl\u0259 m\u0259lumat s\u0131zmas\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 almaq olar.15. \u00dcmumi kiberh\u00fccumlardan b\u0259zil\u0259ri hans\u0131lard\u0131r?Cavab: A\u015fa\u011f\u0131da sisteminiz\u0259 m\u0259nfi t\u0259sir g\u00f6st\u0259r\u0259 bil\u0259c\u0259k b\u0259zi \u00fcmumi kiberh\u00fccumlar verilmi\u015fdir.MalwarePhishingPassword AttacksDDoSMan in the MiddleDrive-By DownloadsMalvertisingRogue Software16. Port Scanning n\u0259dir?\u00a0 \u00a0Cavab: Port Skanlama, hostda m\u00f6vcud olan a\u00e7\u0131q portlar\u0131 v\u0259 xidm\u0259ti m\u00fc\u0259yy\u0259n etm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259n texnikad\u0131r. Hakerl\u0259r z\u0259iflikl\u0259rd\u0259n istifad\u0259 etm\u0259k \u00fc\u00e7\u00fcn faydal\u0131 ola bil\u0259c\u0259k m\u0259lumatlar\u0131 tapmaq \u00fc\u00e7\u00fcn port skan\u0131ndan istifad\u0259 edirl\u0259r.\u0130dar\u0259\u00e7il\u0259r \u015f\u0259b\u0259k\u0259nin t\u0259hl\u00fck\u0259sizlik siyas\u0259tl\u0259rini yoxlamaq \u00fc\u00e7\u00fcn Port Skanlamas\u0131ndan istifad\u0259 edirl\u0259r.\u00dcmumi Port Skanlama Texnikalar\u0131ndan b\u0259zil\u0259ri bunlard\u0131r:Ping ScanTCP Half-OpenTCP ConnectUDPStealth Scanning17. Brute Force Attack n\u0259dir? Bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 ala bil\u0259rsiniz?\u00a0 \u00a0Cavab: Brute Force, m\u00fcmk\u00fcn etimadnam\u0259l\u0259rin b\u00fct\u00fcn d\u0259yi\u015fm\u0259l\u0259rini v\u0259 kombinasiyalar\u0131n\u0131 t\u0259krar-t\u0259krar s\u0131namaqla d\u00fczg\u00fcn etimadnam\u0259l\u0259ri tapmaq \u00fcsuludur.\u018fks\u0259r hallarda Brute Force h\u00fccumlar\u0131 avtomatla\u015fd\u0131r\u0131l\u0131r, burada al\u0259t\\\/proqram avtomatik olaraq etimadnam\u0259l\u0259r siyah\u0131s\u0131 il\u0259 daxil olma\u011fa \u00e7al\u0131\u015f\u0131r. Brute Force h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 alma\u011f\u0131n m\u00fcxt\u0259lif yollar\u0131 var.Onlardan b\u0259zil\u0259ri bunlard\u0131r:Parolun uzunlu\u011fu: Siz parol \u00fc\u00e7\u00fcn minimum uzunluq t\u0259yin ed\u0259 bil\u0259rsiniz. \u015eifr\u0259 n\u0259 q\u0259d\u0259r uzun olsa, onu tapmaq bir o q\u0259d\u0259r \u00e7\u0259tindir.\u015eifr\u0259 M\u00fcr\u0259kk\u0259bliyi: Parolda simvollar\u0131n m\u00fcxt\u0259lif formatlar\u0131n\u0131n daxil edilm\u0259si kobud g\u00fcc h\u00fccumlar\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir. X\u00fcsusi simvollar v\u0259 b\u00f6y\u00fck v\u0259 ki\u00e7ik h\u0259rfl\u0259rl\u0259 birlikd\u0259 alfa-r\u0259q\u0259m parollar\u0131ndan istifad\u0259 parol m\u00fcr\u0259kk\u0259bliyini art\u0131r\u0131r v\u0259 s\u0131nd\u0131r\u0131lmas\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir.Giri\u015f c\u0259hdl\u0259rinin m\u0259hdudla\u015fd\u0131r\u0131lmas\u0131: Giri\u015f u\u011fursuzluqlar\u0131na limit t\u0259yin edin. M\u0259s\u0259l\u0259n, giri\u015f x\u0259talar\u0131 \u00fc\u00e7\u00fcn limiti 3 kimi t\u0259yin ed\u0259 bil\u0259rsiniz. Bel\u0259likl\u0259, ard\u0131c\u0131l 3 giri\u015f u\u011fursuzlu\u011fu olduqda, istifad\u0259\u00e7inin bir m\u00fcdd\u0259t daxil olmas\u0131n\u0131 m\u0259hdudla\u015fd\u0131r\u0131n v\u0259 ya n\u00f6vb\u0259ti d\u0259f\u0259 daxil olmas\u0131, istifad\u0259 etm\u0259si \u00fc\u00e7\u00fcn E-po\u00e7t v\u0259 ya OTP g\u00f6nd\u0259rin. Brute Force avtomatla\u015fd\u0131r\u0131lm\u0131\u015f proses oldu\u011fundan, giri\u015f c\u0259hdl\u0259rini m\u0259hdudla\u015fd\u0131rmaq Brute Force prosesini pozacaq.18. OSI modelinin m\u00fcxt\u0259lif t\u0259b\u0259q\u0259l\u0259ri hans\u0131lard\u0131r?\u00a0 \u00a0 \u00a0Cavab: OSI modeli, proqramlar\u0131n \u015f\u0259b\u0259k\u0259 \u00fcz\u0259rind\u0259n nec\u0259 \u0259laq\u0259 saxlayaca\u011f\u0131na dair \u0259laq\u0259li istinad modelidir. OSI referans\u0131n\u0131n m\u0259qs\u0259di r\u0259q\u0259msal kommunikasiya m\u0259hsullar\u0131 v\u0259 software proqramlar\u0131n\u0131n qar\u015f\u0131l\u0131ql\u0131 f\u0259aliyy\u0259t g\u00f6st\u0259r\u0259 bilm\u0259si \u00fc\u00e7\u00fcn sat\u0131c\u0131lara v\u0259 t\u0259rtibat\u00e7\u0131lara r\u0259hb\u0259rlik etm\u0259kdir.Fiziki s\u0259viyy\u0259(Physical): R\u0259q\u0259msal m\u0259lumatlar\u0131n rabit\u0259 vasit\u0259si il\u0259 g\u00f6nd\u0259ricid\u0259n al\u0131c\u0131ya \u00f6t\u00fcr\u00fclm\u0259sin\u0259 cavabdehdirData Link Layer: Veril\u0259nl\u0259rin fiziki ke\u00e7id\u0259 v\u0259 oradan h\u0259r\u0259k\u0259tini idar\u0259 edir. O, h\u0259m\u00e7inin m\u0259lumat bitl\u0259rinin kodla\u015fd\u0131r\u0131lmas\u0131 v\u0259 dekodlanmas\u0131na cavabdehdir.\u015e\u0259b\u0259k\u0259 s\u0259viyy\u0259si: Paketin y\u00f6nl\u0259ndirilm\u0259si v\u0259 \u015f\u0259b\u0259k\u0259 rabit\u0259si \u00fc\u00e7\u00fcn mar\u015frutla\u015fd\u0131rma yollar\u0131n\u0131n t\u0259min edilm\u0259sin\u0259 cavabdehdir.N\u0259qliyyat Layeri: \u015e\u0259b\u0259k\u0259 \u00fcz\u0259rind\u0259n end-to-end rabit\u0259y\u0259 cavabdehdir. O, m\u0259lumat\u0131 yuxar\u0131dak\u0131 t\u0259b\u0259q\u0259d\u0259n ay\u0131r\u0131r v\u0259 \u015e\u0259b\u0259k\u0259 Layerin\u0259 \u00f6t\u00fcr\u00fcr v\u0259 sonra b\u00fct\u00fcn m\u0259lumatlar\u0131n q\u0259buledicinin sonuna u\u011furla \u00e7atmas\u0131n\u0131 t\u0259min edir.Session Layer: G\u00f6nd\u0259r\u0259n v\u0259 q\u0259bul ed\u0259n aras\u0131nda \u0259laq\u0259ni idar\u0259 edir. O, sessiyan\u0131n ba\u015flamas\u0131, ba\u015fa \u00e7atmas\u0131 v\u0259 idar\u0259 edilm\u0259sin\u0259, g\u00f6nd\u0259rici il\u0259 q\u0259buledici aras\u0131nda qar\u015f\u0131l\u0131ql\u0131 \u0259laq\u0259nin qurulmas\u0131na, saxlanmas\u0131na v\u0259 sinxronla\u015fd\u0131r\u0131lmas\u0131na cavabdehdir.T\u0259qdimat Layeri: Bu, xam dataqramlar v\u0259 ya paketl\u0259r g\u00f6nd\u0259rm\u0259k \u0259v\u0259zin\u0259 veril\u0259nl\u0259rin d\u00fczg\u00fcn formatda v\u0259 m\u0259lumat strukturunda t\u0259qdim edilm\u0259si il\u0259 m\u0259\u015f\u011ful olur.T\u0259tbiq Layeri: T\u0259tbiq v\u0259 \u015f\u0259b\u0259k\u0259 aras\u0131nda interfeys t\u0259min edir. O, prosesd\u0259n proses\u0259 rabit\u0259y\u0259 diqq\u0259t yetirir v\u0259 \u00fcnsiyy\u0259t interfeysini t\u0259min edir.\u00a0 \u00a0\u00a019. VPN n\u0259dir?Cavab: Dem\u0259k olar ki, b\u00fct\u00fcn Kibert\u0259hl\u00fck\u0259sizlik M\u00fcsahib\u0259 Suallar\u0131na bu sual daxil edilir. VPN Virtual \u015e\u0259xsi \u015e\u0259b\u0259k\u0259 dem\u0259kdir. T\u0259hl\u00fck\u0259siz v\u0259 \u015fifr\u0259li \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn istifad\u0259 olunur. Bir VPN istifad\u0259 ed\u0259rk\u0259n, m\u00fc\u015ft\u0259rid\u0259n g\u0259l\u0259n m\u0259lumatlar VPN-d\u0259 \u015fifr\u0259l\u0259ndiyi bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir v\u0259 sonra internet vasit\u0259sil\u0259 ba\u015fqa bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir.Bu zaman veril\u0259nl\u0259rin \u015fifr\u0259si a\u00e7\u0131l\u0131r v\u0259 server\u0259 g\u00f6nd\u0259rilir. Server cavab g\u00f6nd\u0259rdikd\u0259, cavab VPN-in \u015fifr\u0259l\u0259ndiyi bir n\u00f6qt\u0259y\u0259 v\u0259 bu \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat VPN-in \u015fifr\u0259sinin a\u00e7\u0131ld\u0131\u011f\u0131 ba\u015fqa bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir. V\u0259 n\u0259hay\u0259t, \u015fifr\u0259si a\u00e7\u0131lm\u0131\u015f m\u0259lumatlar m\u00fc\u015ft\u0259riy\u0259 g\u00f6nd\u0259rilir. VPN-d\u0259n istifad\u0259 etm\u0259yin b\u00fct\u00fcn m\u0259qs\u0259di \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat \u00f6t\u00fcr\u00fclm\u0259sini t\u0259min etm\u0259kdir.20. \u015e\u0259b\u0259k\u0259d\u0259 Risk, Z\u0259iflik v\u0259 T\u0259hdid dedikd\u0259 n\u0259 ba\u015fa d\u00fc\u015f\u00fcrs\u00fcn\u00fcz?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Cvaab: T\u0259hdid: Sistem\u0259 v\u0259 ya t\u0259\u015fkilata z\u0259r\u0259r vurma potensial\u0131 olan kims\u0259Z\u0259iflik: Potensial haker t\u0259r\u0259find\u0259n istifad\u0259 edil\u0259 bil\u0259n sistemd\u0259ki z\u0259iflikRisk: T\u0259hl\u00fck\u0259li z\u0259iflikd\u0259n istifad\u0259 etdikd\u0259 itki v\u0259 ya z\u0259d\u0259l\u0259nm\u0259 potensial\u013121. Black Hat, White Hat v\u0259 Gray Hat hakerl\u0259ri n\u0259dir?\u00a0 \u00a0Cavab:Blach Hat hakerl\u0259r komp\u00fcter \u015f\u0259b\u0259k\u0259l\u0259rin\u0259 m\u00fcdaxil\u0259 haqq\u0131nda geni\u015f biliy\u0259 malik olmaqlar\u0131 il\u0259 tan\u0131n\u0131rlar. Onlar bu sisteml\u0259r\u0259 daxil olmaq \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259n z\u0259r\u0259rli proqramlar yaza bilirl\u0259r. Bu tip hakerl\u0259r m\u0259lumat o\u011furlamaq v\u0259 ya s\u0131nd\u0131r\u0131lm\u0131\u015f sistemd\u0259n z\u0259r\u0259rli m\u0259qs\u0259dl\u0259r \u00fc\u00e7\u00fcn \u00f6z bacar\u0131qlar\u0131ndan sui-istifad\u0259 edirl\u0259r.White Hat hakerl\u0259r \u00f6z s\u0259lahiyy\u0259tl\u0259rini yax\u015f\u0131 i\u015fl\u0259r \u00fc\u00e7\u00fcn istifad\u0259 edirl\u0259r v\u0259 buna g\u00f6r\u0259 d\u0259 onlara Etik Hakerl\u0259r deyilir. Onlar Black Hat hackerler il\u0259 eyni biliy\u0259 malik olurlar. Bunlar \u0259sas\u0259n \u015firk\u0259tl\u0259r t\u0259r\u0259find\u0259n sisteml\u0259rd\u0259 z\u0259iflikl\u0259ri v\u0259 t\u0259hl\u00fck\u0259sizlik bo\u015fluqlar\u0131n\u0131 tapma\u011fa v\u0259 d\u00fcz\u0259ltm\u0259y\u0259 \u00e7al\u0131\u015fan bir t\u0259hl\u00fck\u0259sizlik m\u00fct\u0259x\u0259ssisi kimi i\u015f\u0259 g\u00f6t\u00fcr\u00fcl\u00fcrl\u0259r. Onlar t\u0259hl\u00fck\u0259sizliyi yax\u015f\u0131la\u015fd\u0131rmaq \u00fc\u00e7\u00fcn \u00f6z bacar\u0131qlar\u0131ndan istifad\u0259 edirl\u0259r.Gray Hat hakerl\u0259r White v\u0259 Black Hat hakerinin birl\u0259\u015fm\u0259sidir. Sahibinin icaz\u0259si olmadan sistem z\u0259iflikl\u0259rini axtar\u0131rlar. H\u0259r hans\u0131 bir z\u0259iflik a\u015fkar ed\u0259rl\u0259rs\u0259, bu bar\u0259d\u0259 sahibin\u0259 m\u0259lumat verirl\u0259r. Black Hat hakerl\u0259rd\u0259n f\u0259rqli olaraq, onlar a\u015fkar edilmi\u015f z\u0259iflikl\u0259rd\u0259n istifad\u0259 etmirl\u0259r.22.XSS h\u00fccumunu izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?Cavab:XSS (Saytlararas\u0131 Skriptl\u0259m\u0259) hakerl\u0259r\u0259 veb s\u0259hif\u0259l\u0259r\u0259 z\u0259r\u0259rli client-side skriptl\u0259ri yeritm\u0259y\u0259 imkan ver\u0259n kiberh\u00fccumdur. XSS sessiyalar\u0131 v\u0259 kukil\u0259ri o\u011furlamaq, DOM-u d\u0259yi\u015fdirm\u0259k, remote code execution, serveri s\u0131nd\u0131rmaq v\u0259 s. \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r.XSS-in n\u00f6vl\u0259ri-\u00a0 \u00a0 \u00a0 \u00a0Reflected XSS-\u00a0 \u00a0 \u00a0 \u00a0Stored XSS-\u00a0 \u00a0 \u00a0 \u00a0DOM Based XSSA\u015fa\u011f\u0131dak\u0131 t\u0259cr\u00fcb\u0259l\u0259rd\u0259n istifad\u0259 etm\u0259kl\u0259 XSS h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:\u0130stifad\u0259\u00e7i daxiletm\u0259l\u0259rini t\u0259sdiql\u0259yin (Validate user inputs)\u00b7\u00a0 \u00a0 \u00a0 \u00a0\u0130stifad\u0259\u00e7i giri\u015fl\u0259rini t\u0259mizl\u0259yin (Sanitize user inputs)X\u00fcsusi simvollar\u0131 kodlay\u0131n(Encode special characters)Anti-XSS xidm\u0259tl\u0259rind\u0259n\\\/al\u0259tl\u0259rind\u0259n istifad\u0259 edin (Use Anti-XSS services\\\/tools)XSS HTML Filtrind\u0259n istifad\u0259 edin(Use XSS HTML Filter)24. Botnet n\u0259dir?Cavab: Botnet, h\u0259r bir cihaz\u0131n \u00fcz\u0259rind\u0259 bir v\u0259 ya daha \u00e7ox botun i\u015fl\u0259diyi internet\u0259 qo\u015fulmu\u015f bir s\u0131ra cihazlard\u0131r.Qur\u011fulardak\u0131 botlar v\u0259 z\u0259r\u0259rli skriptl\u0259r qurban\u0131 s\u0131nd\u0131rmaq \u00fc\u00e7\u00fcn istifad\u0259 olunurdu. Botnetl\u0259r m\u0259lumatlar\u0131 o\u011furlamaq, spam g\u00f6nd\u0259rm\u0259k v\u0259 DDOS h\u00fccumunu h\u0259yata ke\u00e7irm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r.25. SSL v\u0259 TLS-I a\u00e7\u0131qlay\u0131n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0Cavab: SSL g\u00f6nd\u0259r\u0259nin \u015f\u0259xsiyy\u0259tini yoxlamaq \u00fc\u00e7\u00fcn n\u0259z\u0259rd\u0259 tutulub, lakin o, bundan ba\u015fqa he\u00e7 n\u0259 axtarm\u0131r. SSL dan\u0131\u015fd\u0131\u011f\u0131n\u0131z insan\u0131 izl\u0259m\u0259y\u0259 k\u00f6m\u0259k ed\u0259 bil\u0259r, lakin bu da b\u0259z\u0259n aldad\u0131la bil\u0259r.TLS h\u0259m\u00e7inin SSL kimi eynil\u0259\u015fdirm\u0259 vasit\u0259sidir, lakin daha yax\u015f\u0131 t\u0259hl\u00fck\u0259sizlik x\u00fcsusiyy\u0259tl\u0259ri t\u0259klif edir. M\u0259lumatlara \u0259lav\u0259 qorunma t\u0259min edir v\u0259 buna g\u00f6r\u0259 d\u0259 SSL v\u0259 TLS daha yax\u015f\u0131 qorunmaq \u00fc\u00e7\u00fcn tez-tez birlikd\u0259 istifad\u0259 olunur.26. 2FA n\u0259dir v\u0259 ictimai vebsaytlar \u00fc\u00e7\u00fcn nec\u0259 t\u0259tbiq oluna bil\u0259r?\u00a0 \u00a0Cavab: \\\"\u00c7ox faktorlu autentifikasiya\\\" kimi tan\u0131nan \u0259lav\u0259 t\u0259hl\u00fck\u0259sizlik s\u0259viyy\u0259sidir.Yaln\u0131z parol v\u0259 istifad\u0259\u00e7i ad\u0131 deyil, h\u0259m d\u0259 yaln\u0131z v\u0259 yaln\u0131z h\u0259min istifad\u0259\u00e7inin onlarda olan bir \u015feyi, y\u0259ni ancaq onlar\u0131n bilm\u0259li olduqlar\u0131 v\u0259 ya d\u0259rhal \u0259ld\u0259 etm\u0259li oldu\u011fu bir m\u0259lumat\u0131, m\u0259s\u0259l\u0259n, fiziki token t\u0259l\u0259b edir.Authenticator proqramlar\u0131 m\u0259tn, s\u0259sli z\u0259ng v\u0259 ya e-po\u00e7t vasit\u0259sil\u0259 do\u011frulama kodu \u0259ld\u0259 etm\u0259k ehtiyac\u0131n\u0131 \u0259v\u0259z edir.Bu Proqramlara n\u00fcmun\u0259 kimi Google Authenticator v\u0259 Autify kimi proqramlar\u0131 g\u00f6st\u0259rm\u0259k olar.27. Fi\u015finqi izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?Cavab:Fi\u015finq kiberh\u00fccumdur ki, burada haker etibarl\u0131 \u015f\u0259xs v\u0259 ya biznes kimi maskalan\u0131r v\u0259 saxta e-po\u00e7t v\u0259 ya ani mesaj vasit\u0259sil\u0259 h\u0259ssas maliyy\u0259 v\u0259 ya \u015f\u0259xsi m\u0259lumatlar\u0131 o\u011furlama\u011fa \u00e7al\u0131\u015f\u0131rA\u015fa\u011f\u0131dak\u0131 \u00fcsullardan istifad\u0259 etm\u0259kl\u0259 fi\u015finq h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:\u00b7\u00a0 \u00a0 \u00a0 \u00a0Etibar etm\u0259diyiniz veb s\u0259hif\u0259l\u0259r\u0259 h\u0259ssas m\u0259lumatlar\u0131 daxil etm\u0259yin\u00b7\u00a0 \u00a0 \u00a0 \u00a0Sayt\u0131n t\u0259hl\u00fck\u0259sizliyini yoxlay\u0131n\u00b7\u00a0 \u00a0 \u00a0 \u00a0Firewall-lardan istifad\u0259 edin\u00b7\u00a0 \u00a0 \u00a0 \u00a0\u0130nternet T\u0259hl\u00fck\u0259sizliyi olan AntiVirus Proqram\u0131ndan istifad\u0259 edin\u00b7\u00a0 \u00a0 \u00a0 \u00a0Anti-Fi\u015finq Al\u0259tl\u0259r Panelind\u0259n istifad\u0259 edin28. SQL Enjeksiyonunu izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?Cavab: SQL Injection (SQLi) t\u0259cav\u00fczkar\u0131n veb t\u0259tbiqinin veril\u0259nl\u0259r bazas\u0131 serverin\u0259 n\u0259zar\u0259t etm\u0259k \u00fc\u00e7\u00fcn z\u0259r\u0259rli SQL sor\u011fular\u0131n\u0131 yerin\u0259 yetirm\u0259k \u00fc\u00e7\u00fcn server\u0259 g\u00f6nd\u0259ril\u0259n m\u0259lumatlar\u0131 manipulyasiya etdiyi, bununla da icaz\u0259siz m\u0259lumatlara daxil olmaq, d\u0259yi\u015fdirm\u0259k v\u0259 silm\u0259k \u00fc\u00e7\u00fcn kod yeritm\u0259 h\u00fccumudur. Bu h\u00fccum \u0259sas\u0259n veril\u0259nl\u0259r bazas\u0131 serverl\u0259rini \u0259l\u0259 ke\u00e7irm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunur.A\u015fa\u011f\u0131dak\u0131 t\u0259cr\u00fcb\u0259l\u0259rd\u0259n istifad\u0259 etm\u0259kl\u0259 SQL Injection h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:\u00b7\u00a0 \u00a0 \u00a0 \u00a0Haz\u0131rlanm\u0131\u015f ifad\u0259l\u0259ri daxil edin (parametrl\u0259\u015fdirilmi\u015f sor\u011fularla)\u00b7\u00a0 \u00a0 \u00a0 \u00a0Saxlan\u0131lan Prosedurlardan istifad\u0259 edin\u0130stifad\u0259\u00e7i daxiletm\u0259sini t\u0259sdiq edin(Validate user input)\u00b7\u00a0 \u00a0 \u00a0 \u00a0Error mesaj\u0131ndan m\u0259lumatlar\u0131 gizl\u0259din\u00b7\u00a0 \u00a0 \u00a0 \u00a0Sisteminizi yenil\u0259yinVeril\u0259nl\u0259r bazas\u0131 etimadnam\u0259sini ayr\u0131 v\u0259 \u015fifr\u0259l\u0259nmi\u015f \u015f\u0259kild\u0259 saxlay\u0131nShell v\u0259 ehtiyac\u0131n\u0131z olmayan h\u0259r hans\u0131 dig\u0259r funksiyalar\u0131 s\u00f6nd\u00fcr\u00fcn29. T\u0259hl\u00fck\u0259sizlik s\u0259hv konfiqurasiyas\u0131(security misconfiguration) n\u0259dir?Cavab:Security Misconfiguration t\u0259hl\u00fck\u0259siz olmayan konfiqurasiya se\u00e7imi s\u0259b\u0259bind\u0259n proqram\\\/\u015f\u0259b\u0259k\u0259\\\/cihaz h\u00fccuma m\u0259ruz qald\u0131qda ba\u015f ver\u0259 bil\u0259c\u0259k z\u0259iflikdir. Bu, standart istifad\u0259\u00e7i ad\u0131\\\/parolun d\u0259yi\u015fm\u0259z saxlan\u0131lmas\u0131 q\u0259d\u0259r sad\u0259 ola bil\u0259r.30. Remote Desktop Protocol (RDP) n\u0259dir?Cavab:-\u00a0 \u00a0 \u00a0 \u00a0RDP (Remote Desktop Protocol) x\u00fcsusi olaraq m\u00fc\u015ft\u0259ri cihazlar\u0131, istifad\u0259\u00e7il\u0259r v\u0259 virtual \u015f\u0259b\u0259k\u0259 serveri aras\u0131nda proqram m\u0259lumatlar\u0131n\u0131n \u00f6t\u00fcr\u00fclm\u0259si t\u0259hl\u00fck\u0259sizliyi v\u0259 \u015fifr\u0259l\u0259m\u0259si \u00fc\u00e7\u00fcn n\u0259z\u0259rd\u0259 tutulmu\u015f Microsoft protokoludur.-\u00a0 \u00a0 \u00a0 \u00a0Bu, administratorlara f\u0259rdi abun\u0259\u00e7il\u0259rin qar\u015f\u0131la\u015fd\u0131\u011f\u0131 probleml\u0259ri uzaqdan qiym\u0259tl\u0259ndirm\u0259y\u0259 v\u0259 h\u0259ll etm\u0259y\u0259 imkan verir.-\u00a0 \u00a0 \u00a0 \u00a0O, \u00e7oxn\u00f6qt\u0259li \u00f6t\u00fcrm\u0259 t\u0259min etm\u0259kl\u0259 64.000-\u0259 q\u0259d\u0259r ayr\u0131 m\u0259lumat kanal\u0131n\u0131 d\u0259st\u0259kl\u0259yir.31. Address Resolution Protocol (ARP) n\u0259 \u00fc\u00e7\u00fcn istifad\u0259 olunur?Cavab: ARP x\u00fcsusi olaraq IP \u015f\u0259b\u0259k\u0259 \u00fcnvanlar\u0131n\u0131 Ethernet \u00fcnvanlar\u0131 kimi fiziki \u00fcnvanlarla \u0259laq\u0259l\u0259ndirm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunan protokoldur.32 bitlik \u00fcnvanlar\u0131 48 bitlik \u00fcnvanlara v\u0259 \u0259ksin\u0259 t\u0259rc\u00fcm\u0259 edir. Bu laz\u0131md\u0131r, \u00e7\u00fcnki bu g\u00fcn istifad\u0259 etdiyimiz internet protokolunun (IP) \u0259n \u00fcmumi s\u0259viyy\u0259si 32 bit uzunlu\u011funda v\u0259 MAC \u00fcnvanlar\u0131 48 bit uzunlu\u011fundad\u0131r.33. \u015e\u0259b\u0259k\u0259 t\u0259hl\u00fck\u0259sizliyi \u00fc\u00e7\u00fcn autentifikasiyan\u0131n \u00fcmumi \u00fcsullar\u0131 hans\u0131lard\u0131r?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Cavab: Biometrics - Bu, istifad\u0259\u00e7inin \u015f\u0259xsiyy\u0259tini yoxlamaq \u00fc\u00e7\u00fcn x\u00fcsusi olaraq istifad\u0259 edil\u0259n m\u0259lum v\u0259 qeyd\u0259 al\u0131nm\u0131\u015f fiziki atributudurToken - Sisteml\u0259r\u0259 daxil olmaq \u00fc\u00e7\u00fcn tokenl\u0259rd\u0259n d\u0259 istifad\u0259 olunur. Bu, hakerl\u0259rin etimadnam\u0259l\u0259r\u0259 malik olduqlar\u0131 halda hesablara daxil olmalar\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir.Transaction Authentication - Bird\u0259f\u0259lik pin v\u0259 ya parol, onlar\u0131n \u015f\u0259xsiyy\u0259tini t\u0259sdiql\u0259y\u0259n onlayn \u0259m\u0259liyyatlar\u0131n i\u015fl\u0259nm\u0259si zaman\u0131 istifad\u0259 olunur.Multi-Factor Authentication - Bu, bird\u0259n \u00e7ox autentifikasiya metoduna ehtiyac\u0131 olan bir t\u0259hl\u00fck\u0259sizlik sistemidir.Out-of-Band Authentication - Bu autentifikasiya iki f\u0259rqli kanaldan v\u0259 ya \u015f\u0259b\u0259k\u0259d\u0259n iki f\u0259rqli siqnal t\u0259l\u0259b edir. Bu, onlayn bank\u00e7\u0131l\u0131qda h\u00fccumlar\u0131n \u0259ks\u0259riyy\u0259tinin hack v\u0259 \u015f\u0259xsiyy\u0259t o\u011furlanmas\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 al\u0131r.34. Hashing v\u0259 Salting aras\u0131ndak\u0131 f\u0259rq n\u0259dir?Cavab:\u00a0 \u00a0 Hashing \u0259sas\u0259n autentifikasiya \u00fc\u00e7\u00fcn istifad\u0259 olunur v\u0259 m\u0259lumatlar\u0131n sabit uzunluqlu d\u0259y\u0259r\u0259 planla\u015fd\u0131r\u0131ld\u0131\u011f\u0131 birt\u0259r\u0259fli funksiyad\u0131r.Salting hash \u00fc\u00e7\u00fcn \u0259lav\u0259 bir add\u0131md\u0131r, burada \u015fifr\u0259y\u0259 salt \u0259lav\u0259 olunur v\u0259 o \u015f\u0259kild\u0259 hashl\u0259nir35. Stored v\u0259 Reflected XSS aras\u0131ndak\u0131 f\u0259rq n\u0259dir?Cavab: Stored XSS attacks - Enjekte edilmi\u015f skriptl\u0259rin h\u0259d\u0259f serverl\u0259rd\u0259 qal\u0131c\u0131 olaraq saxland\u0131\u011f\u0131 h\u00fccumlara deyilir. Bununla birlikd\u0259 qurban saxlan\u0131lan m\u0259lumatlar\u0131 h\u0259r d\u0259f\u0259 t\u0259l\u0259b etdikd\u0259 z\u0259r\u0259rli script yenid\u0259n i\u015f\u0259 d\u00fc\u015f\u00fcr.Reflected XSS Attacks \u2013 Stored XSS-d\u0259n f\u0259rqli olaraq bu tip XSS serverd\u0259 qal\u0131c\u0131 olaraq qalm\u0131r v\u0259 bir anl\u0131q ba\u015f verir v\u0259 bitir.37. \u015e\u0259xsiyy\u0259t o\u011furlu\u011funun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?\u00a0 \u00a0 \u00a0 \u00a0\u00a0\u00b7\u00a0 \u00a0 \u00a0 \u015e\u0259xsi qeydl\u0259rinizi qoruyun.\u00b7\u00a0 \u00a0 \u00a0 M\u0259xfi m\u0259lumatlar\u0131n onlayn payla\u015f\u0131lmas\u0131ndan \u00e7\u0259kinin.\u00b7\u00a0 \u00a0 \u00a0 G\u00fccl\u00fc parollardan istifad\u0259 edin v\u0259 onlar\u0131 m\u00fcnt\u0259z\u0259m olaraq d\u0259yi\u015fdirin.\u00b7\u00a0 \u00a0 \u00a0 Etibars\u0131z saytlarda bank m\u0259lumatlar\u0131n\u0131z\u0131 t\u0259qdim etm\u0259yin.\u00b7\u00a0 \u00a0 \u00a0 \u0130l\u0259ri s\u0259viyy\u0259 firewall v\u0259 spyware al\u0259tl\u0259ri vasit\u0259l\u0259ri il\u0259 sisteminizi qoruyun.\u00b7\u00a0 \u00a0 \u00a0 Brauzerl\u0259rinizi, sisteminizi v\u0259 proqram t\u0259minat\u0131n\u0131z\u0131 \u0259n son versiyada tutun.38. LAN daxilind\u0259 port bloklanmas\u0131 n\u0259dir?\u00a0 \u00a0Cavab: Bu, istifad\u0259\u00e7il\u0259rin yerli \u015f\u0259b\u0259k\u0259 daxilind\u0259 bir s\u0131ra xidm\u0259tl\u0259r\u0259 daxil olmas\u0131n\u0131 m\u0259hdudla\u015fd\u0131rma\u011fa k\u00f6m\u0259k edir. \u018fsas m\u0259qs\u0259d m\u0259nb\u0259nin portlar vasit\u0259sil\u0259 t\u0259yinat adresin\u0259 \u00e7\u0131x\u0131\u015f t\u0259min etm\u0259sini dayand\u0131rmaqd\u0131r. B\u00fct\u00fcn proqramlar portlarda i\u015fl\u0259diyi \u00fc\u00e7\u00fcn icaz\u0259siz giri\u015fi m\u0259hdudla\u015fd\u0131rmaq \u00fc\u00e7\u00fcn portlar\u0131 bloklamaq laz\u0131md\u0131r ki, bu da \u015f\u0259b\u0259k\u0259 infrastrukturunda t\u0259hl\u00fck\u0259sizlik z\u0259ifliyini poza bil\u0259r.41. Veril\u0259nl\u0259r bazas\u0131ndan \u00e7\u0131xar\u0131lan a\u015fa\u011f\u0131dak\u0131 parollar\u0131n siyah\u0131s\u0131na bax\u0131n:\u00a0\u00a0A. Password1B. @#$)*&^%C. UcSc4Evr!D. akHGksmLNCavab:A\u015fa\u011f\u0131dak\u0131 parollardan hans\u0131 UCSC-nin parol t\u0259l\u0259bl\u0259rin\u0259 cavab verir? Cavab UcSc4Evr! Bu, a\u015fa\u011f\u0131dak\u0131 UCSC t\u0259l\u0259bl\u0259rinin ham\u0131s\u0131na cavab ver\u0259n yegan\u0259 se\u00e7imdir:42. Kiber h\u00fccum\u00e7ular\u0131n n\u00f6vl\u0259rini sadalay\u0131nD\u00f6rd n\u00f6v kiber h\u00fccum\u00e7u var.43.SRM dey\u0259rk\u0259n n\u0259yi n\u0259z\u0259rd\u0259 tutursunuz?Cavab: SRM T\u0259hl\u00fck\u0259sizlik Referans Monitoru m\u0259nas\u0131n\u0131 verir, komp\u00fcter s\u00fcr\u00fcc\u00fcl\u0259rin\u0259 obyekt\u0259 giri\u015f h\u00fcquqlar\u0131n\u0131 verm\u0259k \u00fc\u00e7\u00fcn rutinl\u0259r t\u0259qdim edir.56.Komp\u00fcter virusu n\u0259dir?Cavab:Virus istifad\u0259\u00e7inin raz\u0131l\u0131\u011f\u0131 olmadan h\u0259yata ke\u00e7iril\u0259n z\u0259r\u0259rli proqramd\u0131r. Viruslar CPU vaxt\u0131 v\u0259 yadda\u015f kimi komp\u00fcter resurslar\u0131n\u0131 istehlak ed\u0259 bil\u0259r. B\u0259z\u0259n virus dig\u0259r komp\u00fcter proqramlar\u0131nda d\u0259yi\u015fiklikl\u0259r edir v\u0259 komp\u00fcter sistemin\u0259 z\u0259r\u0259r verm\u0259k \u00fc\u00e7\u00fcn \u00f6z kodunu daxil edir.Komp\u00fcter virusu a\u015fa\u011f\u0131dak\u0131lar \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r:\u0130stifad\u0259\u00e7i id v\u0259 parol kimi \u015f\u0259xsi m\u0259lumatlara daxil olun\u0130stifad\u0259\u00e7iy\u0259 bezdirici mesajlar g\u00f6st\u0259rinKomp\u00fcterinizd\u0259ki m\u0259lumatlar\u0131n z\u0259d\u0259l\u0259nm\u0259si\u0130stifad\u0259\u00e7inin d\u00fcym\u0259 vuru\u015flar\u0131n\u0131 qeyd edinARP poisoning n\u0259dir?Cavab:\u00a0Address Resolution Protocol z\u0259h\u0259rl\u0259nm\u0259si IP \u00fcnvan\u0131n\u0131n \u015f\u0259b\u0259k\u0259 cihaz\u0131nda fiziki \u00fcnvana \u00e7evrildiyi bir h\u00fccum n\u00f6v\u00fcd\u00fcr. Ev sahibi ARP yay\u0131m\u0131 g\u00f6nd\u0259r\u0259c\u0259k v\u0259 b\u00fct\u00fcn q\u0259buledicil\u0259r fiziki \u00fcnvanlar\u0131 il\u0259 cavab ver\u0259c\u0259kl\u0259r. Ba\u015fqa s\u00f6zl\u0259 des\u0259k, ARP z\u0259h\u0259rl\u0259nm\u0259si, \u015f\u0259b\u0259k\u0259y\u0259 qo\u015fulmu\u015f komp\u00fcterin \u0130P \u00fcnvan\u0131 il\u0259 saxta \u00fcnvanlar\u0131 \u0259laq\u0259l\u0259ndirm\u0259k v\u0259 trafiki qa\u00e7\u0131rmaq \u00fc\u00e7\u00fcn ke\u00e7id\u0259 saxta \u00fcnvanlar g\u00f6nd\u0259rilm\u0259sinin ad\u0131d\u0131r.Bunlar:1) kibercinay\u0259tkarlar2) hacktivistl\u0259r3) daxili t\u0259hdidl\u0259r(\u0130nsider threats\u0259)4) d\u00f6vl\u0259t t\u0259r\u0259find\u0259n d\u0259st\u0259kl\u0259n\u0259n h\u00fccum\u00e7ular(State sponsored).45. \u018fl\u00e7atan olan Hacker Al\u0259tl\u0259ri\u00a0 \u00a0 \u00a0 \u00a0 \u00a0A\u015fa\u011f\u0131da faydal\u0131 hack al\u0259tl\u0259rinin siyah\u0131s\u0131 verilmi\u015fdir.AcunetixWebInspectProbablyNetsparkerAngry IP scanner:Burp SuiteSavvius49.Situasiya #1Cavab:Bank hesab\u0131n\u0131zla ba\u011fl\u0131 probleml\u0259 \u00fczl\u0259\u015fdiyini bildir\u0259n e-po\u00e7t m\u0259ktubu g\u00f6nd\u0259rir. E-po\u00e7t t\u0259limatlar v\u0259 h\u0259m\u00e7inin hesaba daxil olmaq \u00fc\u00e7\u00fcn ke\u00e7idl\u0259 t\u0259min edilir ki, siz onu d\u00fcz\u0259ld\u0259 bil\u0259siniz. Yuxar\u0131dak\u0131 v\u0259ziyy\u0259td\u0259n n\u0259 n\u0259tic\u0259 \u00e7\u0131xar\u0131rs\u0131n\u0131z? izah edin.Bu, ist\u0259nm\u0259y\u0259n e-po\u00e7t kimi g\u00f6r\u00fcn\u00fcr. Siz onu spam kimi bildirm\u0259li v\u0259 e-po\u00e7tu d\u0259rhal istifad\u0259 etdiyiniz m\u00fcvafiq veb m\u00fc\u015ft\u0259rid\u0259 (Yahoo Mail, Gmail v\u0259 s.) zibil qutusuna k\u00f6\u00e7\u00fcrm\u0259lisiniz. Bankla ba\u011fl\u0131 h\u0259r hans\u0131 etimadnam\u0259sini onlayn t\u0259qdim etm\u0259zd\u0259n \u0259vv\u0259l, mesaj\u0131n qanuni olub-olmad\u0131\u011f\u0131n\u0131 v\u0259 bankdan oldu\u011funu yoxlamaq \u00fc\u00e7\u00fcn banka z\u0259ng etm\u0259lisiniz.50. Simmetrik \u015fifr\u0259l\u0259m\u0259 alqoritmin\u0259 b\u0259zi n\u00fcmun\u0259l\u0259r verin.A\u015fa\u011f\u0131da simmetrik \u015fifr\u0259l\u0259m\u0259 alqoritminin b\u0259zi n\u00fcmun\u0259l\u0259ri verilmi\u015fdir.RCxBlowfishRijndael (AES)DES51. ECB v\u0259 CBC-nin abreviaturas\u0131 n\u0259dir?Cavab:ECB-nin tam formas\u0131 Elektron Kod Kitab\u0131d\u0131r v\u0259 CBC-nin tam formas\u0131 Cipher Block Chaining-dir.52.Casus proqram\u0131 m\u00fc\u0259yy\u0259nl\u0259\u015fdirin.Cavab:Casus proqram t\u0259\u015fkilat v\u0259 ya \u015f\u0259xs haqq\u0131nda m\u0259lumatlar\u0131 o\u011furlamaq m\u0259qs\u0259di da\u015f\u0131yan z\u0259r\u0259rli proqramd\u0131r. Bu z\u0259r\u0259rli proqram t\u0259\u015fkilat\u0131n komp\u00fcter sistemin\u0259 z\u0259r\u0259r ver\u0259 bil\u0259r.53. ARP poisoning n\u0259dir?Cavab:Address Resolution Protocol z\u0259h\u0259rl\u0259nm\u0259si IP \u00fcnvan\u0131n\u0131n \u015f\u0259b\u0259k\u0259 cihaz\u0131nda fiziki \u00fcnvana \u00e7evrildiyi bir h\u00fccum n\u00f6v\u00fcd\u00fcr. Ev sahibi ARP yay\u0131m\u0131 g\u00f6nd\u0259r\u0259c\u0259k v\u0259 b\u00fct\u00fcn q\u0259buledicil\u0259r fiziki \u00fcnvanlar\u0131 il\u0259 cavab ver\u0259c\u0259kl\u0259r. Ba\u015fqa s\u00f6zl\u0259 des\u0259k, ARP z\u0259h\u0259rl\u0259nm\u0259si, \u015f\u0259b\u0259k\u0259y\u0259 qo\u015fulmu\u015f komp\u00fcterin \u0130P \u00fcnvan\u0131 il\u0259 saxta \u00fcnvanlar\u0131 \u0259laq\u0259l\u0259ndirm\u0259k v\u0259 trafiki qa\u00e7\u0131rmaq \u00fc\u00e7\u00fcn ke\u00e7id\u0259 saxta \u00fcnvanlar g\u00f6nd\u0259rilm\u0259sinin ad\u0131d\u0131r.54. Fiziki olmayan t\u0259hdidl\u0259rin \u00fcmumi n\u00f6vl\u0259rini s\u0131ralay\u0131n:TrojansAdwareWormsSpywareDoS AttackDistributed DoS AttacksVirusKey loggersPhishingKomp\u00fcter sisteml\u0259rinin resurslar\u0131na icaz\u0259siz giri\u015f55.Nmap n\u0259dir?Cavab: Nmap b\u00fct\u00fcn qo\u015fulmu\u015f cihazlar\u0131 m\u00fc\u0259yy\u0259n etm\u0259k v\u0259 i\u015fl\u0259tdikl\u0259ri \u0259m\u0259liyyat sisteml\u0259ri haqq\u0131nda m\u0259lumat \u00e7atd\u0131rmaq \u00fc\u00e7\u00fcn IP paketl\u0259rind\u0259n istifad\u0259 ed\u0259n \u015f\u0259b\u0259k\u0259 skan al\u0259tidir.56.Sistem \u0259sasl\u0131 h\u00fccumlar\u0131n b\u0259zi n\u00fcmun\u0259l\u0259riVirusBackdoorsBotsWorm57.Veb serverin t\u0259hl\u00fck\u0259sizliyini t\u0259min etm\u0259k \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar at\u0131lmal\u0131d\u0131r?Cavab:Update the ownership of the fileKeep your webserver up-to-dateDisable all extra modulesDelete default scriptsM\u00fc\u0259llif:\u00a0Orkhan Jalalov\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/yusif.az\\\/main\\\/?p=6777#breadcrumb\"},\"inLanguage\":\"az\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/yusif.az\\\/main\\\/?p=6777\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"az\",\"@id\":\"https:\\\/\\\/yusif.az\\\/main\\\/?p=6777#primaryimage\",\"url\":\"https:\\\/\\\/yusif.az\\\/main\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Screenshot-2024-10-02-112002.png\",\"contentUrl\":\"https:\\\/\\\/yusif.az\\\/main\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Screenshot-2024-10-02-112002.png\",\"width\":1496,\"height\":549},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/yusif.az\\\/main\\\/?p=6777#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/yusif.az\\\/main\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kibert\u0259hl\u00fck\u0259sizlik sah\u0259sind\u0259 veril\u0259n interv\u00fc suallar\u0131\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/yusif.az\\\/main\\\/#website\",\"url\":\"https:\\\/\\\/yusif.az\\\/main\\\/\",\"name\":\"www.YUSIF.az\",\"description\":\"Birlikd\u0259 Y\u00fcks\u0259li\u015f\u0259 Do\u011fru!!!\",\"publisher\":{\"@id\":\"https:\\\/\\\/yusif.az\\\/main\\\/#\\\/schema\\\/person\\\/904da2c1a1bbe7e501df95c2bc38d146\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/yusif.az\\\/main\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"az\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/yusif.az\\\/main\\\/#\\\/schema\\\/person\\\/904da2c1a1bbe7e501df95c2bc38d146\",\"name\":\"auto61\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"az\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/206904355e04c426b5ca443938aabf7f3ee8e177abeb155e7567388fa9c208a3?s=96&d=wavatar&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/206904355e04c426b5ca443938aabf7f3ee8e177abeb155e7567388fa9c208a3?s=96&d=wavatar&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/206904355e04c426b5ca443938aabf7f3ee8e177abeb155e7567388fa9c208a3?s=96&d=wavatar&r=g\",\"caption\":\"auto61\"},\"logo\":{\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/206904355e04c426b5ca443938aabf7f3ee8e177abeb155e7567388fa9c208a3?s=96&d=wavatar&r=g\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kibert\u0259hl\u00fck\u0259sizlik sah\u0259sind\u0259 veril\u0259n interv\u00fc suallar\u0131 - www.YUSIF.az IT B\u00d6LM\u018fS\u0130","description":"A\u015fa\u011f\u0131da b\u0259zi tipik interv\u00fc suallar\u0131 t\u0259qdim edir\u0259m, h\u0259m\u00e7inin suallar\u0131n cavablar\u0131 il\u0259 ba\u011fl\u0131 q\u0131sa izahlar da \u0259lav\u0259 edir\u0259m:1. Kriptoqrafiya n\u0259dir?Cavab: Kriptoqrafiya m\u0259lumat\u0131n icaz\u0259 verilm\u0259diyi \u00fc\u00e7\u00fcnc\u00fc t\u0259r\u0259fl\u0259rd\u0259n m\u0259lumat\u0131 qorumaq \u00fc\u00e7\u00fcn m\u0259xfi m\u0259lumatlar\u0131 kodla\u015fd\u0131r\u0131lm\u0131\u015f \u015f\u0259kild\u0259 \u00e7evirm\u0259k v\u0259 \u00f6t\u00fcrm\u0259k \u00fcsuludur.3. IDS v\u0259 IPS aras\u0131ndak\u0131 f\u0259rq n\u0259dir?Cavab: IDS Intrusion Detection System\u2019dir v\u0259 o, yaln\u0131z m\u00fcdaxil\u0259l\u0259ri a\u015fkarlay\u0131r v\u0259 administrator is\u0259 m\u00fcdaxil\u0259nin qar\u015f\u0131s\u0131n\u0131 almal\u0131d\u0131r.Halbuki, IPS y\u0259ni Intrusion Prevention System-d\u0259 sistem m\u00fcdaxil\u0259ni a\u015fkarlay\u0131r v\u0259 h\u0259m\u00e7inin m\u00fcdaxil\u0259nin qar\u015f\u0131s\u0131n\u0131 almaq \u00fc\u00e7\u00fcn t\u0259dbirl\u0259r g\u00f6r\u00fcr.4. CIA \u00fc\u00e7buca\u011f\u0131n\u0131 a\u00e7\u0131qlay\u0131nCavab: CIA-\u0131n a\u00e7\u0131l\u0131\u015f\u0131 Confidentiality(Konfidensiall\u0131q), Integrity(taml\u0131q) v\u0259 Availability(\u0259l\u00e7atanl\u0131q)-d\u0131r. CIA \u0130nformasiya T\u0259hl\u00fck\u0259sizliyi siyas\u0259tl\u0259rin\u0259 r\u0259hb\u0259rlik etm\u0259k \u00fc\u00e7\u00fcn haz\u0131rlanm\u0131\u015f modeldir. Bu, t\u0259\u015fkilatlar t\u0259r\u0259find\u0259n istifad\u0259 edil\u0259n \u0259n m\u0259\u015fhur modell\u0259rd\u0259n biridir.Konfidensiall\u0131qM\u0259lumat yaln\u0131z s\u0259lahiyy\u0259tli i\u015f\u00e7il\u0259r \u00fc\u00e7\u00fcn \u0259l\u00e7atan v\u0259 oxuna bil\u0259n olmal\u0131d\u0131r. O, icaz\u0259siz i\u015f\u00e7il\u0259r t\u0259r\u0259find\u0259n \u0259l\u00e7atan olmamal\u0131d\u0131r. Kims\u0259 m\u0259lumatlara daxil olmaq \u00fc\u00e7\u00fcn hakerd\u0259n istifad\u0259 ed\u0259rs\u0259, m\u0259lumat g\u00fccl\u00fc \u015f\u0259kild\u0259 \u015fifr\u0259l\u0259nm\u0259lidir ki, m\u0259lumat \u0259ld\u0259 olunsa bel\u0259, oxunaq v\u0259 ya ba\u015fa d\u00fc\u015f\u00fcl\u0259n olmas\u0131n.Taml\u0131qM\u0259lumatlar\u0131n icaz\u0259si olmayan \u015f\u0259xsl\u0259r t\u0259r\u0259find\u0259n d\u0259yi\u015fdirilm\u0259diyind\u0259n \u0259min olmaq \u00fc\u00e7\u00fcnd\u00fcr. D\u00fcr\u00fcstl\u00fck m\u0259lumatlar\u0131n icaz\u0259si olmayan i\u015f\u00e7il\u0259r t\u0259r\u0259find\u0259n pozulmamas\u0131n\u0131 v\u0259 ya d\u0259yi\u015fdirilm\u0259m\u0259sini t\u0259min edir. S\u0259lahiyy\u0259tli \u015f\u0259xs\/sistem m\u0259lumatlar\u0131 d\u0259yi\u015fdirm\u0259y\u0259 \u00e7al\u0131\u015f\u0131rsa v\u0259 d\u0259yi\u015fiklik u\u011fursuz olarsa, m\u0259lumat geri qaytar\u0131lmal\u0131 v\u0259 z\u0259d\u0259l\u0259nm\u0259m\u0259lidir.\u018fl\u00e7atanl\u0131qM\u0259lumat istifad\u0259\u00e7i t\u0259l\u0259b etdiyi zaman istifad\u0259\u00e7i \u00fc\u00e7\u00fcn \u0259l\u00e7atan olmal\u0131d\u0131r. Avadanl\u0131\u011f\u0131n saxlanmas\u0131, m\u00fcnt\u0259z\u0259m olaraq t\u0259kmill\u0259\u015fdirilm\u0259si, M\u0259lumatlar\u0131n Yed\u0259kl\u0259nm\u0259si v\u0259 B\u0259rpas\u0131, \u015e\u0259b\u0259k\u0259 Darbo\u011fazlar\u0131na diqq\u0259t yetirilm\u0259lidir.5. \u015eifr\u0259l\u0259m\u0259 Hashing-d\u0259n n\u0259 il\u0259 f\u0259rql\u0259nir?\u00a0Cavab: H\u0259m \u015eifr\u0259l\u0259m\u0259, h\u0259m d\u0259 Hashing oxuna bil\u0259n m\u0259lumatlar\u0131 oxunmayan formata \u00e7evirm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunur. F\u0259rq ondad\u0131r ki, \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat \u015fifr\u0259nin a\u00e7\u0131lmas\u0131 prosesi il\u0259 yenid\u0259n orijinal m\u0259lumatlara \u00e7evril\u0259 bil\u0259r, lakin hash edilmi\u015f m\u0259lumatlar orijinal m\u0259lumatlara qaytar\u0131la bilm\u0259z6. Firewall n\u0259dir v\u0259 ondan n\u0259 \u00fc\u00e7\u00fcn istifad\u0259 olunur?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0Cavab:Firewall \u015f\u0259b\u0259k\u0259 trafikini izl\u0259y\u0259n v\u0259 idar\u0259 ed\u0259n sistem\/\u015f\u0259b\u0259k\u0259 s\u0259rh\u0259dl\u0259rind\u0259 qurulmu\u015f \u015f\u0259b\u0259k\u0259 t\u0259hl\u00fck\u0259sizlik sistemidir.Firewalllar \u0259sas\u0259n sistemi\/\u015f\u0259b\u0259k\u0259ni viruslar, qurdlar, z\u0259r\u0259rli proqramlar v\u0259 s.-d\u0259n qorumaq \u00fc\u00e7\u00fcn istifad\u0259 olunur. Firewalllar h\u0259m\u00e7inin uzaqdan giri\u015fin(Remote Access) v\u0259 m\u0259zmunun filtrl\u0259nm\u0259sinin qar\u015f\u0131s\u0131n\u0131 almaq \u00fc\u00e7\u00fcn d\u0259 ola bil\u0259r.7. VA (Z\u0259ifliyin Qiym\u0259tl\u0259ndirilm\u0259si) v\u0259 PT (Penetrasiya Testi) aras\u0131nda f\u0259rq n\u0259dir?Cavab:Vulnerability Assessment qar\u015f\u0131 sistemd\u0259 q\u00fcsurlar\u0131n tap\u0131lmas\u0131 prosesidir. T\u0259\u015fkilatlar sisteml\u0259rinin\/\u015f\u0259b\u0259k\u0259l\u0259rinin q\u00fcsurlar\u0131 v\u0259 ya z\u0259if t\u0259r\u0259fl\u0259ri oldu\u011funu bilir v\u0259 bu q\u00fcsurlar\u0131 tapmaq v\u0259 d\u00fcz\u0259ltm\u0259k \u00fc\u00e7\u00fcn q\u00fcsurlar\u0131 prioritetl\u0259\u015fdirm\u0259k ist\u0259yir.Penetration Testing h\u0259d\u0259fd\u0259 z\u0259iflikl\u0259rin tap\u0131lmas\u0131 prosesidir. T\u0259\u015fkilatlar d\u00fc\u015f\u00fcn\u0259 bil\u0259c\u0259kl\u0259ri b\u00fct\u00fcn t\u0259hl\u00fck\u0259sizlik t\u0259dbirl\u0259rini qurublar.Onlar\u0131n sistemini\/\u015f\u0259b\u0259k\u0259sini s\u0131nd\u0131rmaq \u00fc\u00e7\u00fcn ba\u015fqa yol olub-olmad\u0131\u011f\u0131n\u0131 bilm\u0259k v\u0259 yoxlamaq \u00fc\u00e7\u00fcn bu xidm\u0259td\u0259n istifad\u0259 edirl\u0259r.8.\u00dc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma n\u0259dir?Cavab:\u00a0\u00dc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma, host v\u0259 m\u00fc\u015ft\u0259ri aras\u0131nda \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn TCP\/IP \u015f\u0259b\u0259k\u0259sind\u0259 istifad\u0259 edil\u0259n \u00fcsuldur. Bu, \u00fc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma adlan\u0131r, \u00e7\u00fcnki bu, m\u00fc\u015ft\u0259ri v\u0259 serverin paket m\u00fcbadil\u0259si apard\u0131\u011f\u0131 \u00fc\u00e7 add\u0131ml\u0131 bir \u00fcsuldur. \u00dc\u00e7 add\u0131m a\u015fa\u011f\u0131dak\u0131lard\u0131r:1.\u00a0 \u00a0M\u00fc\u015ft\u0259ri server\u0259 SYN (Sinxronizasiya) paketini g\u00f6nd\u0259rir, serverin i\u015fl\u0259k v\u0259ziyy\u0259td\u0259 olub olmad\u0131\u011f\u0131n\u0131 v\u0259 ya a\u00e7\u0131q portlar\u0131n olub olmad\u0131\u011f\u0131n\u0131 yoxlay\u0131r.2.\u00a0 \u00a0Server a\u00e7\u0131q portlar\u0131 varsa, m\u00fc\u015ft\u0259riy\u0259 SYN-ACK paketini g\u00f6nd\u0259rir3.\u00a0 \u00a0M\u00fc\u015ft\u0259ri bunu q\u0259bul edir v\u0259 server\u0259 ACK (T\u0259qdimat) paketi g\u00f6nd\u0259rir.9. Veb T\u0259tbiqind\u0259n al\u0131na bil\u0259n cavab kodlar\u0131 hans\u0131lard\u0131r?Cavab:\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a01xx \u2013 M\u0259lumat xarakterli cavablar(Informational responses)2xx \u2013 U\u011fur(Success)3xx \u2013 Yenid\u0259n y\u00f6nl\u0259ndirm\u0259(Redirection)4xx \u2013 M\u00fc\u015ft\u0259ri t\u0259r\u0259f x\u0259tas\u0131(Client-side error)5xx \u2013 Server t\u0259r\u0259f x\u0259tas\u0131(Server-side error)10. Traceroute n\u0259dir?Cavab:\u00a0Traceroute paketin yolunu g\u00f6st\u0259r\u0259n bir vasit\u0259dir. O, paketin ke\u00e7diyi b\u00fct\u00fcn n\u00f6qt\u0259l\u0259ri (\u0259sas\u0259n mar\u015frutla\u015fd\u0131r\u0131c\u0131lar) sadalay\u0131r. Bu, \u0259sas\u0259n paket t\u0259yinat yerin\u0259 \u00e7atmad\u0131qda istifad\u0259 olunur. Traceroute, nasazl\u0131q n\u00f6qt\u0259sini m\u00fc\u0259yy\u0259n etm\u0259k \u00fc\u00e7\u00fcn \u0259laq\u0259nin harada dayand\u0131\u011f\u0131n\u0131 v\u0259 ya pozuldu\u011funu yoxlamaq \u00fc\u00e7\u00fcn istifad\u0259 olunur.11. Firewall qurmaq \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar var?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Cavab:1.\u00a0 \u00a0Username\/password: firewall cihaz\u0131 \u00fc\u00e7\u00fcn standart parolu d\u0259yi\u015fdirin2.\u00a0 \u00a0Remote administration: Uzaqdan idar\u0259etm\u0259 funksiyas\u0131n\u0131 s\u00f6nd\u00fcr\u00fcn3.\u00a0 \u00a0Port forwarding: Veb server v\u0259 ya FTP server kimi m\u00fc\u0259yy\u0259n proqramlar\u0131n d\u00fczg\u00fcn i\u015fl\u0259m\u0259si \u00fc\u00e7\u00fcn m\u00fcvafiq port y\u00f6nl\u0259ndirm\u0259sini konfiqurasiya edin4.\u00a0 \u00a0DHCP Server: Firewallun m\u00f6vcud DHCP serveri il\u0259 \u015f\u0259b\u0259k\u0259y\u0259 qura\u015fd\u0131r\u0131lmas\u0131, firewallun DHCP-si deaktiv edilm\u0259yinc\u0259 m\u00fcnaqi\u015f\u0259y\u0259 s\u0259b\u0259b olacaq.5.\u00a0 \u00a0Logging: Firewall probleml\u0259rini v\u0259 ya potensial h\u00fccumlar\u0131 aradan qald\u0131rmaq \u00fc\u00e7\u00fcn giri\u015fin aktiv oldu\u011fundan \u0259min olun v\u0259 log-lara nec\u0259 baxmaq laz\u0131m oldu\u011funu anlay\u0131n.6.\u00a0 \u00a0Policies: M\u00f6hk\u0259m t\u0259hl\u00fck\u0259sizlik siyas\u0259tl\u0259riniz olmal\u0131 v\u0259 Firewall-un h\u0259min siyas\u0259tl\u0259ri t\u0259tbiq etm\u0259k \u00fc\u00e7\u00fcn konfiqurasiya edildiyin\u0259 \u0259min olmal\u0131s\u0131n\u0131z.12. SSL \u015eifr\u0259l\u0259m\u0259sini izah edinCavab:\u00a0 \u00a0\u00a0SSL (Secure Sockets Layer) Veb Server v\u0259 Brauzer aras\u0131nda \u015fifr\u0259l\u0259nmi\u015f \u0259laq\u0259l\u0259r yaradan s\u0259naye standartl\u0131 t\u0259hl\u00fck\u0259sizlik texnologiyas\u0131d\u0131r. Bu, m\u0259lumatlar\u0131n m\u0259xfiliyini qorumaq v\u0259 onlayn \u0259m\u0259liyyatlarda m\u0259lumat\u0131 qorumaq \u00fc\u00e7\u00fcn istifad\u0259 olunur.SSL ba\u011flant\u0131s\u0131 qurmaq \u00fc\u00e7\u00fcn add\u0131mlar a\u015fa\u011f\u0131dak\u0131 kimidir:1.\u00a0 \u00a0Brauzer SSL il\u0259 qorunan veb server\u0259 qo\u015fulma\u011fa \u00e7al\u0131\u015f\u0131r2.\u00a0 \u00a0Brauzer SSL sertifikat\u0131n\u0131n sur\u0259tini brauzer\u0259 g\u00f6nd\u0259rir3.\u00a0 \u00a0Brauzer SSL sertifikat\u0131n\u0131n etibarl\u0131 olub olmad\u0131\u011f\u0131n\u0131 yoxlay\u0131r. Etibarl\u0131d\u0131rsa, o zaman brauzer veb server\u0259 \u015fifr\u0259li \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn mesaj g\u00f6nd\u0259rir4.\u00a0 \u00a0Veb server SSL \u015fifr\u0259li ba\u011flant\u0131ya ba\u015flamaq \u00fc\u00e7\u00fcn t\u0259sdiq g\u00f6nd\u0259rir5. SSL \u015fifr\u0259li \u0259lqa\u0259 brauzer v\u0259 veb server aras\u0131nda ba\u015f verir13. Serverin t\u0259hl\u00fck\u0259sizliyini t\u0259min etm\u0259k \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar\u0131 atacaqs\u0131n\u0131z?Cavab:\u00a0 \u00a0 \u00a0T\u0259hl\u00fck\u0259siz serverl\u0259r m\u0259lumatlar\u0131 icaz\u0259siz \u0259l\u0259 ke\u00e7irm\u0259kd\u0259n qorumaq \u00fc\u00e7\u00fcn m\u0259lumatlar\u0131n \u015fifr\u0259l\u0259nm\u0259si v\u0259 \u015fifr\u0259sinin a\u00e7\u0131lmas\u0131 \u00fc\u00e7\u00fcn Secure Sockets Layer (SSL) protokolundan istifad\u0259 edir.Serveri qorumaq \u00fc\u00e7\u00fcn d\u00f6rd sad\u0259 yol var:Add\u0131m 1: Root v\u0259 administrator istifad\u0259\u00e7il\u0259riniz \u00fc\u00e7\u00fcn t\u0259hl\u00fck\u0259siz parolunuz oldu\u011fundan \u0259min olunAdd\u0131m 2: Sizin etm\u0259li oldu\u011funuz n\u00f6vb\u0259ti \u015fey sisteminizd\u0259 yeni istifad\u0259\u00e7il\u0259r yaratmaqd\u0131r. Bunlar sistemi idar\u0259 etm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 etdiyiniz istifad\u0259\u00e7il\u0259r olacaqAdd\u0131m 3: default root\/administrator hesablar\u0131ndan uzaqdan giri\u015fi silinAdd\u0131m 4: N\u00f6vb\u0259ti add\u0131m uzaqdan giri\u015f \u00fc\u00e7\u00fcn Firewall qaydalar\u0131n\u0131z\u0131 konfiqurasiya etm\u0259kdir14. M\u0259lumat s\u0131zmas\u0131n\u0131(Data Leakage) izah edinCvaab: M\u0259lumat s\u0131zmas\u0131 m\u0259lumatlar\u0131n t\u0259\u015fkilat daxilind\u0259n icaz\u0259siz k\u0259nar t\u0259yinat yerin\u0259 q\u0259sd\u0259n v\u0259 ya ist\u0259m\u0259d\u0259n \u00f6t\u00fcr\u00fclm\u0259sidir. Bu, m\u0259xfi m\u0259lumat\u0131n icaz\u0259siz quruma a\u00e7\u0131qlanmas\u0131d\u0131r.M\u0259lumat s\u0131zmas\u0131 nec\u0259 ba\u015f verdiyin\u0259 g\u00f6r\u0259 3 kateqoriyaya b\u00f6l\u00fcn\u0259 bil\u0259r:1. T\u0259sad\u00fcfi pozulma: M\u00fc\u0259ssis\u0259 s\u0259hv v\u0259 ya kobud n\u00f6qteyi-n\u0259z\u0259rd\u0259n icaz\u0259siz \u015f\u0259xs\u0259 m\u0259lumat g\u00f6nd\u0259rir2. Q\u0259sd\u0259n pozma: S\u0259lahiyy\u0259tli qurum m\u0259qs\u0259dli \u015f\u0259kild\u0259 icaz\u0259siz quruma m\u0259lumatlar\u0131 g\u00f6nd\u0259rir3. Sistem Hack: Hacking \u00fcsullar\u0131 m\u0259lumat s\u0131zmas\u0131na s\u0259b\u0259b olmaq \u00fc\u00e7\u00fcn istifad\u0259 olunurDLP (Data Leakage Prevention) Al\u0259tl\u0259ri kimi tan\u0131nan al\u0259tl\u0259r, proqram t\u0259minat\u0131 v\u0259 strategiyalardan istifad\u0259 etm\u0259kl\u0259 m\u0259lumat s\u0131zmas\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 almaq olar.15. \u00dcmumi kiberh\u00fccumlardan b\u0259zil\u0259ri hans\u0131lard\u0131r?Cavab: A\u015fa\u011f\u0131da sisteminiz\u0259 m\u0259nfi t\u0259sir g\u00f6st\u0259r\u0259 bil\u0259c\u0259k b\u0259zi \u00fcmumi kiberh\u00fccumlar verilmi\u015fdir.MalwarePhishingPassword AttacksDDoSMan in the MiddleDrive-By DownloadsMalvertisingRogue Software16. Port Scanning n\u0259dir?\u00a0 \u00a0Cavab: Port Skanlama, hostda m\u00f6vcud olan a\u00e7\u0131q portlar\u0131 v\u0259 xidm\u0259ti m\u00fc\u0259yy\u0259n etm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259n texnikad\u0131r. Hakerl\u0259r z\u0259iflikl\u0259rd\u0259n istifad\u0259 etm\u0259k \u00fc\u00e7\u00fcn faydal\u0131 ola bil\u0259c\u0259k m\u0259lumatlar\u0131 tapmaq \u00fc\u00e7\u00fcn port skan\u0131ndan istifad\u0259 edirl\u0259r.\u0130dar\u0259\u00e7il\u0259r \u015f\u0259b\u0259k\u0259nin t\u0259hl\u00fck\u0259sizlik siyas\u0259tl\u0259rini yoxlamaq \u00fc\u00e7\u00fcn Port Skanlamas\u0131ndan istifad\u0259 edirl\u0259r.\u00dcmumi Port Skanlama Texnikalar\u0131ndan b\u0259zil\u0259ri bunlard\u0131r:Ping ScanTCP Half-OpenTCP ConnectUDPStealth Scanning17. Brute Force Attack n\u0259dir? Bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 ala bil\u0259rsiniz?\u00a0 \u00a0Cavab: Brute Force, m\u00fcmk\u00fcn etimadnam\u0259l\u0259rin b\u00fct\u00fcn d\u0259yi\u015fm\u0259l\u0259rini v\u0259 kombinasiyalar\u0131n\u0131 t\u0259krar-t\u0259krar s\u0131namaqla d\u00fczg\u00fcn etimadnam\u0259l\u0259ri tapmaq \u00fcsuludur.\u018fks\u0259r hallarda Brute Force h\u00fccumlar\u0131 avtomatla\u015fd\u0131r\u0131l\u0131r, burada al\u0259t\/proqram avtomatik olaraq etimadnam\u0259l\u0259r siyah\u0131s\u0131 il\u0259 daxil olma\u011fa \u00e7al\u0131\u015f\u0131r. Brute Force h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 alma\u011f\u0131n m\u00fcxt\u0259lif yollar\u0131 var.Onlardan b\u0259zil\u0259ri bunlard\u0131r:Parolun uzunlu\u011fu: Siz parol \u00fc\u00e7\u00fcn minimum uzunluq t\u0259yin ed\u0259 bil\u0259rsiniz. \u015eifr\u0259 n\u0259 q\u0259d\u0259r uzun olsa, onu tapmaq bir o q\u0259d\u0259r \u00e7\u0259tindir.\u015eifr\u0259 M\u00fcr\u0259kk\u0259bliyi: Parolda simvollar\u0131n m\u00fcxt\u0259lif formatlar\u0131n\u0131n daxil edilm\u0259si kobud g\u00fcc h\u00fccumlar\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir. X\u00fcsusi simvollar v\u0259 b\u00f6y\u00fck v\u0259 ki\u00e7ik h\u0259rfl\u0259rl\u0259 birlikd\u0259 alfa-r\u0259q\u0259m parollar\u0131ndan istifad\u0259 parol m\u00fcr\u0259kk\u0259bliyini art\u0131r\u0131r v\u0259 s\u0131nd\u0131r\u0131lmas\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir.Giri\u015f c\u0259hdl\u0259rinin m\u0259hdudla\u015fd\u0131r\u0131lmas\u0131: Giri\u015f u\u011fursuzluqlar\u0131na limit t\u0259yin edin. M\u0259s\u0259l\u0259n, giri\u015f x\u0259talar\u0131 \u00fc\u00e7\u00fcn limiti 3 kimi t\u0259yin ed\u0259 bil\u0259rsiniz. Bel\u0259likl\u0259, ard\u0131c\u0131l 3 giri\u015f u\u011fursuzlu\u011fu olduqda, istifad\u0259\u00e7inin bir m\u00fcdd\u0259t daxil olmas\u0131n\u0131 m\u0259hdudla\u015fd\u0131r\u0131n v\u0259 ya n\u00f6vb\u0259ti d\u0259f\u0259 daxil olmas\u0131, istifad\u0259 etm\u0259si \u00fc\u00e7\u00fcn E-po\u00e7t v\u0259 ya OTP g\u00f6nd\u0259rin. Brute Force avtomatla\u015fd\u0131r\u0131lm\u0131\u015f proses oldu\u011fundan, giri\u015f c\u0259hdl\u0259rini m\u0259hdudla\u015fd\u0131rmaq Brute Force prosesini pozacaq.18. OSI modelinin m\u00fcxt\u0259lif t\u0259b\u0259q\u0259l\u0259ri hans\u0131lard\u0131r?\u00a0 \u00a0 \u00a0Cavab: OSI modeli, proqramlar\u0131n \u015f\u0259b\u0259k\u0259 \u00fcz\u0259rind\u0259n nec\u0259 \u0259laq\u0259 saxlayaca\u011f\u0131na dair \u0259laq\u0259li istinad modelidir. OSI referans\u0131n\u0131n m\u0259qs\u0259di r\u0259q\u0259msal kommunikasiya m\u0259hsullar\u0131 v\u0259 software proqramlar\u0131n\u0131n qar\u015f\u0131l\u0131ql\u0131 f\u0259aliyy\u0259t g\u00f6st\u0259r\u0259 bilm\u0259si \u00fc\u00e7\u00fcn sat\u0131c\u0131lara v\u0259 t\u0259rtibat\u00e7\u0131lara r\u0259hb\u0259rlik etm\u0259kdir.Fiziki s\u0259viyy\u0259(Physical): R\u0259q\u0259msal m\u0259lumatlar\u0131n rabit\u0259 vasit\u0259si il\u0259 g\u00f6nd\u0259ricid\u0259n al\u0131c\u0131ya \u00f6t\u00fcr\u00fclm\u0259sin\u0259 cavabdehdirData Link Layer: Veril\u0259nl\u0259rin fiziki ke\u00e7id\u0259 v\u0259 oradan h\u0259r\u0259k\u0259tini idar\u0259 edir. O, h\u0259m\u00e7inin m\u0259lumat bitl\u0259rinin kodla\u015fd\u0131r\u0131lmas\u0131 v\u0259 dekodlanmas\u0131na cavabdehdir.\u015e\u0259b\u0259k\u0259 s\u0259viyy\u0259si: Paketin y\u00f6nl\u0259ndirilm\u0259si v\u0259 \u015f\u0259b\u0259k\u0259 rabit\u0259si \u00fc\u00e7\u00fcn mar\u015frutla\u015fd\u0131rma yollar\u0131n\u0131n t\u0259min edilm\u0259sin\u0259 cavabdehdir.N\u0259qliyyat Layeri: \u015e\u0259b\u0259k\u0259 \u00fcz\u0259rind\u0259n end-to-end rabit\u0259y\u0259 cavabdehdir. O, m\u0259lumat\u0131 yuxar\u0131dak\u0131 t\u0259b\u0259q\u0259d\u0259n ay\u0131r\u0131r v\u0259 \u015e\u0259b\u0259k\u0259 Layerin\u0259 \u00f6t\u00fcr\u00fcr v\u0259 sonra b\u00fct\u00fcn m\u0259lumatlar\u0131n q\u0259buledicinin sonuna u\u011furla \u00e7atmas\u0131n\u0131 t\u0259min edir.Session Layer: G\u00f6nd\u0259r\u0259n v\u0259 q\u0259bul ed\u0259n aras\u0131nda \u0259laq\u0259ni idar\u0259 edir. O, sessiyan\u0131n ba\u015flamas\u0131, ba\u015fa \u00e7atmas\u0131 v\u0259 idar\u0259 edilm\u0259sin\u0259, g\u00f6nd\u0259rici il\u0259 q\u0259buledici aras\u0131nda qar\u015f\u0131l\u0131ql\u0131 \u0259laq\u0259nin qurulmas\u0131na, saxlanmas\u0131na v\u0259 sinxronla\u015fd\u0131r\u0131lmas\u0131na cavabdehdir.T\u0259qdimat Layeri: Bu, xam dataqramlar v\u0259 ya paketl\u0259r g\u00f6nd\u0259rm\u0259k \u0259v\u0259zin\u0259 veril\u0259nl\u0259rin d\u00fczg\u00fcn formatda v\u0259 m\u0259lumat strukturunda t\u0259qdim edilm\u0259si il\u0259 m\u0259\u015f\u011ful olur.T\u0259tbiq Layeri: T\u0259tbiq v\u0259 \u015f\u0259b\u0259k\u0259 aras\u0131nda interfeys t\u0259min edir. O, prosesd\u0259n proses\u0259 rabit\u0259y\u0259 diqq\u0259t yetirir v\u0259 \u00fcnsiyy\u0259t interfeysini t\u0259min edir.\u00a0 \u00a0\u00a019. VPN n\u0259dir?Cavab: Dem\u0259k olar ki, b\u00fct\u00fcn Kibert\u0259hl\u00fck\u0259sizlik M\u00fcsahib\u0259 Suallar\u0131na bu sual daxil edilir. VPN Virtual \u015e\u0259xsi \u015e\u0259b\u0259k\u0259 dem\u0259kdir. T\u0259hl\u00fck\u0259siz v\u0259 \u015fifr\u0259li \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn istifad\u0259 olunur. Bir VPN istifad\u0259 ed\u0259rk\u0259n, m\u00fc\u015ft\u0259rid\u0259n g\u0259l\u0259n m\u0259lumatlar VPN-d\u0259 \u015fifr\u0259l\u0259ndiyi bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir v\u0259 sonra internet vasit\u0259sil\u0259 ba\u015fqa bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir.Bu zaman veril\u0259nl\u0259rin \u015fifr\u0259si a\u00e7\u0131l\u0131r v\u0259 server\u0259 g\u00f6nd\u0259rilir. Server cavab g\u00f6nd\u0259rdikd\u0259, cavab VPN-in \u015fifr\u0259l\u0259ndiyi bir n\u00f6qt\u0259y\u0259 v\u0259 bu \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat VPN-in \u015fifr\u0259sinin a\u00e7\u0131ld\u0131\u011f\u0131 ba\u015fqa bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir. V\u0259 n\u0259hay\u0259t, \u015fifr\u0259si a\u00e7\u0131lm\u0131\u015f m\u0259lumatlar m\u00fc\u015ft\u0259riy\u0259 g\u00f6nd\u0259rilir. VPN-d\u0259n istifad\u0259 etm\u0259yin b\u00fct\u00fcn m\u0259qs\u0259di \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat \u00f6t\u00fcr\u00fclm\u0259sini t\u0259min etm\u0259kdir.20. \u015e\u0259b\u0259k\u0259d\u0259 Risk, Z\u0259iflik v\u0259 T\u0259hdid dedikd\u0259 n\u0259 ba\u015fa d\u00fc\u015f\u00fcrs\u00fcn\u00fcz?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Cvaab: T\u0259hdid: Sistem\u0259 v\u0259 ya t\u0259\u015fkilata z\u0259r\u0259r vurma potensial\u0131 olan kims\u0259Z\u0259iflik: Potensial haker t\u0259r\u0259find\u0259n istifad\u0259 edil\u0259 bil\u0259n sistemd\u0259ki z\u0259iflikRisk: T\u0259hl\u00fck\u0259li z\u0259iflikd\u0259n istifad\u0259 etdikd\u0259 itki v\u0259 ya z\u0259d\u0259l\u0259nm\u0259 potensial\u013121. Black Hat, White Hat v\u0259 Gray Hat hakerl\u0259ri n\u0259dir?\u00a0 \u00a0Cavab:Blach Hat hakerl\u0259r komp\u00fcter \u015f\u0259b\u0259k\u0259l\u0259rin\u0259 m\u00fcdaxil\u0259 haqq\u0131nda geni\u015f biliy\u0259 malik olmaqlar\u0131 il\u0259 tan\u0131n\u0131rlar. Onlar bu sisteml\u0259r\u0259 daxil olmaq \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259n z\u0259r\u0259rli proqramlar yaza bilirl\u0259r. Bu tip hakerl\u0259r m\u0259lumat o\u011furlamaq v\u0259 ya s\u0131nd\u0131r\u0131lm\u0131\u015f sistemd\u0259n z\u0259r\u0259rli m\u0259qs\u0259dl\u0259r \u00fc\u00e7\u00fcn \u00f6z bacar\u0131qlar\u0131ndan sui-istifad\u0259 edirl\u0259r.White Hat hakerl\u0259r \u00f6z s\u0259lahiyy\u0259tl\u0259rini yax\u015f\u0131 i\u015fl\u0259r \u00fc\u00e7\u00fcn istifad\u0259 edirl\u0259r v\u0259 buna g\u00f6r\u0259 d\u0259 onlara Etik Hakerl\u0259r deyilir. Onlar Black Hat hackerler il\u0259 eyni biliy\u0259 malik olurlar. Bunlar \u0259sas\u0259n \u015firk\u0259tl\u0259r t\u0259r\u0259find\u0259n sisteml\u0259rd\u0259 z\u0259iflikl\u0259ri v\u0259 t\u0259hl\u00fck\u0259sizlik bo\u015fluqlar\u0131n\u0131 tapma\u011fa v\u0259 d\u00fcz\u0259ltm\u0259y\u0259 \u00e7al\u0131\u015fan bir t\u0259hl\u00fck\u0259sizlik m\u00fct\u0259x\u0259ssisi kimi i\u015f\u0259 g\u00f6t\u00fcr\u00fcl\u00fcrl\u0259r. Onlar t\u0259hl\u00fck\u0259sizliyi yax\u015f\u0131la\u015fd\u0131rmaq \u00fc\u00e7\u00fcn \u00f6z bacar\u0131qlar\u0131ndan istifad\u0259 edirl\u0259r.Gray Hat hakerl\u0259r White v\u0259 Black Hat hakerinin birl\u0259\u015fm\u0259sidir. Sahibinin icaz\u0259si olmadan sistem z\u0259iflikl\u0259rini axtar\u0131rlar. H\u0259r hans\u0131 bir z\u0259iflik a\u015fkar ed\u0259rl\u0259rs\u0259, bu bar\u0259d\u0259 sahibin\u0259 m\u0259lumat verirl\u0259r. Black Hat hakerl\u0259rd\u0259n f\u0259rqli olaraq, onlar a\u015fkar edilmi\u015f z\u0259iflikl\u0259rd\u0259n istifad\u0259 etmirl\u0259r.22.XSS h\u00fccumunu izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?Cavab:XSS (Saytlararas\u0131 Skriptl\u0259m\u0259) hakerl\u0259r\u0259 veb s\u0259hif\u0259l\u0259r\u0259 z\u0259r\u0259rli client-side skriptl\u0259ri yeritm\u0259y\u0259 imkan ver\u0259n kiberh\u00fccumdur. XSS sessiyalar\u0131 v\u0259 kukil\u0259ri o\u011furlamaq, DOM-u d\u0259yi\u015fdirm\u0259k, remote code execution, serveri s\u0131nd\u0131rmaq v\u0259 s. \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r.XSS-in n\u00f6vl\u0259ri-\u00a0 \u00a0 \u00a0 \u00a0Reflected XSS-\u00a0 \u00a0 \u00a0 \u00a0Stored XSS-\u00a0 \u00a0 \u00a0 \u00a0DOM Based XSSA\u015fa\u011f\u0131dak\u0131 t\u0259cr\u00fcb\u0259l\u0259rd\u0259n istifad\u0259 etm\u0259kl\u0259 XSS h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:\u0130stifad\u0259\u00e7i daxiletm\u0259l\u0259rini t\u0259sdiql\u0259yin (Validate user inputs)\u00b7\u00a0 \u00a0 \u00a0 \u00a0\u0130stifad\u0259\u00e7i giri\u015fl\u0259rini t\u0259mizl\u0259yin (Sanitize user inputs)X\u00fcsusi simvollar\u0131 kodlay\u0131n(Encode special characters)Anti-XSS xidm\u0259tl\u0259rind\u0259n\/al\u0259tl\u0259rind\u0259n istifad\u0259 edin (Use Anti-XSS services\/tools)XSS HTML Filtrind\u0259n istifad\u0259 edin(Use XSS HTML Filter)24. Botnet n\u0259dir?Cavab: Botnet, h\u0259r bir cihaz\u0131n \u00fcz\u0259rind\u0259 bir v\u0259 ya daha \u00e7ox botun i\u015fl\u0259diyi internet\u0259 qo\u015fulmu\u015f bir s\u0131ra cihazlard\u0131r.Qur\u011fulardak\u0131 botlar v\u0259 z\u0259r\u0259rli skriptl\u0259r qurban\u0131 s\u0131nd\u0131rmaq \u00fc\u00e7\u00fcn istifad\u0259 olunurdu. Botnetl\u0259r m\u0259lumatlar\u0131 o\u011furlamaq, spam g\u00f6nd\u0259rm\u0259k v\u0259 DDOS h\u00fccumunu h\u0259yata ke\u00e7irm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r.25. SSL v\u0259 TLS-I a\u00e7\u0131qlay\u0131n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0Cavab: SSL g\u00f6nd\u0259r\u0259nin \u015f\u0259xsiyy\u0259tini yoxlamaq \u00fc\u00e7\u00fcn n\u0259z\u0259rd\u0259 tutulub, lakin o, bundan ba\u015fqa he\u00e7 n\u0259 axtarm\u0131r. SSL dan\u0131\u015fd\u0131\u011f\u0131n\u0131z insan\u0131 izl\u0259m\u0259y\u0259 k\u00f6m\u0259k ed\u0259 bil\u0259r, lakin bu da b\u0259z\u0259n aldad\u0131la bil\u0259r.TLS h\u0259m\u00e7inin SSL kimi eynil\u0259\u015fdirm\u0259 vasit\u0259sidir, lakin daha yax\u015f\u0131 t\u0259hl\u00fck\u0259sizlik x\u00fcsusiyy\u0259tl\u0259ri t\u0259klif edir. M\u0259lumatlara \u0259lav\u0259 qorunma t\u0259min edir v\u0259 buna g\u00f6r\u0259 d\u0259 SSL v\u0259 TLS daha yax\u015f\u0131 qorunmaq \u00fc\u00e7\u00fcn tez-tez birlikd\u0259 istifad\u0259 olunur.26. 2FA n\u0259dir v\u0259 ictimai vebsaytlar \u00fc\u00e7\u00fcn nec\u0259 t\u0259tbiq oluna bil\u0259r?\u00a0 \u00a0Cavab: \"\u00c7ox faktorlu autentifikasiya\" kimi tan\u0131nan \u0259lav\u0259 t\u0259hl\u00fck\u0259sizlik s\u0259viyy\u0259sidir.Yaln\u0131z parol v\u0259 istifad\u0259\u00e7i ad\u0131 deyil, h\u0259m d\u0259 yaln\u0131z v\u0259 yaln\u0131z h\u0259min istifad\u0259\u00e7inin onlarda olan bir \u015feyi, y\u0259ni ancaq onlar\u0131n bilm\u0259li olduqlar\u0131 v\u0259 ya d\u0259rhal \u0259ld\u0259 etm\u0259li oldu\u011fu bir m\u0259lumat\u0131, m\u0259s\u0259l\u0259n, fiziki token t\u0259l\u0259b edir.Authenticator proqramlar\u0131 m\u0259tn, s\u0259sli z\u0259ng v\u0259 ya e-po\u00e7t vasit\u0259sil\u0259 do\u011frulama kodu \u0259ld\u0259 etm\u0259k ehtiyac\u0131n\u0131 \u0259v\u0259z edir.Bu Proqramlara n\u00fcmun\u0259 kimi Google Authenticator v\u0259 Autify kimi proqramlar\u0131 g\u00f6st\u0259rm\u0259k olar.27. Fi\u015finqi izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?Cavab:Fi\u015finq kiberh\u00fccumdur ki, burada haker etibarl\u0131 \u015f\u0259xs v\u0259 ya biznes kimi maskalan\u0131r v\u0259 saxta e-po\u00e7t v\u0259 ya ani mesaj vasit\u0259sil\u0259 h\u0259ssas maliyy\u0259 v\u0259 ya \u015f\u0259xsi m\u0259lumatlar\u0131 o\u011furlama\u011fa \u00e7al\u0131\u015f\u0131rA\u015fa\u011f\u0131dak\u0131 \u00fcsullardan istifad\u0259 etm\u0259kl\u0259 fi\u015finq h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:\u00b7\u00a0 \u00a0 \u00a0 \u00a0Etibar etm\u0259diyiniz veb s\u0259hif\u0259l\u0259r\u0259 h\u0259ssas m\u0259lumatlar\u0131 daxil etm\u0259yin\u00b7\u00a0 \u00a0 \u00a0 \u00a0Sayt\u0131n t\u0259hl\u00fck\u0259sizliyini yoxlay\u0131n\u00b7\u00a0 \u00a0 \u00a0 \u00a0Firewall-lardan istifad\u0259 edin\u00b7\u00a0 \u00a0 \u00a0 \u00a0\u0130nternet T\u0259hl\u00fck\u0259sizliyi olan AntiVirus Proqram\u0131ndan istifad\u0259 edin\u00b7\u00a0 \u00a0 \u00a0 \u00a0Anti-Fi\u015finq Al\u0259tl\u0259r Panelind\u0259n istifad\u0259 edin28. SQL Enjeksiyonunu izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?Cavab: SQL Injection (SQLi) t\u0259cav\u00fczkar\u0131n veb t\u0259tbiqinin veril\u0259nl\u0259r bazas\u0131 serverin\u0259 n\u0259zar\u0259t etm\u0259k \u00fc\u00e7\u00fcn z\u0259r\u0259rli SQL sor\u011fular\u0131n\u0131 yerin\u0259 yetirm\u0259k \u00fc\u00e7\u00fcn server\u0259 g\u00f6nd\u0259ril\u0259n m\u0259lumatlar\u0131 manipulyasiya etdiyi, bununla da icaz\u0259siz m\u0259lumatlara daxil olmaq, d\u0259yi\u015fdirm\u0259k v\u0259 silm\u0259k \u00fc\u00e7\u00fcn kod yeritm\u0259 h\u00fccumudur. Bu h\u00fccum \u0259sas\u0259n veril\u0259nl\u0259r bazas\u0131 serverl\u0259rini \u0259l\u0259 ke\u00e7irm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunur.A\u015fa\u011f\u0131dak\u0131 t\u0259cr\u00fcb\u0259l\u0259rd\u0259n istifad\u0259 etm\u0259kl\u0259 SQL Injection h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:\u00b7\u00a0 \u00a0 \u00a0 \u00a0Haz\u0131rlanm\u0131\u015f ifad\u0259l\u0259ri daxil edin (parametrl\u0259\u015fdirilmi\u015f sor\u011fularla)\u00b7\u00a0 \u00a0 \u00a0 \u00a0Saxlan\u0131lan Prosedurlardan istifad\u0259 edin\u0130stifad\u0259\u00e7i daxiletm\u0259sini t\u0259sdiq edin(Validate user input)\u00b7\u00a0 \u00a0 \u00a0 \u00a0Error mesaj\u0131ndan m\u0259lumatlar\u0131 gizl\u0259din\u00b7\u00a0 \u00a0 \u00a0 \u00a0Sisteminizi yenil\u0259yinVeril\u0259nl\u0259r bazas\u0131 etimadnam\u0259sini ayr\u0131 v\u0259 \u015fifr\u0259l\u0259nmi\u015f \u015f\u0259kild\u0259 saxlay\u0131nShell v\u0259 ehtiyac\u0131n\u0131z olmayan h\u0259r hans\u0131 dig\u0259r funksiyalar\u0131 s\u00f6nd\u00fcr\u00fcn29. T\u0259hl\u00fck\u0259sizlik s\u0259hv konfiqurasiyas\u0131(security misconfiguration) n\u0259dir?Cavab:Security Misconfiguration t\u0259hl\u00fck\u0259siz olmayan konfiqurasiya se\u00e7imi s\u0259b\u0259bind\u0259n proqram\/\u015f\u0259b\u0259k\u0259\/cihaz h\u00fccuma m\u0259ruz qald\u0131qda ba\u015f ver\u0259 bil\u0259c\u0259k z\u0259iflikdir. Bu, standart istifad\u0259\u00e7i ad\u0131\/parolun d\u0259yi\u015fm\u0259z saxlan\u0131lmas\u0131 q\u0259d\u0259r sad\u0259 ola bil\u0259r.30. Remote Desktop Protocol (RDP) n\u0259dir?Cavab:-\u00a0 \u00a0 \u00a0 \u00a0RDP (Remote Desktop Protocol) x\u00fcsusi olaraq m\u00fc\u015ft\u0259ri cihazlar\u0131, istifad\u0259\u00e7il\u0259r v\u0259 virtual \u015f\u0259b\u0259k\u0259 serveri aras\u0131nda proqram m\u0259lumatlar\u0131n\u0131n \u00f6t\u00fcr\u00fclm\u0259si t\u0259hl\u00fck\u0259sizliyi v\u0259 \u015fifr\u0259l\u0259m\u0259si \u00fc\u00e7\u00fcn n\u0259z\u0259rd\u0259 tutulmu\u015f Microsoft protokoludur.-\u00a0 \u00a0 \u00a0 \u00a0Bu, administratorlara f\u0259rdi abun\u0259\u00e7il\u0259rin qar\u015f\u0131la\u015fd\u0131\u011f\u0131 probleml\u0259ri uzaqdan qiym\u0259tl\u0259ndirm\u0259y\u0259 v\u0259 h\u0259ll etm\u0259y\u0259 imkan verir.-\u00a0 \u00a0 \u00a0 \u00a0O, \u00e7oxn\u00f6qt\u0259li \u00f6t\u00fcrm\u0259 t\u0259min etm\u0259kl\u0259 64.000-\u0259 q\u0259d\u0259r ayr\u0131 m\u0259lumat kanal\u0131n\u0131 d\u0259st\u0259kl\u0259yir.31. Address Resolution Protocol (ARP) n\u0259 \u00fc\u00e7\u00fcn istifad\u0259 olunur?Cavab: ARP x\u00fcsusi olaraq IP \u015f\u0259b\u0259k\u0259 \u00fcnvanlar\u0131n\u0131 Ethernet \u00fcnvanlar\u0131 kimi fiziki \u00fcnvanlarla \u0259laq\u0259l\u0259ndirm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunan protokoldur.32 bitlik \u00fcnvanlar\u0131 48 bitlik \u00fcnvanlara v\u0259 \u0259ksin\u0259 t\u0259rc\u00fcm\u0259 edir. Bu laz\u0131md\u0131r, \u00e7\u00fcnki bu g\u00fcn istifad\u0259 etdiyimiz internet protokolunun (IP) \u0259n \u00fcmumi s\u0259viyy\u0259si 32 bit uzunlu\u011funda v\u0259 MAC \u00fcnvanlar\u0131 48 bit uzunlu\u011fundad\u0131r.33. \u015e\u0259b\u0259k\u0259 t\u0259hl\u00fck\u0259sizliyi \u00fc\u00e7\u00fcn autentifikasiyan\u0131n \u00fcmumi \u00fcsullar\u0131 hans\u0131lard\u0131r?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Cavab: Biometrics - Bu, istifad\u0259\u00e7inin \u015f\u0259xsiyy\u0259tini yoxlamaq \u00fc\u00e7\u00fcn x\u00fcsusi olaraq istifad\u0259 edil\u0259n m\u0259lum v\u0259 qeyd\u0259 al\u0131nm\u0131\u015f fiziki atributudurToken - Sisteml\u0259r\u0259 daxil olmaq \u00fc\u00e7\u00fcn tokenl\u0259rd\u0259n d\u0259 istifad\u0259 olunur. Bu, hakerl\u0259rin etimadnam\u0259l\u0259r\u0259 malik olduqlar\u0131 halda hesablara daxil olmalar\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir.Transaction Authentication - Bird\u0259f\u0259lik pin v\u0259 ya parol, onlar\u0131n \u015f\u0259xsiyy\u0259tini t\u0259sdiql\u0259y\u0259n onlayn \u0259m\u0259liyyatlar\u0131n i\u015fl\u0259nm\u0259si zaman\u0131 istifad\u0259 olunur.Multi-Factor Authentication - Bu, bird\u0259n \u00e7ox autentifikasiya metoduna ehtiyac\u0131 olan bir t\u0259hl\u00fck\u0259sizlik sistemidir.Out-of-Band Authentication - Bu autentifikasiya iki f\u0259rqli kanaldan v\u0259 ya \u015f\u0259b\u0259k\u0259d\u0259n iki f\u0259rqli siqnal t\u0259l\u0259b edir. Bu, onlayn bank\u00e7\u0131l\u0131qda h\u00fccumlar\u0131n \u0259ks\u0259riyy\u0259tinin hack v\u0259 \u015f\u0259xsiyy\u0259t o\u011furlanmas\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 al\u0131r.34. Hashing v\u0259 Salting aras\u0131ndak\u0131 f\u0259rq n\u0259dir?Cavab:\u00a0 \u00a0 Hashing \u0259sas\u0259n autentifikasiya \u00fc\u00e7\u00fcn istifad\u0259 olunur v\u0259 m\u0259lumatlar\u0131n sabit uzunluqlu d\u0259y\u0259r\u0259 planla\u015fd\u0131r\u0131ld\u0131\u011f\u0131 birt\u0259r\u0259fli funksiyad\u0131r.Salting hash \u00fc\u00e7\u00fcn \u0259lav\u0259 bir add\u0131md\u0131r, burada \u015fifr\u0259y\u0259 salt \u0259lav\u0259 olunur v\u0259 o \u015f\u0259kild\u0259 hashl\u0259nir35. Stored v\u0259 Reflected XSS aras\u0131ndak\u0131 f\u0259rq n\u0259dir?Cavab: Stored XSS attacks - Enjekte edilmi\u015f skriptl\u0259rin h\u0259d\u0259f serverl\u0259rd\u0259 qal\u0131c\u0131 olaraq saxland\u0131\u011f\u0131 h\u00fccumlara deyilir. Bununla birlikd\u0259 qurban saxlan\u0131lan m\u0259lumatlar\u0131 h\u0259r d\u0259f\u0259 t\u0259l\u0259b etdikd\u0259 z\u0259r\u0259rli script yenid\u0259n i\u015f\u0259 d\u00fc\u015f\u00fcr.Reflected XSS Attacks \u2013 Stored XSS-d\u0259n f\u0259rqli olaraq bu tip XSS serverd\u0259 qal\u0131c\u0131 olaraq qalm\u0131r v\u0259 bir anl\u0131q ba\u015f verir v\u0259 bitir.37. \u015e\u0259xsiyy\u0259t o\u011furlu\u011funun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?\u00a0 \u00a0 \u00a0 \u00a0\u00a0\u00b7\u00a0 \u00a0 \u00a0 \u015e\u0259xsi qeydl\u0259rinizi qoruyun.\u00b7\u00a0 \u00a0 \u00a0 M\u0259xfi m\u0259lumatlar\u0131n onlayn payla\u015f\u0131lmas\u0131ndan \u00e7\u0259kinin.\u00b7\u00a0 \u00a0 \u00a0 G\u00fccl\u00fc parollardan istifad\u0259 edin v\u0259 onlar\u0131 m\u00fcnt\u0259z\u0259m olaraq d\u0259yi\u015fdirin.\u00b7\u00a0 \u00a0 \u00a0 Etibars\u0131z saytlarda bank m\u0259lumatlar\u0131n\u0131z\u0131 t\u0259qdim etm\u0259yin.\u00b7\u00a0 \u00a0 \u00a0 \u0130l\u0259ri s\u0259viyy\u0259 firewall v\u0259 spyware al\u0259tl\u0259ri vasit\u0259l\u0259ri il\u0259 sisteminizi qoruyun.\u00b7\u00a0 \u00a0 \u00a0 Brauzerl\u0259rinizi, sisteminizi v\u0259 proqram t\u0259minat\u0131n\u0131z\u0131 \u0259n son versiyada tutun.38. LAN daxilind\u0259 port bloklanmas\u0131 n\u0259dir?\u00a0 \u00a0Cavab: Bu, istifad\u0259\u00e7il\u0259rin yerli \u015f\u0259b\u0259k\u0259 daxilind\u0259 bir s\u0131ra xidm\u0259tl\u0259r\u0259 daxil olmas\u0131n\u0131 m\u0259hdudla\u015fd\u0131rma\u011fa k\u00f6m\u0259k edir. \u018fsas m\u0259qs\u0259d m\u0259nb\u0259nin portlar vasit\u0259sil\u0259 t\u0259yinat adresin\u0259 \u00e7\u0131x\u0131\u015f t\u0259min etm\u0259sini dayand\u0131rmaqd\u0131r. B\u00fct\u00fcn proqramlar portlarda i\u015fl\u0259diyi \u00fc\u00e7\u00fcn icaz\u0259siz giri\u015fi m\u0259hdudla\u015fd\u0131rmaq \u00fc\u00e7\u00fcn portlar\u0131 bloklamaq laz\u0131md\u0131r ki, bu da \u015f\u0259b\u0259k\u0259 infrastrukturunda t\u0259hl\u00fck\u0259sizlik z\u0259ifliyini poza bil\u0259r.41. Veril\u0259nl\u0259r bazas\u0131ndan \u00e7\u0131xar\u0131lan a\u015fa\u011f\u0131dak\u0131 parollar\u0131n siyah\u0131s\u0131na bax\u0131n:\u00a0\u00a0A. Password1B. @#$)*&^%C. UcSc4Evr!D. akHGksmLNCavab:A\u015fa\u011f\u0131dak\u0131 parollardan hans\u0131 UCSC-nin parol t\u0259l\u0259bl\u0259rin\u0259 cavab verir? Cavab UcSc4Evr! Bu, a\u015fa\u011f\u0131dak\u0131 UCSC t\u0259l\u0259bl\u0259rinin ham\u0131s\u0131na cavab ver\u0259n yegan\u0259 se\u00e7imdir:42. Kiber h\u00fccum\u00e7ular\u0131n n\u00f6vl\u0259rini sadalay\u0131nD\u00f6rd n\u00f6v kiber h\u00fccum\u00e7u var.43.SRM dey\u0259rk\u0259n n\u0259yi n\u0259z\u0259rd\u0259 tutursunuz?Cavab: SRM T\u0259hl\u00fck\u0259sizlik Referans Monitoru m\u0259nas\u0131n\u0131 verir, komp\u00fcter s\u00fcr\u00fcc\u00fcl\u0259rin\u0259 obyekt\u0259 giri\u015f h\u00fcquqlar\u0131n\u0131 verm\u0259k \u00fc\u00e7\u00fcn rutinl\u0259r t\u0259qdim edir.56.Komp\u00fcter virusu n\u0259dir?Cavab:Virus istifad\u0259\u00e7inin raz\u0131l\u0131\u011f\u0131 olmadan h\u0259yata ke\u00e7iril\u0259n z\u0259r\u0259rli proqramd\u0131r. Viruslar CPU vaxt\u0131 v\u0259 yadda\u015f kimi komp\u00fcter resurslar\u0131n\u0131 istehlak ed\u0259 bil\u0259r. B\u0259z\u0259n virus dig\u0259r komp\u00fcter proqramlar\u0131nda d\u0259yi\u015fiklikl\u0259r edir v\u0259 komp\u00fcter sistemin\u0259 z\u0259r\u0259r verm\u0259k \u00fc\u00e7\u00fcn \u00f6z kodunu daxil edir.Komp\u00fcter virusu a\u015fa\u011f\u0131dak\u0131lar \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r:\u0130stifad\u0259\u00e7i id v\u0259 parol kimi \u015f\u0259xsi m\u0259lumatlara daxil olun\u0130stifad\u0259\u00e7iy\u0259 bezdirici mesajlar g\u00f6st\u0259rinKomp\u00fcterinizd\u0259ki m\u0259lumatlar\u0131n z\u0259d\u0259l\u0259nm\u0259si\u0130stifad\u0259\u00e7inin d\u00fcym\u0259 vuru\u015flar\u0131n\u0131 qeyd edinARP poisoning n\u0259dir?Cavab:\u00a0Address Resolution Protocol z\u0259h\u0259rl\u0259nm\u0259si IP \u00fcnvan\u0131n\u0131n \u015f\u0259b\u0259k\u0259 cihaz\u0131nda fiziki \u00fcnvana \u00e7evrildiyi bir h\u00fccum n\u00f6v\u00fcd\u00fcr. Ev sahibi ARP yay\u0131m\u0131 g\u00f6nd\u0259r\u0259c\u0259k v\u0259 b\u00fct\u00fcn q\u0259buledicil\u0259r fiziki \u00fcnvanlar\u0131 il\u0259 cavab ver\u0259c\u0259kl\u0259r. Ba\u015fqa s\u00f6zl\u0259 des\u0259k, ARP z\u0259h\u0259rl\u0259nm\u0259si, \u015f\u0259b\u0259k\u0259y\u0259 qo\u015fulmu\u015f komp\u00fcterin \u0130P \u00fcnvan\u0131 il\u0259 saxta \u00fcnvanlar\u0131 \u0259laq\u0259l\u0259ndirm\u0259k v\u0259 trafiki qa\u00e7\u0131rmaq \u00fc\u00e7\u00fcn ke\u00e7id\u0259 saxta \u00fcnvanlar g\u00f6nd\u0259rilm\u0259sinin ad\u0131d\u0131r.Bunlar:1) kibercinay\u0259tkarlar2) hacktivistl\u0259r3) daxili t\u0259hdidl\u0259r(\u0130nsider threats\u0259)4) d\u00f6vl\u0259t t\u0259r\u0259find\u0259n d\u0259st\u0259kl\u0259n\u0259n h\u00fccum\u00e7ular(State sponsored).45. \u018fl\u00e7atan olan Hacker Al\u0259tl\u0259ri\u00a0 \u00a0 \u00a0 \u00a0 \u00a0A\u015fa\u011f\u0131da faydal\u0131 hack al\u0259tl\u0259rinin siyah\u0131s\u0131 verilmi\u015fdir.AcunetixWebInspectProbablyNetsparkerAngry IP scanner:Burp SuiteSavvius49.Situasiya #1Cavab:Bank hesab\u0131n\u0131zla ba\u011fl\u0131 probleml\u0259 \u00fczl\u0259\u015fdiyini bildir\u0259n e-po\u00e7t m\u0259ktubu g\u00f6nd\u0259rir. E-po\u00e7t t\u0259limatlar v\u0259 h\u0259m\u00e7inin hesaba daxil olmaq \u00fc\u00e7\u00fcn ke\u00e7idl\u0259 t\u0259min edilir ki, siz onu d\u00fcz\u0259ld\u0259 bil\u0259siniz. Yuxar\u0131dak\u0131 v\u0259ziyy\u0259td\u0259n n\u0259 n\u0259tic\u0259 \u00e7\u0131xar\u0131rs\u0131n\u0131z? izah edin.Bu, ist\u0259nm\u0259y\u0259n e-po\u00e7t kimi g\u00f6r\u00fcn\u00fcr. Siz onu spam kimi bildirm\u0259li v\u0259 e-po\u00e7tu d\u0259rhal istifad\u0259 etdiyiniz m\u00fcvafiq veb m\u00fc\u015ft\u0259rid\u0259 (Yahoo Mail, Gmail v\u0259 s.) zibil qutusuna k\u00f6\u00e7\u00fcrm\u0259lisiniz. Bankla ba\u011fl\u0131 h\u0259r hans\u0131 etimadnam\u0259sini onlayn t\u0259qdim etm\u0259zd\u0259n \u0259vv\u0259l, mesaj\u0131n qanuni olub-olmad\u0131\u011f\u0131n\u0131 v\u0259 bankdan oldu\u011funu yoxlamaq \u00fc\u00e7\u00fcn banka z\u0259ng etm\u0259lisiniz.50. Simmetrik \u015fifr\u0259l\u0259m\u0259 alqoritmin\u0259 b\u0259zi n\u00fcmun\u0259l\u0259r verin.A\u015fa\u011f\u0131da simmetrik \u015fifr\u0259l\u0259m\u0259 alqoritminin b\u0259zi n\u00fcmun\u0259l\u0259ri verilmi\u015fdir.RCxBlowfishRijndael (AES)DES51. ECB v\u0259 CBC-nin abreviaturas\u0131 n\u0259dir?Cavab:ECB-nin tam formas\u0131 Elektron Kod Kitab\u0131d\u0131r v\u0259 CBC-nin tam formas\u0131 Cipher Block Chaining-dir.52.Casus proqram\u0131 m\u00fc\u0259yy\u0259nl\u0259\u015fdirin.Cavab:Casus proqram t\u0259\u015fkilat v\u0259 ya \u015f\u0259xs haqq\u0131nda m\u0259lumatlar\u0131 o\u011furlamaq m\u0259qs\u0259di da\u015f\u0131yan z\u0259r\u0259rli proqramd\u0131r. Bu z\u0259r\u0259rli proqram t\u0259\u015fkilat\u0131n komp\u00fcter sistemin\u0259 z\u0259r\u0259r ver\u0259 bil\u0259r.53. ARP poisoning n\u0259dir?Cavab:Address Resolution Protocol z\u0259h\u0259rl\u0259nm\u0259si IP \u00fcnvan\u0131n\u0131n \u015f\u0259b\u0259k\u0259 cihaz\u0131nda fiziki \u00fcnvana \u00e7evrildiyi bir h\u00fccum n\u00f6v\u00fcd\u00fcr. Ev sahibi ARP yay\u0131m\u0131 g\u00f6nd\u0259r\u0259c\u0259k v\u0259 b\u00fct\u00fcn q\u0259buledicil\u0259r fiziki \u00fcnvanlar\u0131 il\u0259 cavab ver\u0259c\u0259kl\u0259r. Ba\u015fqa s\u00f6zl\u0259 des\u0259k, ARP z\u0259h\u0259rl\u0259nm\u0259si, \u015f\u0259b\u0259k\u0259y\u0259 qo\u015fulmu\u015f komp\u00fcterin \u0130P \u00fcnvan\u0131 il\u0259 saxta \u00fcnvanlar\u0131 \u0259laq\u0259l\u0259ndirm\u0259k v\u0259 trafiki qa\u00e7\u0131rmaq \u00fc\u00e7\u00fcn ke\u00e7id\u0259 saxta \u00fcnvanlar g\u00f6nd\u0259rilm\u0259sinin ad\u0131d\u0131r.54. Fiziki olmayan t\u0259hdidl\u0259rin \u00fcmumi n\u00f6vl\u0259rini s\u0131ralay\u0131n:TrojansAdwareWormsSpywareDoS AttackDistributed DoS AttacksVirusKey loggersPhishingKomp\u00fcter sisteml\u0259rinin resurslar\u0131na icaz\u0259siz giri\u015f55.Nmap n\u0259dir?Cavab: Nmap b\u00fct\u00fcn qo\u015fulmu\u015f cihazlar\u0131 m\u00fc\u0259yy\u0259n etm\u0259k v\u0259 i\u015fl\u0259tdikl\u0259ri \u0259m\u0259liyyat sisteml\u0259ri haqq\u0131nda m\u0259lumat \u00e7atd\u0131rmaq \u00fc\u00e7\u00fcn IP paketl\u0259rind\u0259n istifad\u0259 ed\u0259n \u015f\u0259b\u0259k\u0259 skan al\u0259tidir.56.Sistem \u0259sasl\u0131 h\u00fccumlar\u0131n b\u0259zi n\u00fcmun\u0259l\u0259riVirusBackdoorsBotsWorm57.Veb serverin t\u0259hl\u00fck\u0259sizliyini t\u0259min etm\u0259k \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar at\u0131lmal\u0131d\u0131r?Cavab:Update the ownership of the fileKeep your webserver up-to-dateDisable all extra modulesDelete default scriptsM\u00fc\u0259llif:\u00a0Orkhan Jalalov","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/yusif.az\/main\/?p=6777","og_locale":"az_AZ","og_type":"article","og_title":"Kibert\u0259hl\u00fck\u0259sizlik sah\u0259sind\u0259 veril\u0259n interv\u00fc suallar\u0131 - www.YUSIF.az IT B\u00d6LM\u018fS\u0130","og_description":"A\u015fa\u011f\u0131da b\u0259zi tipik interv\u00fc suallar\u0131 t\u0259qdim edir\u0259m, h\u0259m\u00e7inin suallar\u0131n cavablar\u0131 il\u0259 ba\u011fl\u0131 q\u0131sa izahlar da \u0259lav\u0259 edir\u0259m:1. Kriptoqrafiya n\u0259dir?Cavab: Kriptoqrafiya m\u0259lumat\u0131n icaz\u0259 verilm\u0259diyi \u00fc\u00e7\u00fcnc\u00fc t\u0259r\u0259fl\u0259rd\u0259n m\u0259lumat\u0131 qorumaq \u00fc\u00e7\u00fcn m\u0259xfi m\u0259lumatlar\u0131 kodla\u015fd\u0131r\u0131lm\u0131\u015f \u015f\u0259kild\u0259 \u00e7evirm\u0259k v\u0259 \u00f6t\u00fcrm\u0259k \u00fcsuludur.3. IDS v\u0259 IPS aras\u0131ndak\u0131 f\u0259rq n\u0259dir?Cavab: IDS Intrusion Detection System\u2019dir v\u0259 o, yaln\u0131z m\u00fcdaxil\u0259l\u0259ri a\u015fkarlay\u0131r v\u0259 administrator is\u0259 m\u00fcdaxil\u0259nin qar\u015f\u0131s\u0131n\u0131 almal\u0131d\u0131r.Halbuki, IPS y\u0259ni Intrusion Prevention System-d\u0259 sistem m\u00fcdaxil\u0259ni a\u015fkarlay\u0131r v\u0259 h\u0259m\u00e7inin m\u00fcdaxil\u0259nin qar\u015f\u0131s\u0131n\u0131 almaq \u00fc\u00e7\u00fcn t\u0259dbirl\u0259r g\u00f6r\u00fcr.4. CIA \u00fc\u00e7buca\u011f\u0131n\u0131 a\u00e7\u0131qlay\u0131nCavab: CIA-\u0131n a\u00e7\u0131l\u0131\u015f\u0131 Confidentiality(Konfidensiall\u0131q), Integrity(taml\u0131q) v\u0259 Availability(\u0259l\u00e7atanl\u0131q)-d\u0131r. CIA \u0130nformasiya T\u0259hl\u00fck\u0259sizliyi siyas\u0259tl\u0259rin\u0259 r\u0259hb\u0259rlik etm\u0259k \u00fc\u00e7\u00fcn haz\u0131rlanm\u0131\u015f modeldir. Bu, t\u0259\u015fkilatlar t\u0259r\u0259find\u0259n istifad\u0259 edil\u0259n \u0259n m\u0259\u015fhur modell\u0259rd\u0259n biridir.Konfidensiall\u0131qM\u0259lumat yaln\u0131z s\u0259lahiyy\u0259tli i\u015f\u00e7il\u0259r \u00fc\u00e7\u00fcn \u0259l\u00e7atan v\u0259 oxuna bil\u0259n olmal\u0131d\u0131r. O, icaz\u0259siz i\u015f\u00e7il\u0259r t\u0259r\u0259find\u0259n \u0259l\u00e7atan olmamal\u0131d\u0131r. Kims\u0259 m\u0259lumatlara daxil olmaq \u00fc\u00e7\u00fcn hakerd\u0259n istifad\u0259 ed\u0259rs\u0259, m\u0259lumat g\u00fccl\u00fc \u015f\u0259kild\u0259 \u015fifr\u0259l\u0259nm\u0259lidir ki, m\u0259lumat \u0259ld\u0259 olunsa bel\u0259, oxunaq v\u0259 ya ba\u015fa d\u00fc\u015f\u00fcl\u0259n olmas\u0131n.Taml\u0131qM\u0259lumatlar\u0131n icaz\u0259si olmayan \u015f\u0259xsl\u0259r t\u0259r\u0259find\u0259n d\u0259yi\u015fdirilm\u0259diyind\u0259n \u0259min olmaq \u00fc\u00e7\u00fcnd\u00fcr. D\u00fcr\u00fcstl\u00fck m\u0259lumatlar\u0131n icaz\u0259si olmayan i\u015f\u00e7il\u0259r t\u0259r\u0259find\u0259n pozulmamas\u0131n\u0131 v\u0259 ya d\u0259yi\u015fdirilm\u0259m\u0259sini t\u0259min edir. S\u0259lahiyy\u0259tli \u015f\u0259xs\/sistem m\u0259lumatlar\u0131 d\u0259yi\u015fdirm\u0259y\u0259 \u00e7al\u0131\u015f\u0131rsa v\u0259 d\u0259yi\u015fiklik u\u011fursuz olarsa, m\u0259lumat geri qaytar\u0131lmal\u0131 v\u0259 z\u0259d\u0259l\u0259nm\u0259m\u0259lidir.\u018fl\u00e7atanl\u0131qM\u0259lumat istifad\u0259\u00e7i t\u0259l\u0259b etdiyi zaman istifad\u0259\u00e7i \u00fc\u00e7\u00fcn \u0259l\u00e7atan olmal\u0131d\u0131r. Avadanl\u0131\u011f\u0131n saxlanmas\u0131, m\u00fcnt\u0259z\u0259m olaraq t\u0259kmill\u0259\u015fdirilm\u0259si, M\u0259lumatlar\u0131n Yed\u0259kl\u0259nm\u0259si v\u0259 B\u0259rpas\u0131, \u015e\u0259b\u0259k\u0259 Darbo\u011fazlar\u0131na diqq\u0259t yetirilm\u0259lidir.5. \u015eifr\u0259l\u0259m\u0259 Hashing-d\u0259n n\u0259 il\u0259 f\u0259rql\u0259nir?\u00a0Cavab: H\u0259m \u015eifr\u0259l\u0259m\u0259, h\u0259m d\u0259 Hashing oxuna bil\u0259n m\u0259lumatlar\u0131 oxunmayan formata \u00e7evirm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunur. F\u0259rq ondad\u0131r ki, \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat \u015fifr\u0259nin a\u00e7\u0131lmas\u0131 prosesi il\u0259 yenid\u0259n orijinal m\u0259lumatlara \u00e7evril\u0259 bil\u0259r, lakin hash edilmi\u015f m\u0259lumatlar orijinal m\u0259lumatlara qaytar\u0131la bilm\u0259z6. Firewall n\u0259dir v\u0259 ondan n\u0259 \u00fc\u00e7\u00fcn istifad\u0259 olunur?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0Cavab:Firewall \u015f\u0259b\u0259k\u0259 trafikini izl\u0259y\u0259n v\u0259 idar\u0259 ed\u0259n sistem\/\u015f\u0259b\u0259k\u0259 s\u0259rh\u0259dl\u0259rind\u0259 qurulmu\u015f \u015f\u0259b\u0259k\u0259 t\u0259hl\u00fck\u0259sizlik sistemidir.Firewalllar \u0259sas\u0259n sistemi\/\u015f\u0259b\u0259k\u0259ni viruslar, qurdlar, z\u0259r\u0259rli proqramlar v\u0259 s.-d\u0259n qorumaq \u00fc\u00e7\u00fcn istifad\u0259 olunur. Firewalllar h\u0259m\u00e7inin uzaqdan giri\u015fin(Remote Access) v\u0259 m\u0259zmunun filtrl\u0259nm\u0259sinin qar\u015f\u0131s\u0131n\u0131 almaq \u00fc\u00e7\u00fcn d\u0259 ola bil\u0259r.7. VA (Z\u0259ifliyin Qiym\u0259tl\u0259ndirilm\u0259si) v\u0259 PT (Penetrasiya Testi) aras\u0131nda f\u0259rq n\u0259dir?Cavab:Vulnerability Assessment qar\u015f\u0131 sistemd\u0259 q\u00fcsurlar\u0131n tap\u0131lmas\u0131 prosesidir. T\u0259\u015fkilatlar sisteml\u0259rinin\/\u015f\u0259b\u0259k\u0259l\u0259rinin q\u00fcsurlar\u0131 v\u0259 ya z\u0259if t\u0259r\u0259fl\u0259ri oldu\u011funu bilir v\u0259 bu q\u00fcsurlar\u0131 tapmaq v\u0259 d\u00fcz\u0259ltm\u0259k \u00fc\u00e7\u00fcn q\u00fcsurlar\u0131 prioritetl\u0259\u015fdirm\u0259k ist\u0259yir.Penetration Testing h\u0259d\u0259fd\u0259 z\u0259iflikl\u0259rin tap\u0131lmas\u0131 prosesidir. T\u0259\u015fkilatlar d\u00fc\u015f\u00fcn\u0259 bil\u0259c\u0259kl\u0259ri b\u00fct\u00fcn t\u0259hl\u00fck\u0259sizlik t\u0259dbirl\u0259rini qurublar.Onlar\u0131n sistemini\/\u015f\u0259b\u0259k\u0259sini s\u0131nd\u0131rmaq \u00fc\u00e7\u00fcn ba\u015fqa yol olub-olmad\u0131\u011f\u0131n\u0131 bilm\u0259k v\u0259 yoxlamaq \u00fc\u00e7\u00fcn bu xidm\u0259td\u0259n istifad\u0259 edirl\u0259r.8.\u00dc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma n\u0259dir?Cavab:\u00a0\u00dc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma, host v\u0259 m\u00fc\u015ft\u0259ri aras\u0131nda \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn TCP\/IP \u015f\u0259b\u0259k\u0259sind\u0259 istifad\u0259 edil\u0259n \u00fcsuldur. Bu, \u00fc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma adlan\u0131r, \u00e7\u00fcnki bu, m\u00fc\u015ft\u0259ri v\u0259 serverin paket m\u00fcbadil\u0259si apard\u0131\u011f\u0131 \u00fc\u00e7 add\u0131ml\u0131 bir \u00fcsuldur. \u00dc\u00e7 add\u0131m a\u015fa\u011f\u0131dak\u0131lard\u0131r:1.\u00a0 \u00a0M\u00fc\u015ft\u0259ri server\u0259 SYN (Sinxronizasiya) paketini g\u00f6nd\u0259rir, serverin i\u015fl\u0259k v\u0259ziyy\u0259td\u0259 olub olmad\u0131\u011f\u0131n\u0131 v\u0259 ya a\u00e7\u0131q portlar\u0131n olub olmad\u0131\u011f\u0131n\u0131 yoxlay\u0131r.2.\u00a0 \u00a0Server a\u00e7\u0131q portlar\u0131 varsa, m\u00fc\u015ft\u0259riy\u0259 SYN-ACK paketini g\u00f6nd\u0259rir3.\u00a0 \u00a0M\u00fc\u015ft\u0259ri bunu q\u0259bul edir v\u0259 server\u0259 ACK (T\u0259qdimat) paketi g\u00f6nd\u0259rir.9. Veb T\u0259tbiqind\u0259n al\u0131na bil\u0259n cavab kodlar\u0131 hans\u0131lard\u0131r?Cavab:\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a01xx \u2013 M\u0259lumat xarakterli cavablar(Informational responses)2xx \u2013 U\u011fur(Success)3xx \u2013 Yenid\u0259n y\u00f6nl\u0259ndirm\u0259(Redirection)4xx \u2013 M\u00fc\u015ft\u0259ri t\u0259r\u0259f x\u0259tas\u0131(Client-side error)5xx \u2013 Server t\u0259r\u0259f x\u0259tas\u0131(Server-side error)10. Traceroute n\u0259dir?Cavab:\u00a0Traceroute paketin yolunu g\u00f6st\u0259r\u0259n bir vasit\u0259dir. O, paketin ke\u00e7diyi b\u00fct\u00fcn n\u00f6qt\u0259l\u0259ri (\u0259sas\u0259n mar\u015frutla\u015fd\u0131r\u0131c\u0131lar) sadalay\u0131r. Bu, \u0259sas\u0259n paket t\u0259yinat yerin\u0259 \u00e7atmad\u0131qda istifad\u0259 olunur. Traceroute, nasazl\u0131q n\u00f6qt\u0259sini m\u00fc\u0259yy\u0259n etm\u0259k \u00fc\u00e7\u00fcn \u0259laq\u0259nin harada dayand\u0131\u011f\u0131n\u0131 v\u0259 ya pozuldu\u011funu yoxlamaq \u00fc\u00e7\u00fcn istifad\u0259 olunur.11. Firewall qurmaq \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar var?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Cavab:1.\u00a0 \u00a0Username\/password: firewall cihaz\u0131 \u00fc\u00e7\u00fcn standart parolu d\u0259yi\u015fdirin2.\u00a0 \u00a0Remote administration: Uzaqdan idar\u0259etm\u0259 funksiyas\u0131n\u0131 s\u00f6nd\u00fcr\u00fcn3.\u00a0 \u00a0Port forwarding: Veb server v\u0259 ya FTP server kimi m\u00fc\u0259yy\u0259n proqramlar\u0131n d\u00fczg\u00fcn i\u015fl\u0259m\u0259si \u00fc\u00e7\u00fcn m\u00fcvafiq port y\u00f6nl\u0259ndirm\u0259sini konfiqurasiya edin4.\u00a0 \u00a0DHCP Server: Firewallun m\u00f6vcud DHCP serveri il\u0259 \u015f\u0259b\u0259k\u0259y\u0259 qura\u015fd\u0131r\u0131lmas\u0131, firewallun DHCP-si deaktiv edilm\u0259yinc\u0259 m\u00fcnaqi\u015f\u0259y\u0259 s\u0259b\u0259b olacaq.5.\u00a0 \u00a0Logging: Firewall probleml\u0259rini v\u0259 ya potensial h\u00fccumlar\u0131 aradan qald\u0131rmaq \u00fc\u00e7\u00fcn giri\u015fin aktiv oldu\u011fundan \u0259min olun v\u0259 log-lara nec\u0259 baxmaq laz\u0131m oldu\u011funu anlay\u0131n.6.\u00a0 \u00a0Policies: M\u00f6hk\u0259m t\u0259hl\u00fck\u0259sizlik siyas\u0259tl\u0259riniz olmal\u0131 v\u0259 Firewall-un h\u0259min siyas\u0259tl\u0259ri t\u0259tbiq etm\u0259k \u00fc\u00e7\u00fcn konfiqurasiya edildiyin\u0259 \u0259min olmal\u0131s\u0131n\u0131z.12. SSL \u015eifr\u0259l\u0259m\u0259sini izah edinCavab:\u00a0 \u00a0\u00a0SSL (Secure Sockets Layer) Veb Server v\u0259 Brauzer aras\u0131nda \u015fifr\u0259l\u0259nmi\u015f \u0259laq\u0259l\u0259r yaradan s\u0259naye standartl\u0131 t\u0259hl\u00fck\u0259sizlik texnologiyas\u0131d\u0131r. Bu, m\u0259lumatlar\u0131n m\u0259xfiliyini qorumaq v\u0259 onlayn \u0259m\u0259liyyatlarda m\u0259lumat\u0131 qorumaq \u00fc\u00e7\u00fcn istifad\u0259 olunur.SSL ba\u011flant\u0131s\u0131 qurmaq \u00fc\u00e7\u00fcn add\u0131mlar a\u015fa\u011f\u0131dak\u0131 kimidir:1.\u00a0 \u00a0Brauzer SSL il\u0259 qorunan veb server\u0259 qo\u015fulma\u011fa \u00e7al\u0131\u015f\u0131r2.\u00a0 \u00a0Brauzer SSL sertifikat\u0131n\u0131n sur\u0259tini brauzer\u0259 g\u00f6nd\u0259rir3.\u00a0 \u00a0Brauzer SSL sertifikat\u0131n\u0131n etibarl\u0131 olub olmad\u0131\u011f\u0131n\u0131 yoxlay\u0131r. Etibarl\u0131d\u0131rsa, o zaman brauzer veb server\u0259 \u015fifr\u0259li \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn mesaj g\u00f6nd\u0259rir4.\u00a0 \u00a0Veb server SSL \u015fifr\u0259li ba\u011flant\u0131ya ba\u015flamaq \u00fc\u00e7\u00fcn t\u0259sdiq g\u00f6nd\u0259rir5. SSL \u015fifr\u0259li \u0259lqa\u0259 brauzer v\u0259 veb server aras\u0131nda ba\u015f verir13. Serverin t\u0259hl\u00fck\u0259sizliyini t\u0259min etm\u0259k \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar\u0131 atacaqs\u0131n\u0131z?Cavab:\u00a0 \u00a0 \u00a0T\u0259hl\u00fck\u0259siz serverl\u0259r m\u0259lumatlar\u0131 icaz\u0259siz \u0259l\u0259 ke\u00e7irm\u0259kd\u0259n qorumaq \u00fc\u00e7\u00fcn m\u0259lumatlar\u0131n \u015fifr\u0259l\u0259nm\u0259si v\u0259 \u015fifr\u0259sinin a\u00e7\u0131lmas\u0131 \u00fc\u00e7\u00fcn Secure Sockets Layer (SSL) protokolundan istifad\u0259 edir.Serveri qorumaq \u00fc\u00e7\u00fcn d\u00f6rd sad\u0259 yol var:Add\u0131m 1: Root v\u0259 administrator istifad\u0259\u00e7il\u0259riniz \u00fc\u00e7\u00fcn t\u0259hl\u00fck\u0259siz parolunuz oldu\u011fundan \u0259min olunAdd\u0131m 2: Sizin etm\u0259li oldu\u011funuz n\u00f6vb\u0259ti \u015fey sisteminizd\u0259 yeni istifad\u0259\u00e7il\u0259r yaratmaqd\u0131r. Bunlar sistemi idar\u0259 etm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 etdiyiniz istifad\u0259\u00e7il\u0259r olacaqAdd\u0131m 3: default root\/administrator hesablar\u0131ndan uzaqdan giri\u015fi silinAdd\u0131m 4: N\u00f6vb\u0259ti add\u0131m uzaqdan giri\u015f \u00fc\u00e7\u00fcn Firewall qaydalar\u0131n\u0131z\u0131 konfiqurasiya etm\u0259kdir14. M\u0259lumat s\u0131zmas\u0131n\u0131(Data Leakage) izah edinCvaab: M\u0259lumat s\u0131zmas\u0131 m\u0259lumatlar\u0131n t\u0259\u015fkilat daxilind\u0259n icaz\u0259siz k\u0259nar t\u0259yinat yerin\u0259 q\u0259sd\u0259n v\u0259 ya ist\u0259m\u0259d\u0259n \u00f6t\u00fcr\u00fclm\u0259sidir. Bu, m\u0259xfi m\u0259lumat\u0131n icaz\u0259siz quruma a\u00e7\u0131qlanmas\u0131d\u0131r.M\u0259lumat s\u0131zmas\u0131 nec\u0259 ba\u015f verdiyin\u0259 g\u00f6r\u0259 3 kateqoriyaya b\u00f6l\u00fcn\u0259 bil\u0259r:1. T\u0259sad\u00fcfi pozulma: M\u00fc\u0259ssis\u0259 s\u0259hv v\u0259 ya kobud n\u00f6qteyi-n\u0259z\u0259rd\u0259n icaz\u0259siz \u015f\u0259xs\u0259 m\u0259lumat g\u00f6nd\u0259rir2. Q\u0259sd\u0259n pozma: S\u0259lahiyy\u0259tli qurum m\u0259qs\u0259dli \u015f\u0259kild\u0259 icaz\u0259siz quruma m\u0259lumatlar\u0131 g\u00f6nd\u0259rir3. Sistem Hack: Hacking \u00fcsullar\u0131 m\u0259lumat s\u0131zmas\u0131na s\u0259b\u0259b olmaq \u00fc\u00e7\u00fcn istifad\u0259 olunurDLP (Data Leakage Prevention) Al\u0259tl\u0259ri kimi tan\u0131nan al\u0259tl\u0259r, proqram t\u0259minat\u0131 v\u0259 strategiyalardan istifad\u0259 etm\u0259kl\u0259 m\u0259lumat s\u0131zmas\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 almaq olar.15. \u00dcmumi kiberh\u00fccumlardan b\u0259zil\u0259ri hans\u0131lard\u0131r?Cavab: A\u015fa\u011f\u0131da sisteminiz\u0259 m\u0259nfi t\u0259sir g\u00f6st\u0259r\u0259 bil\u0259c\u0259k b\u0259zi \u00fcmumi kiberh\u00fccumlar verilmi\u015fdir.MalwarePhishingPassword AttacksDDoSMan in the MiddleDrive-By DownloadsMalvertisingRogue Software16. Port Scanning n\u0259dir?\u00a0 \u00a0Cavab: Port Skanlama, hostda m\u00f6vcud olan a\u00e7\u0131q portlar\u0131 v\u0259 xidm\u0259ti m\u00fc\u0259yy\u0259n etm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259n texnikad\u0131r. Hakerl\u0259r z\u0259iflikl\u0259rd\u0259n istifad\u0259 etm\u0259k \u00fc\u00e7\u00fcn faydal\u0131 ola bil\u0259c\u0259k m\u0259lumatlar\u0131 tapmaq \u00fc\u00e7\u00fcn port skan\u0131ndan istifad\u0259 edirl\u0259r.\u0130dar\u0259\u00e7il\u0259r \u015f\u0259b\u0259k\u0259nin t\u0259hl\u00fck\u0259sizlik siyas\u0259tl\u0259rini yoxlamaq \u00fc\u00e7\u00fcn Port Skanlamas\u0131ndan istifad\u0259 edirl\u0259r.\u00dcmumi Port Skanlama Texnikalar\u0131ndan b\u0259zil\u0259ri bunlard\u0131r:Ping ScanTCP Half-OpenTCP ConnectUDPStealth Scanning17. Brute Force Attack n\u0259dir? Bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 ala bil\u0259rsiniz?\u00a0 \u00a0Cavab: Brute Force, m\u00fcmk\u00fcn etimadnam\u0259l\u0259rin b\u00fct\u00fcn d\u0259yi\u015fm\u0259l\u0259rini v\u0259 kombinasiyalar\u0131n\u0131 t\u0259krar-t\u0259krar s\u0131namaqla d\u00fczg\u00fcn etimadnam\u0259l\u0259ri tapmaq \u00fcsuludur.\u018fks\u0259r hallarda Brute Force h\u00fccumlar\u0131 avtomatla\u015fd\u0131r\u0131l\u0131r, burada al\u0259t\/proqram avtomatik olaraq etimadnam\u0259l\u0259r siyah\u0131s\u0131 il\u0259 daxil olma\u011fa \u00e7al\u0131\u015f\u0131r. Brute Force h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 alma\u011f\u0131n m\u00fcxt\u0259lif yollar\u0131 var.Onlardan b\u0259zil\u0259ri bunlard\u0131r:Parolun uzunlu\u011fu: Siz parol \u00fc\u00e7\u00fcn minimum uzunluq t\u0259yin ed\u0259 bil\u0259rsiniz. \u015eifr\u0259 n\u0259 q\u0259d\u0259r uzun olsa, onu tapmaq bir o q\u0259d\u0259r \u00e7\u0259tindir.\u015eifr\u0259 M\u00fcr\u0259kk\u0259bliyi: Parolda simvollar\u0131n m\u00fcxt\u0259lif formatlar\u0131n\u0131n daxil edilm\u0259si kobud g\u00fcc h\u00fccumlar\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir. X\u00fcsusi simvollar v\u0259 b\u00f6y\u00fck v\u0259 ki\u00e7ik h\u0259rfl\u0259rl\u0259 birlikd\u0259 alfa-r\u0259q\u0259m parollar\u0131ndan istifad\u0259 parol m\u00fcr\u0259kk\u0259bliyini art\u0131r\u0131r v\u0259 s\u0131nd\u0131r\u0131lmas\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir.Giri\u015f c\u0259hdl\u0259rinin m\u0259hdudla\u015fd\u0131r\u0131lmas\u0131: Giri\u015f u\u011fursuzluqlar\u0131na limit t\u0259yin edin. M\u0259s\u0259l\u0259n, giri\u015f x\u0259talar\u0131 \u00fc\u00e7\u00fcn limiti 3 kimi t\u0259yin ed\u0259 bil\u0259rsiniz. Bel\u0259likl\u0259, ard\u0131c\u0131l 3 giri\u015f u\u011fursuzlu\u011fu olduqda, istifad\u0259\u00e7inin bir m\u00fcdd\u0259t daxil olmas\u0131n\u0131 m\u0259hdudla\u015fd\u0131r\u0131n v\u0259 ya n\u00f6vb\u0259ti d\u0259f\u0259 daxil olmas\u0131, istifad\u0259 etm\u0259si \u00fc\u00e7\u00fcn E-po\u00e7t v\u0259 ya OTP g\u00f6nd\u0259rin. Brute Force avtomatla\u015fd\u0131r\u0131lm\u0131\u015f proses oldu\u011fundan, giri\u015f c\u0259hdl\u0259rini m\u0259hdudla\u015fd\u0131rmaq Brute Force prosesini pozacaq.18. OSI modelinin m\u00fcxt\u0259lif t\u0259b\u0259q\u0259l\u0259ri hans\u0131lard\u0131r?\u00a0 \u00a0 \u00a0Cavab: OSI modeli, proqramlar\u0131n \u015f\u0259b\u0259k\u0259 \u00fcz\u0259rind\u0259n nec\u0259 \u0259laq\u0259 saxlayaca\u011f\u0131na dair \u0259laq\u0259li istinad modelidir. OSI referans\u0131n\u0131n m\u0259qs\u0259di r\u0259q\u0259msal kommunikasiya m\u0259hsullar\u0131 v\u0259 software proqramlar\u0131n\u0131n qar\u015f\u0131l\u0131ql\u0131 f\u0259aliyy\u0259t g\u00f6st\u0259r\u0259 bilm\u0259si \u00fc\u00e7\u00fcn sat\u0131c\u0131lara v\u0259 t\u0259rtibat\u00e7\u0131lara r\u0259hb\u0259rlik etm\u0259kdir.Fiziki s\u0259viyy\u0259(Physical): R\u0259q\u0259msal m\u0259lumatlar\u0131n rabit\u0259 vasit\u0259si il\u0259 g\u00f6nd\u0259ricid\u0259n al\u0131c\u0131ya \u00f6t\u00fcr\u00fclm\u0259sin\u0259 cavabdehdirData Link Layer: Veril\u0259nl\u0259rin fiziki ke\u00e7id\u0259 v\u0259 oradan h\u0259r\u0259k\u0259tini idar\u0259 edir. O, h\u0259m\u00e7inin m\u0259lumat bitl\u0259rinin kodla\u015fd\u0131r\u0131lmas\u0131 v\u0259 dekodlanmas\u0131na cavabdehdir.\u015e\u0259b\u0259k\u0259 s\u0259viyy\u0259si: Paketin y\u00f6nl\u0259ndirilm\u0259si v\u0259 \u015f\u0259b\u0259k\u0259 rabit\u0259si \u00fc\u00e7\u00fcn mar\u015frutla\u015fd\u0131rma yollar\u0131n\u0131n t\u0259min edilm\u0259sin\u0259 cavabdehdir.N\u0259qliyyat Layeri: \u015e\u0259b\u0259k\u0259 \u00fcz\u0259rind\u0259n end-to-end rabit\u0259y\u0259 cavabdehdir. O, m\u0259lumat\u0131 yuxar\u0131dak\u0131 t\u0259b\u0259q\u0259d\u0259n ay\u0131r\u0131r v\u0259 \u015e\u0259b\u0259k\u0259 Layerin\u0259 \u00f6t\u00fcr\u00fcr v\u0259 sonra b\u00fct\u00fcn m\u0259lumatlar\u0131n q\u0259buledicinin sonuna u\u011furla \u00e7atmas\u0131n\u0131 t\u0259min edir.Session Layer: G\u00f6nd\u0259r\u0259n v\u0259 q\u0259bul ed\u0259n aras\u0131nda \u0259laq\u0259ni idar\u0259 edir. O, sessiyan\u0131n ba\u015flamas\u0131, ba\u015fa \u00e7atmas\u0131 v\u0259 idar\u0259 edilm\u0259sin\u0259, g\u00f6nd\u0259rici il\u0259 q\u0259buledici aras\u0131nda qar\u015f\u0131l\u0131ql\u0131 \u0259laq\u0259nin qurulmas\u0131na, saxlanmas\u0131na v\u0259 sinxronla\u015fd\u0131r\u0131lmas\u0131na cavabdehdir.T\u0259qdimat Layeri: Bu, xam dataqramlar v\u0259 ya paketl\u0259r g\u00f6nd\u0259rm\u0259k \u0259v\u0259zin\u0259 veril\u0259nl\u0259rin d\u00fczg\u00fcn formatda v\u0259 m\u0259lumat strukturunda t\u0259qdim edilm\u0259si il\u0259 m\u0259\u015f\u011ful olur.T\u0259tbiq Layeri: T\u0259tbiq v\u0259 \u015f\u0259b\u0259k\u0259 aras\u0131nda interfeys t\u0259min edir. O, prosesd\u0259n proses\u0259 rabit\u0259y\u0259 diqq\u0259t yetirir v\u0259 \u00fcnsiyy\u0259t interfeysini t\u0259min edir.\u00a0 \u00a0\u00a019. VPN n\u0259dir?Cavab: Dem\u0259k olar ki, b\u00fct\u00fcn Kibert\u0259hl\u00fck\u0259sizlik M\u00fcsahib\u0259 Suallar\u0131na bu sual daxil edilir. VPN Virtual \u015e\u0259xsi \u015e\u0259b\u0259k\u0259 dem\u0259kdir. T\u0259hl\u00fck\u0259siz v\u0259 \u015fifr\u0259li \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn istifad\u0259 olunur. Bir VPN istifad\u0259 ed\u0259rk\u0259n, m\u00fc\u015ft\u0259rid\u0259n g\u0259l\u0259n m\u0259lumatlar VPN-d\u0259 \u015fifr\u0259l\u0259ndiyi bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir v\u0259 sonra internet vasit\u0259sil\u0259 ba\u015fqa bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir.Bu zaman veril\u0259nl\u0259rin \u015fifr\u0259si a\u00e7\u0131l\u0131r v\u0259 server\u0259 g\u00f6nd\u0259rilir. Server cavab g\u00f6nd\u0259rdikd\u0259, cavab VPN-in \u015fifr\u0259l\u0259ndiyi bir n\u00f6qt\u0259y\u0259 v\u0259 bu \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat VPN-in \u015fifr\u0259sinin a\u00e7\u0131ld\u0131\u011f\u0131 ba\u015fqa bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir. V\u0259 n\u0259hay\u0259t, \u015fifr\u0259si a\u00e7\u0131lm\u0131\u015f m\u0259lumatlar m\u00fc\u015ft\u0259riy\u0259 g\u00f6nd\u0259rilir. VPN-d\u0259n istifad\u0259 etm\u0259yin b\u00fct\u00fcn m\u0259qs\u0259di \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat \u00f6t\u00fcr\u00fclm\u0259sini t\u0259min etm\u0259kdir.20. \u015e\u0259b\u0259k\u0259d\u0259 Risk, Z\u0259iflik v\u0259 T\u0259hdid dedikd\u0259 n\u0259 ba\u015fa d\u00fc\u015f\u00fcrs\u00fcn\u00fcz?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Cvaab: T\u0259hdid: Sistem\u0259 v\u0259 ya t\u0259\u015fkilata z\u0259r\u0259r vurma potensial\u0131 olan kims\u0259Z\u0259iflik: Potensial haker t\u0259r\u0259find\u0259n istifad\u0259 edil\u0259 bil\u0259n sistemd\u0259ki z\u0259iflikRisk: T\u0259hl\u00fck\u0259li z\u0259iflikd\u0259n istifad\u0259 etdikd\u0259 itki v\u0259 ya z\u0259d\u0259l\u0259nm\u0259 potensial\u013121. Black Hat, White Hat v\u0259 Gray Hat hakerl\u0259ri n\u0259dir?\u00a0 \u00a0Cavab:Blach Hat hakerl\u0259r komp\u00fcter \u015f\u0259b\u0259k\u0259l\u0259rin\u0259 m\u00fcdaxil\u0259 haqq\u0131nda geni\u015f biliy\u0259 malik olmaqlar\u0131 il\u0259 tan\u0131n\u0131rlar. Onlar bu sisteml\u0259r\u0259 daxil olmaq \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259n z\u0259r\u0259rli proqramlar yaza bilirl\u0259r. Bu tip hakerl\u0259r m\u0259lumat o\u011furlamaq v\u0259 ya s\u0131nd\u0131r\u0131lm\u0131\u015f sistemd\u0259n z\u0259r\u0259rli m\u0259qs\u0259dl\u0259r \u00fc\u00e7\u00fcn \u00f6z bacar\u0131qlar\u0131ndan sui-istifad\u0259 edirl\u0259r.White Hat hakerl\u0259r \u00f6z s\u0259lahiyy\u0259tl\u0259rini yax\u015f\u0131 i\u015fl\u0259r \u00fc\u00e7\u00fcn istifad\u0259 edirl\u0259r v\u0259 buna g\u00f6r\u0259 d\u0259 onlara Etik Hakerl\u0259r deyilir. Onlar Black Hat hackerler il\u0259 eyni biliy\u0259 malik olurlar. Bunlar \u0259sas\u0259n \u015firk\u0259tl\u0259r t\u0259r\u0259find\u0259n sisteml\u0259rd\u0259 z\u0259iflikl\u0259ri v\u0259 t\u0259hl\u00fck\u0259sizlik bo\u015fluqlar\u0131n\u0131 tapma\u011fa v\u0259 d\u00fcz\u0259ltm\u0259y\u0259 \u00e7al\u0131\u015fan bir t\u0259hl\u00fck\u0259sizlik m\u00fct\u0259x\u0259ssisi kimi i\u015f\u0259 g\u00f6t\u00fcr\u00fcl\u00fcrl\u0259r. Onlar t\u0259hl\u00fck\u0259sizliyi yax\u015f\u0131la\u015fd\u0131rmaq \u00fc\u00e7\u00fcn \u00f6z bacar\u0131qlar\u0131ndan istifad\u0259 edirl\u0259r.Gray Hat hakerl\u0259r White v\u0259 Black Hat hakerinin birl\u0259\u015fm\u0259sidir. Sahibinin icaz\u0259si olmadan sistem z\u0259iflikl\u0259rini axtar\u0131rlar. H\u0259r hans\u0131 bir z\u0259iflik a\u015fkar ed\u0259rl\u0259rs\u0259, bu bar\u0259d\u0259 sahibin\u0259 m\u0259lumat verirl\u0259r. Black Hat hakerl\u0259rd\u0259n f\u0259rqli olaraq, onlar a\u015fkar edilmi\u015f z\u0259iflikl\u0259rd\u0259n istifad\u0259 etmirl\u0259r.22.XSS h\u00fccumunu izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?Cavab:XSS (Saytlararas\u0131 Skriptl\u0259m\u0259) hakerl\u0259r\u0259 veb s\u0259hif\u0259l\u0259r\u0259 z\u0259r\u0259rli client-side skriptl\u0259ri yeritm\u0259y\u0259 imkan ver\u0259n kiberh\u00fccumdur. XSS sessiyalar\u0131 v\u0259 kukil\u0259ri o\u011furlamaq, DOM-u d\u0259yi\u015fdirm\u0259k, remote code execution, serveri s\u0131nd\u0131rmaq v\u0259 s. \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r.XSS-in n\u00f6vl\u0259ri-\u00a0 \u00a0 \u00a0 \u00a0Reflected XSS-\u00a0 \u00a0 \u00a0 \u00a0Stored XSS-\u00a0 \u00a0 \u00a0 \u00a0DOM Based XSSA\u015fa\u011f\u0131dak\u0131 t\u0259cr\u00fcb\u0259l\u0259rd\u0259n istifad\u0259 etm\u0259kl\u0259 XSS h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:\u0130stifad\u0259\u00e7i daxiletm\u0259l\u0259rini t\u0259sdiql\u0259yin (Validate user inputs)\u00b7\u00a0 \u00a0 \u00a0 \u00a0\u0130stifad\u0259\u00e7i giri\u015fl\u0259rini t\u0259mizl\u0259yin (Sanitize user inputs)X\u00fcsusi simvollar\u0131 kodlay\u0131n(Encode special characters)Anti-XSS xidm\u0259tl\u0259rind\u0259n\/al\u0259tl\u0259rind\u0259n istifad\u0259 edin (Use Anti-XSS services\/tools)XSS HTML Filtrind\u0259n istifad\u0259 edin(Use XSS HTML Filter)24. Botnet n\u0259dir?Cavab: Botnet, h\u0259r bir cihaz\u0131n \u00fcz\u0259rind\u0259 bir v\u0259 ya daha \u00e7ox botun i\u015fl\u0259diyi internet\u0259 qo\u015fulmu\u015f bir s\u0131ra cihazlard\u0131r.Qur\u011fulardak\u0131 botlar v\u0259 z\u0259r\u0259rli skriptl\u0259r qurban\u0131 s\u0131nd\u0131rmaq \u00fc\u00e7\u00fcn istifad\u0259 olunurdu. Botnetl\u0259r m\u0259lumatlar\u0131 o\u011furlamaq, spam g\u00f6nd\u0259rm\u0259k v\u0259 DDOS h\u00fccumunu h\u0259yata ke\u00e7irm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r.25. SSL v\u0259 TLS-I a\u00e7\u0131qlay\u0131n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0Cavab: SSL g\u00f6nd\u0259r\u0259nin \u015f\u0259xsiyy\u0259tini yoxlamaq \u00fc\u00e7\u00fcn n\u0259z\u0259rd\u0259 tutulub, lakin o, bundan ba\u015fqa he\u00e7 n\u0259 axtarm\u0131r. SSL dan\u0131\u015fd\u0131\u011f\u0131n\u0131z insan\u0131 izl\u0259m\u0259y\u0259 k\u00f6m\u0259k ed\u0259 bil\u0259r, lakin bu da b\u0259z\u0259n aldad\u0131la bil\u0259r.TLS h\u0259m\u00e7inin SSL kimi eynil\u0259\u015fdirm\u0259 vasit\u0259sidir, lakin daha yax\u015f\u0131 t\u0259hl\u00fck\u0259sizlik x\u00fcsusiyy\u0259tl\u0259ri t\u0259klif edir. M\u0259lumatlara \u0259lav\u0259 qorunma t\u0259min edir v\u0259 buna g\u00f6r\u0259 d\u0259 SSL v\u0259 TLS daha yax\u015f\u0131 qorunmaq \u00fc\u00e7\u00fcn tez-tez birlikd\u0259 istifad\u0259 olunur.26. 2FA n\u0259dir v\u0259 ictimai vebsaytlar \u00fc\u00e7\u00fcn nec\u0259 t\u0259tbiq oluna bil\u0259r?\u00a0 \u00a0Cavab: \"\u00c7ox faktorlu autentifikasiya\" kimi tan\u0131nan \u0259lav\u0259 t\u0259hl\u00fck\u0259sizlik s\u0259viyy\u0259sidir.Yaln\u0131z parol v\u0259 istifad\u0259\u00e7i ad\u0131 deyil, h\u0259m d\u0259 yaln\u0131z v\u0259 yaln\u0131z h\u0259min istifad\u0259\u00e7inin onlarda olan bir \u015feyi, y\u0259ni ancaq onlar\u0131n bilm\u0259li olduqlar\u0131 v\u0259 ya d\u0259rhal \u0259ld\u0259 etm\u0259li oldu\u011fu bir m\u0259lumat\u0131, m\u0259s\u0259l\u0259n, fiziki token t\u0259l\u0259b edir.Authenticator proqramlar\u0131 m\u0259tn, s\u0259sli z\u0259ng v\u0259 ya e-po\u00e7t vasit\u0259sil\u0259 do\u011frulama kodu \u0259ld\u0259 etm\u0259k ehtiyac\u0131n\u0131 \u0259v\u0259z edir.Bu Proqramlara n\u00fcmun\u0259 kimi Google Authenticator v\u0259 Autify kimi proqramlar\u0131 g\u00f6st\u0259rm\u0259k olar.27. Fi\u015finqi izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?Cavab:Fi\u015finq kiberh\u00fccumdur ki, burada haker etibarl\u0131 \u015f\u0259xs v\u0259 ya biznes kimi maskalan\u0131r v\u0259 saxta e-po\u00e7t v\u0259 ya ani mesaj vasit\u0259sil\u0259 h\u0259ssas maliyy\u0259 v\u0259 ya \u015f\u0259xsi m\u0259lumatlar\u0131 o\u011furlama\u011fa \u00e7al\u0131\u015f\u0131rA\u015fa\u011f\u0131dak\u0131 \u00fcsullardan istifad\u0259 etm\u0259kl\u0259 fi\u015finq h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:\u00b7\u00a0 \u00a0 \u00a0 \u00a0Etibar etm\u0259diyiniz veb s\u0259hif\u0259l\u0259r\u0259 h\u0259ssas m\u0259lumatlar\u0131 daxil etm\u0259yin\u00b7\u00a0 \u00a0 \u00a0 \u00a0Sayt\u0131n t\u0259hl\u00fck\u0259sizliyini yoxlay\u0131n\u00b7\u00a0 \u00a0 \u00a0 \u00a0Firewall-lardan istifad\u0259 edin\u00b7\u00a0 \u00a0 \u00a0 \u00a0\u0130nternet T\u0259hl\u00fck\u0259sizliyi olan AntiVirus Proqram\u0131ndan istifad\u0259 edin\u00b7\u00a0 \u00a0 \u00a0 \u00a0Anti-Fi\u015finq Al\u0259tl\u0259r Panelind\u0259n istifad\u0259 edin28. SQL Enjeksiyonunu izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?Cavab: SQL Injection (SQLi) t\u0259cav\u00fczkar\u0131n veb t\u0259tbiqinin veril\u0259nl\u0259r bazas\u0131 serverin\u0259 n\u0259zar\u0259t etm\u0259k \u00fc\u00e7\u00fcn z\u0259r\u0259rli SQL sor\u011fular\u0131n\u0131 yerin\u0259 yetirm\u0259k \u00fc\u00e7\u00fcn server\u0259 g\u00f6nd\u0259ril\u0259n m\u0259lumatlar\u0131 manipulyasiya etdiyi, bununla da icaz\u0259siz m\u0259lumatlara daxil olmaq, d\u0259yi\u015fdirm\u0259k v\u0259 silm\u0259k \u00fc\u00e7\u00fcn kod yeritm\u0259 h\u00fccumudur. Bu h\u00fccum \u0259sas\u0259n veril\u0259nl\u0259r bazas\u0131 serverl\u0259rini \u0259l\u0259 ke\u00e7irm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunur.A\u015fa\u011f\u0131dak\u0131 t\u0259cr\u00fcb\u0259l\u0259rd\u0259n istifad\u0259 etm\u0259kl\u0259 SQL Injection h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:\u00b7\u00a0 \u00a0 \u00a0 \u00a0Haz\u0131rlanm\u0131\u015f ifad\u0259l\u0259ri daxil edin (parametrl\u0259\u015fdirilmi\u015f sor\u011fularla)\u00b7\u00a0 \u00a0 \u00a0 \u00a0Saxlan\u0131lan Prosedurlardan istifad\u0259 edin\u0130stifad\u0259\u00e7i daxiletm\u0259sini t\u0259sdiq edin(Validate user input)\u00b7\u00a0 \u00a0 \u00a0 \u00a0Error mesaj\u0131ndan m\u0259lumatlar\u0131 gizl\u0259din\u00b7\u00a0 \u00a0 \u00a0 \u00a0Sisteminizi yenil\u0259yinVeril\u0259nl\u0259r bazas\u0131 etimadnam\u0259sini ayr\u0131 v\u0259 \u015fifr\u0259l\u0259nmi\u015f \u015f\u0259kild\u0259 saxlay\u0131nShell v\u0259 ehtiyac\u0131n\u0131z olmayan h\u0259r hans\u0131 dig\u0259r funksiyalar\u0131 s\u00f6nd\u00fcr\u00fcn29. T\u0259hl\u00fck\u0259sizlik s\u0259hv konfiqurasiyas\u0131(security misconfiguration) n\u0259dir?Cavab:Security Misconfiguration t\u0259hl\u00fck\u0259siz olmayan konfiqurasiya se\u00e7imi s\u0259b\u0259bind\u0259n proqram\/\u015f\u0259b\u0259k\u0259\/cihaz h\u00fccuma m\u0259ruz qald\u0131qda ba\u015f ver\u0259 bil\u0259c\u0259k z\u0259iflikdir. Bu, standart istifad\u0259\u00e7i ad\u0131\/parolun d\u0259yi\u015fm\u0259z saxlan\u0131lmas\u0131 q\u0259d\u0259r sad\u0259 ola bil\u0259r.30. Remote Desktop Protocol (RDP) n\u0259dir?Cavab:-\u00a0 \u00a0 \u00a0 \u00a0RDP (Remote Desktop Protocol) x\u00fcsusi olaraq m\u00fc\u015ft\u0259ri cihazlar\u0131, istifad\u0259\u00e7il\u0259r v\u0259 virtual \u015f\u0259b\u0259k\u0259 serveri aras\u0131nda proqram m\u0259lumatlar\u0131n\u0131n \u00f6t\u00fcr\u00fclm\u0259si t\u0259hl\u00fck\u0259sizliyi v\u0259 \u015fifr\u0259l\u0259m\u0259si \u00fc\u00e7\u00fcn n\u0259z\u0259rd\u0259 tutulmu\u015f Microsoft protokoludur.-\u00a0 \u00a0 \u00a0 \u00a0Bu, administratorlara f\u0259rdi abun\u0259\u00e7il\u0259rin qar\u015f\u0131la\u015fd\u0131\u011f\u0131 probleml\u0259ri uzaqdan qiym\u0259tl\u0259ndirm\u0259y\u0259 v\u0259 h\u0259ll etm\u0259y\u0259 imkan verir.-\u00a0 \u00a0 \u00a0 \u00a0O, \u00e7oxn\u00f6qt\u0259li \u00f6t\u00fcrm\u0259 t\u0259min etm\u0259kl\u0259 64.000-\u0259 q\u0259d\u0259r ayr\u0131 m\u0259lumat kanal\u0131n\u0131 d\u0259st\u0259kl\u0259yir.31. Address Resolution Protocol (ARP) n\u0259 \u00fc\u00e7\u00fcn istifad\u0259 olunur?Cavab: ARP x\u00fcsusi olaraq IP \u015f\u0259b\u0259k\u0259 \u00fcnvanlar\u0131n\u0131 Ethernet \u00fcnvanlar\u0131 kimi fiziki \u00fcnvanlarla \u0259laq\u0259l\u0259ndirm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunan protokoldur.32 bitlik \u00fcnvanlar\u0131 48 bitlik \u00fcnvanlara v\u0259 \u0259ksin\u0259 t\u0259rc\u00fcm\u0259 edir. Bu laz\u0131md\u0131r, \u00e7\u00fcnki bu g\u00fcn istifad\u0259 etdiyimiz internet protokolunun (IP) \u0259n \u00fcmumi s\u0259viyy\u0259si 32 bit uzunlu\u011funda v\u0259 MAC \u00fcnvanlar\u0131 48 bit uzunlu\u011fundad\u0131r.33. \u015e\u0259b\u0259k\u0259 t\u0259hl\u00fck\u0259sizliyi \u00fc\u00e7\u00fcn autentifikasiyan\u0131n \u00fcmumi \u00fcsullar\u0131 hans\u0131lard\u0131r?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Cavab: Biometrics - Bu, istifad\u0259\u00e7inin \u015f\u0259xsiyy\u0259tini yoxlamaq \u00fc\u00e7\u00fcn x\u00fcsusi olaraq istifad\u0259 edil\u0259n m\u0259lum v\u0259 qeyd\u0259 al\u0131nm\u0131\u015f fiziki atributudurToken - Sisteml\u0259r\u0259 daxil olmaq \u00fc\u00e7\u00fcn tokenl\u0259rd\u0259n d\u0259 istifad\u0259 olunur. Bu, hakerl\u0259rin etimadnam\u0259l\u0259r\u0259 malik olduqlar\u0131 halda hesablara daxil olmalar\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir.Transaction Authentication - Bird\u0259f\u0259lik pin v\u0259 ya parol, onlar\u0131n \u015f\u0259xsiyy\u0259tini t\u0259sdiql\u0259y\u0259n onlayn \u0259m\u0259liyyatlar\u0131n i\u015fl\u0259nm\u0259si zaman\u0131 istifad\u0259 olunur.Multi-Factor Authentication - Bu, bird\u0259n \u00e7ox autentifikasiya metoduna ehtiyac\u0131 olan bir t\u0259hl\u00fck\u0259sizlik sistemidir.Out-of-Band Authentication - Bu autentifikasiya iki f\u0259rqli kanaldan v\u0259 ya \u015f\u0259b\u0259k\u0259d\u0259n iki f\u0259rqli siqnal t\u0259l\u0259b edir. Bu, onlayn bank\u00e7\u0131l\u0131qda h\u00fccumlar\u0131n \u0259ks\u0259riyy\u0259tinin hack v\u0259 \u015f\u0259xsiyy\u0259t o\u011furlanmas\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 al\u0131r.34. Hashing v\u0259 Salting aras\u0131ndak\u0131 f\u0259rq n\u0259dir?Cavab:\u00a0 \u00a0 Hashing \u0259sas\u0259n autentifikasiya \u00fc\u00e7\u00fcn istifad\u0259 olunur v\u0259 m\u0259lumatlar\u0131n sabit uzunluqlu d\u0259y\u0259r\u0259 planla\u015fd\u0131r\u0131ld\u0131\u011f\u0131 birt\u0259r\u0259fli funksiyad\u0131r.Salting hash \u00fc\u00e7\u00fcn \u0259lav\u0259 bir add\u0131md\u0131r, burada \u015fifr\u0259y\u0259 salt \u0259lav\u0259 olunur v\u0259 o \u015f\u0259kild\u0259 hashl\u0259nir35. Stored v\u0259 Reflected XSS aras\u0131ndak\u0131 f\u0259rq n\u0259dir?Cavab: Stored XSS attacks - Enjekte edilmi\u015f skriptl\u0259rin h\u0259d\u0259f serverl\u0259rd\u0259 qal\u0131c\u0131 olaraq saxland\u0131\u011f\u0131 h\u00fccumlara deyilir. Bununla birlikd\u0259 qurban saxlan\u0131lan m\u0259lumatlar\u0131 h\u0259r d\u0259f\u0259 t\u0259l\u0259b etdikd\u0259 z\u0259r\u0259rli script yenid\u0259n i\u015f\u0259 d\u00fc\u015f\u00fcr.Reflected XSS Attacks \u2013 Stored XSS-d\u0259n f\u0259rqli olaraq bu tip XSS serverd\u0259 qal\u0131c\u0131 olaraq qalm\u0131r v\u0259 bir anl\u0131q ba\u015f verir v\u0259 bitir.37. \u015e\u0259xsiyy\u0259t o\u011furlu\u011funun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?\u00a0 \u00a0 \u00a0 \u00a0\u00a0\u00b7\u00a0 \u00a0 \u00a0 \u015e\u0259xsi qeydl\u0259rinizi qoruyun.\u00b7\u00a0 \u00a0 \u00a0 M\u0259xfi m\u0259lumatlar\u0131n onlayn payla\u015f\u0131lmas\u0131ndan \u00e7\u0259kinin.\u00b7\u00a0 \u00a0 \u00a0 G\u00fccl\u00fc parollardan istifad\u0259 edin v\u0259 onlar\u0131 m\u00fcnt\u0259z\u0259m olaraq d\u0259yi\u015fdirin.\u00b7\u00a0 \u00a0 \u00a0 Etibars\u0131z saytlarda bank m\u0259lumatlar\u0131n\u0131z\u0131 t\u0259qdim etm\u0259yin.\u00b7\u00a0 \u00a0 \u00a0 \u0130l\u0259ri s\u0259viyy\u0259 firewall v\u0259 spyware al\u0259tl\u0259ri vasit\u0259l\u0259ri il\u0259 sisteminizi qoruyun.\u00b7\u00a0 \u00a0 \u00a0 Brauzerl\u0259rinizi, sisteminizi v\u0259 proqram t\u0259minat\u0131n\u0131z\u0131 \u0259n son versiyada tutun.38. LAN daxilind\u0259 port bloklanmas\u0131 n\u0259dir?\u00a0 \u00a0Cavab: Bu, istifad\u0259\u00e7il\u0259rin yerli \u015f\u0259b\u0259k\u0259 daxilind\u0259 bir s\u0131ra xidm\u0259tl\u0259r\u0259 daxil olmas\u0131n\u0131 m\u0259hdudla\u015fd\u0131rma\u011fa k\u00f6m\u0259k edir. \u018fsas m\u0259qs\u0259d m\u0259nb\u0259nin portlar vasit\u0259sil\u0259 t\u0259yinat adresin\u0259 \u00e7\u0131x\u0131\u015f t\u0259min etm\u0259sini dayand\u0131rmaqd\u0131r. B\u00fct\u00fcn proqramlar portlarda i\u015fl\u0259diyi \u00fc\u00e7\u00fcn icaz\u0259siz giri\u015fi m\u0259hdudla\u015fd\u0131rmaq \u00fc\u00e7\u00fcn portlar\u0131 bloklamaq laz\u0131md\u0131r ki, bu da \u015f\u0259b\u0259k\u0259 infrastrukturunda t\u0259hl\u00fck\u0259sizlik z\u0259ifliyini poza bil\u0259r.41. Veril\u0259nl\u0259r bazas\u0131ndan \u00e7\u0131xar\u0131lan a\u015fa\u011f\u0131dak\u0131 parollar\u0131n siyah\u0131s\u0131na bax\u0131n:\u00a0\u00a0A. Password1B. @#$)*&^%C. UcSc4Evr!D. akHGksmLNCavab:A\u015fa\u011f\u0131dak\u0131 parollardan hans\u0131 UCSC-nin parol t\u0259l\u0259bl\u0259rin\u0259 cavab verir? Cavab UcSc4Evr! Bu, a\u015fa\u011f\u0131dak\u0131 UCSC t\u0259l\u0259bl\u0259rinin ham\u0131s\u0131na cavab ver\u0259n yegan\u0259 se\u00e7imdir:42. Kiber h\u00fccum\u00e7ular\u0131n n\u00f6vl\u0259rini sadalay\u0131nD\u00f6rd n\u00f6v kiber h\u00fccum\u00e7u var.43.SRM dey\u0259rk\u0259n n\u0259yi n\u0259z\u0259rd\u0259 tutursunuz?Cavab: SRM T\u0259hl\u00fck\u0259sizlik Referans Monitoru m\u0259nas\u0131n\u0131 verir, komp\u00fcter s\u00fcr\u00fcc\u00fcl\u0259rin\u0259 obyekt\u0259 giri\u015f h\u00fcquqlar\u0131n\u0131 verm\u0259k \u00fc\u00e7\u00fcn rutinl\u0259r t\u0259qdim edir.56.Komp\u00fcter virusu n\u0259dir?Cavab:Virus istifad\u0259\u00e7inin raz\u0131l\u0131\u011f\u0131 olmadan h\u0259yata ke\u00e7iril\u0259n z\u0259r\u0259rli proqramd\u0131r. Viruslar CPU vaxt\u0131 v\u0259 yadda\u015f kimi komp\u00fcter resurslar\u0131n\u0131 istehlak ed\u0259 bil\u0259r. B\u0259z\u0259n virus dig\u0259r komp\u00fcter proqramlar\u0131nda d\u0259yi\u015fiklikl\u0259r edir v\u0259 komp\u00fcter sistemin\u0259 z\u0259r\u0259r verm\u0259k \u00fc\u00e7\u00fcn \u00f6z kodunu daxil edir.Komp\u00fcter virusu a\u015fa\u011f\u0131dak\u0131lar \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r:\u0130stifad\u0259\u00e7i id v\u0259 parol kimi \u015f\u0259xsi m\u0259lumatlara daxil olun\u0130stifad\u0259\u00e7iy\u0259 bezdirici mesajlar g\u00f6st\u0259rinKomp\u00fcterinizd\u0259ki m\u0259lumatlar\u0131n z\u0259d\u0259l\u0259nm\u0259si\u0130stifad\u0259\u00e7inin d\u00fcym\u0259 vuru\u015flar\u0131n\u0131 qeyd edinARP poisoning n\u0259dir?Cavab:\u00a0Address Resolution Protocol z\u0259h\u0259rl\u0259nm\u0259si IP \u00fcnvan\u0131n\u0131n \u015f\u0259b\u0259k\u0259 cihaz\u0131nda fiziki \u00fcnvana \u00e7evrildiyi bir h\u00fccum n\u00f6v\u00fcd\u00fcr. Ev sahibi ARP yay\u0131m\u0131 g\u00f6nd\u0259r\u0259c\u0259k v\u0259 b\u00fct\u00fcn q\u0259buledicil\u0259r fiziki \u00fcnvanlar\u0131 il\u0259 cavab ver\u0259c\u0259kl\u0259r. Ba\u015fqa s\u00f6zl\u0259 des\u0259k, ARP z\u0259h\u0259rl\u0259nm\u0259si, \u015f\u0259b\u0259k\u0259y\u0259 qo\u015fulmu\u015f komp\u00fcterin \u0130P \u00fcnvan\u0131 il\u0259 saxta \u00fcnvanlar\u0131 \u0259laq\u0259l\u0259ndirm\u0259k v\u0259 trafiki qa\u00e7\u0131rmaq \u00fc\u00e7\u00fcn ke\u00e7id\u0259 saxta \u00fcnvanlar g\u00f6nd\u0259rilm\u0259sinin ad\u0131d\u0131r.Bunlar:1) kibercinay\u0259tkarlar2) hacktivistl\u0259r3) daxili t\u0259hdidl\u0259r(\u0130nsider threats\u0259)4) d\u00f6vl\u0259t t\u0259r\u0259find\u0259n d\u0259st\u0259kl\u0259n\u0259n h\u00fccum\u00e7ular(State sponsored).45. \u018fl\u00e7atan olan Hacker Al\u0259tl\u0259ri\u00a0 \u00a0 \u00a0 \u00a0 \u00a0A\u015fa\u011f\u0131da faydal\u0131 hack al\u0259tl\u0259rinin siyah\u0131s\u0131 verilmi\u015fdir.AcunetixWebInspectProbablyNetsparkerAngry IP scanner:Burp SuiteSavvius49.Situasiya #1Cavab:Bank hesab\u0131n\u0131zla ba\u011fl\u0131 probleml\u0259 \u00fczl\u0259\u015fdiyini bildir\u0259n e-po\u00e7t m\u0259ktubu g\u00f6nd\u0259rir. E-po\u00e7t t\u0259limatlar v\u0259 h\u0259m\u00e7inin hesaba daxil olmaq \u00fc\u00e7\u00fcn ke\u00e7idl\u0259 t\u0259min edilir ki, siz onu d\u00fcz\u0259ld\u0259 bil\u0259siniz. Yuxar\u0131dak\u0131 v\u0259ziyy\u0259td\u0259n n\u0259 n\u0259tic\u0259 \u00e7\u0131xar\u0131rs\u0131n\u0131z? izah edin.Bu, ist\u0259nm\u0259y\u0259n e-po\u00e7t kimi g\u00f6r\u00fcn\u00fcr. Siz onu spam kimi bildirm\u0259li v\u0259 e-po\u00e7tu d\u0259rhal istifad\u0259 etdiyiniz m\u00fcvafiq veb m\u00fc\u015ft\u0259rid\u0259 (Yahoo Mail, Gmail v\u0259 s.) zibil qutusuna k\u00f6\u00e7\u00fcrm\u0259lisiniz. Bankla ba\u011fl\u0131 h\u0259r hans\u0131 etimadnam\u0259sini onlayn t\u0259qdim etm\u0259zd\u0259n \u0259vv\u0259l, mesaj\u0131n qanuni olub-olmad\u0131\u011f\u0131n\u0131 v\u0259 bankdan oldu\u011funu yoxlamaq \u00fc\u00e7\u00fcn banka z\u0259ng etm\u0259lisiniz.50. Simmetrik \u015fifr\u0259l\u0259m\u0259 alqoritmin\u0259 b\u0259zi n\u00fcmun\u0259l\u0259r verin.A\u015fa\u011f\u0131da simmetrik \u015fifr\u0259l\u0259m\u0259 alqoritminin b\u0259zi n\u00fcmun\u0259l\u0259ri verilmi\u015fdir.RCxBlowfishRijndael (AES)DES51. ECB v\u0259 CBC-nin abreviaturas\u0131 n\u0259dir?Cavab:ECB-nin tam formas\u0131 Elektron Kod Kitab\u0131d\u0131r v\u0259 CBC-nin tam formas\u0131 Cipher Block Chaining-dir.52.Casus proqram\u0131 m\u00fc\u0259yy\u0259nl\u0259\u015fdirin.Cavab:Casus proqram t\u0259\u015fkilat v\u0259 ya \u015f\u0259xs haqq\u0131nda m\u0259lumatlar\u0131 o\u011furlamaq m\u0259qs\u0259di da\u015f\u0131yan z\u0259r\u0259rli proqramd\u0131r. Bu z\u0259r\u0259rli proqram t\u0259\u015fkilat\u0131n komp\u00fcter sistemin\u0259 z\u0259r\u0259r ver\u0259 bil\u0259r.53. ARP poisoning n\u0259dir?Cavab:Address Resolution Protocol z\u0259h\u0259rl\u0259nm\u0259si IP \u00fcnvan\u0131n\u0131n \u015f\u0259b\u0259k\u0259 cihaz\u0131nda fiziki \u00fcnvana \u00e7evrildiyi bir h\u00fccum n\u00f6v\u00fcd\u00fcr. Ev sahibi ARP yay\u0131m\u0131 g\u00f6nd\u0259r\u0259c\u0259k v\u0259 b\u00fct\u00fcn q\u0259buledicil\u0259r fiziki \u00fcnvanlar\u0131 il\u0259 cavab ver\u0259c\u0259kl\u0259r. Ba\u015fqa s\u00f6zl\u0259 des\u0259k, ARP z\u0259h\u0259rl\u0259nm\u0259si, \u015f\u0259b\u0259k\u0259y\u0259 qo\u015fulmu\u015f komp\u00fcterin \u0130P \u00fcnvan\u0131 il\u0259 saxta \u00fcnvanlar\u0131 \u0259laq\u0259l\u0259ndirm\u0259k v\u0259 trafiki qa\u00e7\u0131rmaq \u00fc\u00e7\u00fcn ke\u00e7id\u0259 saxta \u00fcnvanlar g\u00f6nd\u0259rilm\u0259sinin ad\u0131d\u0131r.54. Fiziki olmayan t\u0259hdidl\u0259rin \u00fcmumi n\u00f6vl\u0259rini s\u0131ralay\u0131n:TrojansAdwareWormsSpywareDoS AttackDistributed DoS AttacksVirusKey loggersPhishingKomp\u00fcter sisteml\u0259rinin resurslar\u0131na icaz\u0259siz giri\u015f55.Nmap n\u0259dir?Cavab: Nmap b\u00fct\u00fcn qo\u015fulmu\u015f cihazlar\u0131 m\u00fc\u0259yy\u0259n etm\u0259k v\u0259 i\u015fl\u0259tdikl\u0259ri \u0259m\u0259liyyat sisteml\u0259ri haqq\u0131nda m\u0259lumat \u00e7atd\u0131rmaq \u00fc\u00e7\u00fcn IP paketl\u0259rind\u0259n istifad\u0259 ed\u0259n \u015f\u0259b\u0259k\u0259 skan al\u0259tidir.56.Sistem \u0259sasl\u0131 h\u00fccumlar\u0131n b\u0259zi n\u00fcmun\u0259l\u0259riVirusBackdoorsBotsWorm57.Veb serverin t\u0259hl\u00fck\u0259sizliyini t\u0259min etm\u0259k \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar at\u0131lmal\u0131d\u0131r?Cavab:Update the ownership of the fileKeep your webserver up-to-dateDisable all extra modulesDelete default scriptsM\u00fc\u0259llif:\u00a0Orkhan Jalalov","og_url":"https:\/\/yusif.az\/main\/?p=6777","og_site_name":"www.YUSIF.az","article_published_time":"2024-10-02T07:27:30+00:00","article_modified_time":"2024-10-02T07:32:23+00:00","og_image":[{"width":1496,"height":549,"url":"https:\/\/yusif.az\/main\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-02-112002.png","type":"image\/png"}],"author":"auto61","twitter_card":"summary_large_image","twitter_misc":{"Written by":"auto61","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/yusif.az\/main\/?p=6777#article","isPartOf":{"@id":"https:\/\/yusif.az\/main\/?p=6777"},"author":{"name":"auto61","@id":"https:\/\/yusif.az\/main\/#\/schema\/person\/904da2c1a1bbe7e501df95c2bc38d146"},"headline":"Kibert\u0259hl\u00fck\u0259sizlik sah\u0259sind\u0259 veril\u0259n interv\u00fc suallar\u0131","datePublished":"2024-10-02T07:27:30+00:00","dateModified":"2024-10-02T07:32:23+00:00","mainEntityOfPage":{"@id":"https:\/\/yusif.az\/main\/?p=6777"},"wordCount":5069,"publisher":{"@id":"https:\/\/yusif.az\/main\/#\/schema\/person\/904da2c1a1bbe7e501df95c2bc38d146"},"image":{"@id":"https:\/\/yusif.az\/main\/?p=6777#primaryimage"},"thumbnailUrl":"https:\/\/yusif.az\/main\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-02-112002.png","articleSection":["IT B\u00d6LM\u018fS\u0130","M\u00dcXT\u018fL\u0130F \/ \u0130NFORMAT\u0130KA"],"inLanguage":"az"},{"@type":"WebPage","@id":"https:\/\/yusif.az\/main\/?p=6777","url":"https:\/\/yusif.az\/main\/?p=6777","name":"Kibert\u0259hl\u00fck\u0259sizlik sah\u0259sind\u0259 veril\u0259n interv\u00fc suallar\u0131 - www.YUSIF.az IT B\u00d6LM\u018fS\u0130","isPartOf":{"@id":"https:\/\/yusif.az\/main\/#website"},"primaryImageOfPage":{"@id":"https:\/\/yusif.az\/main\/?p=6777#primaryimage"},"image":{"@id":"https:\/\/yusif.az\/main\/?p=6777#primaryimage"},"thumbnailUrl":"https:\/\/yusif.az\/main\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-02-112002.png","datePublished":"2024-10-02T07:27:30+00:00","dateModified":"2024-10-02T07:32:23+00:00","description":"A\u015fa\u011f\u0131da b\u0259zi tipik interv\u00fc suallar\u0131 t\u0259qdim edir\u0259m, h\u0259m\u00e7inin suallar\u0131n cavablar\u0131 il\u0259 ba\u011fl\u0131 q\u0131sa izahlar da \u0259lav\u0259 edir\u0259m:1. Kriptoqrafiya n\u0259dir?Cavab: Kriptoqrafiya m\u0259lumat\u0131n icaz\u0259 verilm\u0259diyi \u00fc\u00e7\u00fcnc\u00fc t\u0259r\u0259fl\u0259rd\u0259n m\u0259lumat\u0131 qorumaq \u00fc\u00e7\u00fcn m\u0259xfi m\u0259lumatlar\u0131 kodla\u015fd\u0131r\u0131lm\u0131\u015f \u015f\u0259kild\u0259 \u00e7evirm\u0259k v\u0259 \u00f6t\u00fcrm\u0259k \u00fcsuludur.3. IDS v\u0259 IPS aras\u0131ndak\u0131 f\u0259rq n\u0259dir?Cavab: IDS Intrusion Detection System\u2019dir v\u0259 o, yaln\u0131z m\u00fcdaxil\u0259l\u0259ri a\u015fkarlay\u0131r v\u0259 administrator is\u0259 m\u00fcdaxil\u0259nin qar\u015f\u0131s\u0131n\u0131 almal\u0131d\u0131r.Halbuki, IPS y\u0259ni Intrusion Prevention System-d\u0259 sistem m\u00fcdaxil\u0259ni a\u015fkarlay\u0131r v\u0259 h\u0259m\u00e7inin m\u00fcdaxil\u0259nin qar\u015f\u0131s\u0131n\u0131 almaq \u00fc\u00e7\u00fcn t\u0259dbirl\u0259r g\u00f6r\u00fcr.4. CIA \u00fc\u00e7buca\u011f\u0131n\u0131 a\u00e7\u0131qlay\u0131nCavab: CIA-\u0131n a\u00e7\u0131l\u0131\u015f\u0131 Confidentiality(Konfidensiall\u0131q), Integrity(taml\u0131q) v\u0259 Availability(\u0259l\u00e7atanl\u0131q)-d\u0131r. CIA \u0130nformasiya T\u0259hl\u00fck\u0259sizliyi siyas\u0259tl\u0259rin\u0259 r\u0259hb\u0259rlik etm\u0259k \u00fc\u00e7\u00fcn haz\u0131rlanm\u0131\u015f modeldir. Bu, t\u0259\u015fkilatlar t\u0259r\u0259find\u0259n istifad\u0259 edil\u0259n \u0259n m\u0259\u015fhur modell\u0259rd\u0259n biridir.Konfidensiall\u0131qM\u0259lumat yaln\u0131z s\u0259lahiyy\u0259tli i\u015f\u00e7il\u0259r \u00fc\u00e7\u00fcn \u0259l\u00e7atan v\u0259 oxuna bil\u0259n olmal\u0131d\u0131r. O, icaz\u0259siz i\u015f\u00e7il\u0259r t\u0259r\u0259find\u0259n \u0259l\u00e7atan olmamal\u0131d\u0131r. Kims\u0259 m\u0259lumatlara daxil olmaq \u00fc\u00e7\u00fcn hakerd\u0259n istifad\u0259 ed\u0259rs\u0259, m\u0259lumat g\u00fccl\u00fc \u015f\u0259kild\u0259 \u015fifr\u0259l\u0259nm\u0259lidir ki, m\u0259lumat \u0259ld\u0259 olunsa bel\u0259, oxunaq v\u0259 ya ba\u015fa d\u00fc\u015f\u00fcl\u0259n olmas\u0131n.Taml\u0131qM\u0259lumatlar\u0131n icaz\u0259si olmayan \u015f\u0259xsl\u0259r t\u0259r\u0259find\u0259n d\u0259yi\u015fdirilm\u0259diyind\u0259n \u0259min olmaq \u00fc\u00e7\u00fcnd\u00fcr. D\u00fcr\u00fcstl\u00fck m\u0259lumatlar\u0131n icaz\u0259si olmayan i\u015f\u00e7il\u0259r t\u0259r\u0259find\u0259n pozulmamas\u0131n\u0131 v\u0259 ya d\u0259yi\u015fdirilm\u0259m\u0259sini t\u0259min edir. S\u0259lahiyy\u0259tli \u015f\u0259xs\/sistem m\u0259lumatlar\u0131 d\u0259yi\u015fdirm\u0259y\u0259 \u00e7al\u0131\u015f\u0131rsa v\u0259 d\u0259yi\u015fiklik u\u011fursuz olarsa, m\u0259lumat geri qaytar\u0131lmal\u0131 v\u0259 z\u0259d\u0259l\u0259nm\u0259m\u0259lidir.\u018fl\u00e7atanl\u0131qM\u0259lumat istifad\u0259\u00e7i t\u0259l\u0259b etdiyi zaman istifad\u0259\u00e7i \u00fc\u00e7\u00fcn \u0259l\u00e7atan olmal\u0131d\u0131r. Avadanl\u0131\u011f\u0131n saxlanmas\u0131, m\u00fcnt\u0259z\u0259m olaraq t\u0259kmill\u0259\u015fdirilm\u0259si, M\u0259lumatlar\u0131n Yed\u0259kl\u0259nm\u0259si v\u0259 B\u0259rpas\u0131, \u015e\u0259b\u0259k\u0259 Darbo\u011fazlar\u0131na diqq\u0259t yetirilm\u0259lidir.5. \u015eifr\u0259l\u0259m\u0259 Hashing-d\u0259n n\u0259 il\u0259 f\u0259rql\u0259nir?\u00a0Cavab: H\u0259m \u015eifr\u0259l\u0259m\u0259, h\u0259m d\u0259 Hashing oxuna bil\u0259n m\u0259lumatlar\u0131 oxunmayan formata \u00e7evirm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunur. F\u0259rq ondad\u0131r ki, \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat \u015fifr\u0259nin a\u00e7\u0131lmas\u0131 prosesi il\u0259 yenid\u0259n orijinal m\u0259lumatlara \u00e7evril\u0259 bil\u0259r, lakin hash edilmi\u015f m\u0259lumatlar orijinal m\u0259lumatlara qaytar\u0131la bilm\u0259z6. Firewall n\u0259dir v\u0259 ondan n\u0259 \u00fc\u00e7\u00fcn istifad\u0259 olunur?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0Cavab:Firewall \u015f\u0259b\u0259k\u0259 trafikini izl\u0259y\u0259n v\u0259 idar\u0259 ed\u0259n sistem\/\u015f\u0259b\u0259k\u0259 s\u0259rh\u0259dl\u0259rind\u0259 qurulmu\u015f \u015f\u0259b\u0259k\u0259 t\u0259hl\u00fck\u0259sizlik sistemidir.Firewalllar \u0259sas\u0259n sistemi\/\u015f\u0259b\u0259k\u0259ni viruslar, qurdlar, z\u0259r\u0259rli proqramlar v\u0259 s.-d\u0259n qorumaq \u00fc\u00e7\u00fcn istifad\u0259 olunur. Firewalllar h\u0259m\u00e7inin uzaqdan giri\u015fin(Remote Access) v\u0259 m\u0259zmunun filtrl\u0259nm\u0259sinin qar\u015f\u0131s\u0131n\u0131 almaq \u00fc\u00e7\u00fcn d\u0259 ola bil\u0259r.7. VA (Z\u0259ifliyin Qiym\u0259tl\u0259ndirilm\u0259si) v\u0259 PT (Penetrasiya Testi) aras\u0131nda f\u0259rq n\u0259dir?Cavab:Vulnerability Assessment qar\u015f\u0131 sistemd\u0259 q\u00fcsurlar\u0131n tap\u0131lmas\u0131 prosesidir. T\u0259\u015fkilatlar sisteml\u0259rinin\/\u015f\u0259b\u0259k\u0259l\u0259rinin q\u00fcsurlar\u0131 v\u0259 ya z\u0259if t\u0259r\u0259fl\u0259ri oldu\u011funu bilir v\u0259 bu q\u00fcsurlar\u0131 tapmaq v\u0259 d\u00fcz\u0259ltm\u0259k \u00fc\u00e7\u00fcn q\u00fcsurlar\u0131 prioritetl\u0259\u015fdirm\u0259k ist\u0259yir.Penetration Testing h\u0259d\u0259fd\u0259 z\u0259iflikl\u0259rin tap\u0131lmas\u0131 prosesidir. T\u0259\u015fkilatlar d\u00fc\u015f\u00fcn\u0259 bil\u0259c\u0259kl\u0259ri b\u00fct\u00fcn t\u0259hl\u00fck\u0259sizlik t\u0259dbirl\u0259rini qurublar.Onlar\u0131n sistemini\/\u015f\u0259b\u0259k\u0259sini s\u0131nd\u0131rmaq \u00fc\u00e7\u00fcn ba\u015fqa yol olub-olmad\u0131\u011f\u0131n\u0131 bilm\u0259k v\u0259 yoxlamaq \u00fc\u00e7\u00fcn bu xidm\u0259td\u0259n istifad\u0259 edirl\u0259r.8.\u00dc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma n\u0259dir?Cavab:\u00a0\u00dc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma, host v\u0259 m\u00fc\u015ft\u0259ri aras\u0131nda \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn TCP\/IP \u015f\u0259b\u0259k\u0259sind\u0259 istifad\u0259 edil\u0259n \u00fcsuldur. Bu, \u00fc\u00e7t\u0259r\u0259fli \u0259l s\u0131xma adlan\u0131r, \u00e7\u00fcnki bu, m\u00fc\u015ft\u0259ri v\u0259 serverin paket m\u00fcbadil\u0259si apard\u0131\u011f\u0131 \u00fc\u00e7 add\u0131ml\u0131 bir \u00fcsuldur. \u00dc\u00e7 add\u0131m a\u015fa\u011f\u0131dak\u0131lard\u0131r:1.\u00a0 \u00a0M\u00fc\u015ft\u0259ri server\u0259 SYN (Sinxronizasiya) paketini g\u00f6nd\u0259rir, serverin i\u015fl\u0259k v\u0259ziyy\u0259td\u0259 olub olmad\u0131\u011f\u0131n\u0131 v\u0259 ya a\u00e7\u0131q portlar\u0131n olub olmad\u0131\u011f\u0131n\u0131 yoxlay\u0131r.2.\u00a0 \u00a0Server a\u00e7\u0131q portlar\u0131 varsa, m\u00fc\u015ft\u0259riy\u0259 SYN-ACK paketini g\u00f6nd\u0259rir3.\u00a0 \u00a0M\u00fc\u015ft\u0259ri bunu q\u0259bul edir v\u0259 server\u0259 ACK (T\u0259qdimat) paketi g\u00f6nd\u0259rir.9. Veb T\u0259tbiqind\u0259n al\u0131na bil\u0259n cavab kodlar\u0131 hans\u0131lard\u0131r?Cavab:\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a01xx \u2013 M\u0259lumat xarakterli cavablar(Informational responses)2xx \u2013 U\u011fur(Success)3xx \u2013 Yenid\u0259n y\u00f6nl\u0259ndirm\u0259(Redirection)4xx \u2013 M\u00fc\u015ft\u0259ri t\u0259r\u0259f x\u0259tas\u0131(Client-side error)5xx \u2013 Server t\u0259r\u0259f x\u0259tas\u0131(Server-side error)10. Traceroute n\u0259dir?Cavab:\u00a0Traceroute paketin yolunu g\u00f6st\u0259r\u0259n bir vasit\u0259dir. O, paketin ke\u00e7diyi b\u00fct\u00fcn n\u00f6qt\u0259l\u0259ri (\u0259sas\u0259n mar\u015frutla\u015fd\u0131r\u0131c\u0131lar) sadalay\u0131r. Bu, \u0259sas\u0259n paket t\u0259yinat yerin\u0259 \u00e7atmad\u0131qda istifad\u0259 olunur. Traceroute, nasazl\u0131q n\u00f6qt\u0259sini m\u00fc\u0259yy\u0259n etm\u0259k \u00fc\u00e7\u00fcn \u0259laq\u0259nin harada dayand\u0131\u011f\u0131n\u0131 v\u0259 ya pozuldu\u011funu yoxlamaq \u00fc\u00e7\u00fcn istifad\u0259 olunur.11. Firewall qurmaq \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar var?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Cavab:1.\u00a0 \u00a0Username\/password: firewall cihaz\u0131 \u00fc\u00e7\u00fcn standart parolu d\u0259yi\u015fdirin2.\u00a0 \u00a0Remote administration: Uzaqdan idar\u0259etm\u0259 funksiyas\u0131n\u0131 s\u00f6nd\u00fcr\u00fcn3.\u00a0 \u00a0Port forwarding: Veb server v\u0259 ya FTP server kimi m\u00fc\u0259yy\u0259n proqramlar\u0131n d\u00fczg\u00fcn i\u015fl\u0259m\u0259si \u00fc\u00e7\u00fcn m\u00fcvafiq port y\u00f6nl\u0259ndirm\u0259sini konfiqurasiya edin4.\u00a0 \u00a0DHCP Server: Firewallun m\u00f6vcud DHCP serveri il\u0259 \u015f\u0259b\u0259k\u0259y\u0259 qura\u015fd\u0131r\u0131lmas\u0131, firewallun DHCP-si deaktiv edilm\u0259yinc\u0259 m\u00fcnaqi\u015f\u0259y\u0259 s\u0259b\u0259b olacaq.5.\u00a0 \u00a0Logging: Firewall probleml\u0259rini v\u0259 ya potensial h\u00fccumlar\u0131 aradan qald\u0131rmaq \u00fc\u00e7\u00fcn giri\u015fin aktiv oldu\u011fundan \u0259min olun v\u0259 log-lara nec\u0259 baxmaq laz\u0131m oldu\u011funu anlay\u0131n.6.\u00a0 \u00a0Policies: M\u00f6hk\u0259m t\u0259hl\u00fck\u0259sizlik siyas\u0259tl\u0259riniz olmal\u0131 v\u0259 Firewall-un h\u0259min siyas\u0259tl\u0259ri t\u0259tbiq etm\u0259k \u00fc\u00e7\u00fcn konfiqurasiya edildiyin\u0259 \u0259min olmal\u0131s\u0131n\u0131z.12. SSL \u015eifr\u0259l\u0259m\u0259sini izah edinCavab:\u00a0 \u00a0\u00a0SSL (Secure Sockets Layer) Veb Server v\u0259 Brauzer aras\u0131nda \u015fifr\u0259l\u0259nmi\u015f \u0259laq\u0259l\u0259r yaradan s\u0259naye standartl\u0131 t\u0259hl\u00fck\u0259sizlik texnologiyas\u0131d\u0131r. Bu, m\u0259lumatlar\u0131n m\u0259xfiliyini qorumaq v\u0259 onlayn \u0259m\u0259liyyatlarda m\u0259lumat\u0131 qorumaq \u00fc\u00e7\u00fcn istifad\u0259 olunur.SSL ba\u011flant\u0131s\u0131 qurmaq \u00fc\u00e7\u00fcn add\u0131mlar a\u015fa\u011f\u0131dak\u0131 kimidir:1.\u00a0 \u00a0Brauzer SSL il\u0259 qorunan veb server\u0259 qo\u015fulma\u011fa \u00e7al\u0131\u015f\u0131r2.\u00a0 \u00a0Brauzer SSL sertifikat\u0131n\u0131n sur\u0259tini brauzer\u0259 g\u00f6nd\u0259rir3.\u00a0 \u00a0Brauzer SSL sertifikat\u0131n\u0131n etibarl\u0131 olub olmad\u0131\u011f\u0131n\u0131 yoxlay\u0131r. Etibarl\u0131d\u0131rsa, o zaman brauzer veb server\u0259 \u015fifr\u0259li \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn mesaj g\u00f6nd\u0259rir4.\u00a0 \u00a0Veb server SSL \u015fifr\u0259li ba\u011flant\u0131ya ba\u015flamaq \u00fc\u00e7\u00fcn t\u0259sdiq g\u00f6nd\u0259rir5. SSL \u015fifr\u0259li \u0259lqa\u0259 brauzer v\u0259 veb server aras\u0131nda ba\u015f verir13. Serverin t\u0259hl\u00fck\u0259sizliyini t\u0259min etm\u0259k \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar\u0131 atacaqs\u0131n\u0131z?Cavab:\u00a0 \u00a0 \u00a0T\u0259hl\u00fck\u0259siz serverl\u0259r m\u0259lumatlar\u0131 icaz\u0259siz \u0259l\u0259 ke\u00e7irm\u0259kd\u0259n qorumaq \u00fc\u00e7\u00fcn m\u0259lumatlar\u0131n \u015fifr\u0259l\u0259nm\u0259si v\u0259 \u015fifr\u0259sinin a\u00e7\u0131lmas\u0131 \u00fc\u00e7\u00fcn Secure Sockets Layer (SSL) protokolundan istifad\u0259 edir.Serveri qorumaq \u00fc\u00e7\u00fcn d\u00f6rd sad\u0259 yol var:Add\u0131m 1: Root v\u0259 administrator istifad\u0259\u00e7il\u0259riniz \u00fc\u00e7\u00fcn t\u0259hl\u00fck\u0259siz parolunuz oldu\u011fundan \u0259min olunAdd\u0131m 2: Sizin etm\u0259li oldu\u011funuz n\u00f6vb\u0259ti \u015fey sisteminizd\u0259 yeni istifad\u0259\u00e7il\u0259r yaratmaqd\u0131r. Bunlar sistemi idar\u0259 etm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 etdiyiniz istifad\u0259\u00e7il\u0259r olacaqAdd\u0131m 3: default root\/administrator hesablar\u0131ndan uzaqdan giri\u015fi silinAdd\u0131m 4: N\u00f6vb\u0259ti add\u0131m uzaqdan giri\u015f \u00fc\u00e7\u00fcn Firewall qaydalar\u0131n\u0131z\u0131 konfiqurasiya etm\u0259kdir14. M\u0259lumat s\u0131zmas\u0131n\u0131(Data Leakage) izah edinCvaab: M\u0259lumat s\u0131zmas\u0131 m\u0259lumatlar\u0131n t\u0259\u015fkilat daxilind\u0259n icaz\u0259siz k\u0259nar t\u0259yinat yerin\u0259 q\u0259sd\u0259n v\u0259 ya ist\u0259m\u0259d\u0259n \u00f6t\u00fcr\u00fclm\u0259sidir. Bu, m\u0259xfi m\u0259lumat\u0131n icaz\u0259siz quruma a\u00e7\u0131qlanmas\u0131d\u0131r.M\u0259lumat s\u0131zmas\u0131 nec\u0259 ba\u015f verdiyin\u0259 g\u00f6r\u0259 3 kateqoriyaya b\u00f6l\u00fcn\u0259 bil\u0259r:1. T\u0259sad\u00fcfi pozulma: M\u00fc\u0259ssis\u0259 s\u0259hv v\u0259 ya kobud n\u00f6qteyi-n\u0259z\u0259rd\u0259n icaz\u0259siz \u015f\u0259xs\u0259 m\u0259lumat g\u00f6nd\u0259rir2. Q\u0259sd\u0259n pozma: S\u0259lahiyy\u0259tli qurum m\u0259qs\u0259dli \u015f\u0259kild\u0259 icaz\u0259siz quruma m\u0259lumatlar\u0131 g\u00f6nd\u0259rir3. Sistem Hack: Hacking \u00fcsullar\u0131 m\u0259lumat s\u0131zmas\u0131na s\u0259b\u0259b olmaq \u00fc\u00e7\u00fcn istifad\u0259 olunurDLP (Data Leakage Prevention) Al\u0259tl\u0259ri kimi tan\u0131nan al\u0259tl\u0259r, proqram t\u0259minat\u0131 v\u0259 strategiyalardan istifad\u0259 etm\u0259kl\u0259 m\u0259lumat s\u0131zmas\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 almaq olar.15. \u00dcmumi kiberh\u00fccumlardan b\u0259zil\u0259ri hans\u0131lard\u0131r?Cavab: A\u015fa\u011f\u0131da sisteminiz\u0259 m\u0259nfi t\u0259sir g\u00f6st\u0259r\u0259 bil\u0259c\u0259k b\u0259zi \u00fcmumi kiberh\u00fccumlar verilmi\u015fdir.MalwarePhishingPassword AttacksDDoSMan in the MiddleDrive-By DownloadsMalvertisingRogue Software16. Port Scanning n\u0259dir?\u00a0 \u00a0Cavab: Port Skanlama, hostda m\u00f6vcud olan a\u00e7\u0131q portlar\u0131 v\u0259 xidm\u0259ti m\u00fc\u0259yy\u0259n etm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259n texnikad\u0131r. Hakerl\u0259r z\u0259iflikl\u0259rd\u0259n istifad\u0259 etm\u0259k \u00fc\u00e7\u00fcn faydal\u0131 ola bil\u0259c\u0259k m\u0259lumatlar\u0131 tapmaq \u00fc\u00e7\u00fcn port skan\u0131ndan istifad\u0259 edirl\u0259r.\u0130dar\u0259\u00e7il\u0259r \u015f\u0259b\u0259k\u0259nin t\u0259hl\u00fck\u0259sizlik siyas\u0259tl\u0259rini yoxlamaq \u00fc\u00e7\u00fcn Port Skanlamas\u0131ndan istifad\u0259 edirl\u0259r.\u00dcmumi Port Skanlama Texnikalar\u0131ndan b\u0259zil\u0259ri bunlard\u0131r:Ping ScanTCP Half-OpenTCP ConnectUDPStealth Scanning17. Brute Force Attack n\u0259dir? Bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 ala bil\u0259rsiniz?\u00a0 \u00a0Cavab: Brute Force, m\u00fcmk\u00fcn etimadnam\u0259l\u0259rin b\u00fct\u00fcn d\u0259yi\u015fm\u0259l\u0259rini v\u0259 kombinasiyalar\u0131n\u0131 t\u0259krar-t\u0259krar s\u0131namaqla d\u00fczg\u00fcn etimadnam\u0259l\u0259ri tapmaq \u00fcsuludur.\u018fks\u0259r hallarda Brute Force h\u00fccumlar\u0131 avtomatla\u015fd\u0131r\u0131l\u0131r, burada al\u0259t\/proqram avtomatik olaraq etimadnam\u0259l\u0259r siyah\u0131s\u0131 il\u0259 daxil olma\u011fa \u00e7al\u0131\u015f\u0131r. Brute Force h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 alma\u011f\u0131n m\u00fcxt\u0259lif yollar\u0131 var.Onlardan b\u0259zil\u0259ri bunlard\u0131r:Parolun uzunlu\u011fu: Siz parol \u00fc\u00e7\u00fcn minimum uzunluq t\u0259yin ed\u0259 bil\u0259rsiniz. \u015eifr\u0259 n\u0259 q\u0259d\u0259r uzun olsa, onu tapmaq bir o q\u0259d\u0259r \u00e7\u0259tindir.\u015eifr\u0259 M\u00fcr\u0259kk\u0259bliyi: Parolda simvollar\u0131n m\u00fcxt\u0259lif formatlar\u0131n\u0131n daxil edilm\u0259si kobud g\u00fcc h\u00fccumlar\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir. X\u00fcsusi simvollar v\u0259 b\u00f6y\u00fck v\u0259 ki\u00e7ik h\u0259rfl\u0259rl\u0259 birlikd\u0259 alfa-r\u0259q\u0259m parollar\u0131ndan istifad\u0259 parol m\u00fcr\u0259kk\u0259bliyini art\u0131r\u0131r v\u0259 s\u0131nd\u0131r\u0131lmas\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir.Giri\u015f c\u0259hdl\u0259rinin m\u0259hdudla\u015fd\u0131r\u0131lmas\u0131: Giri\u015f u\u011fursuzluqlar\u0131na limit t\u0259yin edin. M\u0259s\u0259l\u0259n, giri\u015f x\u0259talar\u0131 \u00fc\u00e7\u00fcn limiti 3 kimi t\u0259yin ed\u0259 bil\u0259rsiniz. Bel\u0259likl\u0259, ard\u0131c\u0131l 3 giri\u015f u\u011fursuzlu\u011fu olduqda, istifad\u0259\u00e7inin bir m\u00fcdd\u0259t daxil olmas\u0131n\u0131 m\u0259hdudla\u015fd\u0131r\u0131n v\u0259 ya n\u00f6vb\u0259ti d\u0259f\u0259 daxil olmas\u0131, istifad\u0259 etm\u0259si \u00fc\u00e7\u00fcn E-po\u00e7t v\u0259 ya OTP g\u00f6nd\u0259rin. Brute Force avtomatla\u015fd\u0131r\u0131lm\u0131\u015f proses oldu\u011fundan, giri\u015f c\u0259hdl\u0259rini m\u0259hdudla\u015fd\u0131rmaq Brute Force prosesini pozacaq.18. OSI modelinin m\u00fcxt\u0259lif t\u0259b\u0259q\u0259l\u0259ri hans\u0131lard\u0131r?\u00a0 \u00a0 \u00a0Cavab: OSI modeli, proqramlar\u0131n \u015f\u0259b\u0259k\u0259 \u00fcz\u0259rind\u0259n nec\u0259 \u0259laq\u0259 saxlayaca\u011f\u0131na dair \u0259laq\u0259li istinad modelidir. OSI referans\u0131n\u0131n m\u0259qs\u0259di r\u0259q\u0259msal kommunikasiya m\u0259hsullar\u0131 v\u0259 software proqramlar\u0131n\u0131n qar\u015f\u0131l\u0131ql\u0131 f\u0259aliyy\u0259t g\u00f6st\u0259r\u0259 bilm\u0259si \u00fc\u00e7\u00fcn sat\u0131c\u0131lara v\u0259 t\u0259rtibat\u00e7\u0131lara r\u0259hb\u0259rlik etm\u0259kdir.Fiziki s\u0259viyy\u0259(Physical): R\u0259q\u0259msal m\u0259lumatlar\u0131n rabit\u0259 vasit\u0259si il\u0259 g\u00f6nd\u0259ricid\u0259n al\u0131c\u0131ya \u00f6t\u00fcr\u00fclm\u0259sin\u0259 cavabdehdirData Link Layer: Veril\u0259nl\u0259rin fiziki ke\u00e7id\u0259 v\u0259 oradan h\u0259r\u0259k\u0259tini idar\u0259 edir. O, h\u0259m\u00e7inin m\u0259lumat bitl\u0259rinin kodla\u015fd\u0131r\u0131lmas\u0131 v\u0259 dekodlanmas\u0131na cavabdehdir.\u015e\u0259b\u0259k\u0259 s\u0259viyy\u0259si: Paketin y\u00f6nl\u0259ndirilm\u0259si v\u0259 \u015f\u0259b\u0259k\u0259 rabit\u0259si \u00fc\u00e7\u00fcn mar\u015frutla\u015fd\u0131rma yollar\u0131n\u0131n t\u0259min edilm\u0259sin\u0259 cavabdehdir.N\u0259qliyyat Layeri: \u015e\u0259b\u0259k\u0259 \u00fcz\u0259rind\u0259n end-to-end rabit\u0259y\u0259 cavabdehdir. O, m\u0259lumat\u0131 yuxar\u0131dak\u0131 t\u0259b\u0259q\u0259d\u0259n ay\u0131r\u0131r v\u0259 \u015e\u0259b\u0259k\u0259 Layerin\u0259 \u00f6t\u00fcr\u00fcr v\u0259 sonra b\u00fct\u00fcn m\u0259lumatlar\u0131n q\u0259buledicinin sonuna u\u011furla \u00e7atmas\u0131n\u0131 t\u0259min edir.Session Layer: G\u00f6nd\u0259r\u0259n v\u0259 q\u0259bul ed\u0259n aras\u0131nda \u0259laq\u0259ni idar\u0259 edir. O, sessiyan\u0131n ba\u015flamas\u0131, ba\u015fa \u00e7atmas\u0131 v\u0259 idar\u0259 edilm\u0259sin\u0259, g\u00f6nd\u0259rici il\u0259 q\u0259buledici aras\u0131nda qar\u015f\u0131l\u0131ql\u0131 \u0259laq\u0259nin qurulmas\u0131na, saxlanmas\u0131na v\u0259 sinxronla\u015fd\u0131r\u0131lmas\u0131na cavabdehdir.T\u0259qdimat Layeri: Bu, xam dataqramlar v\u0259 ya paketl\u0259r g\u00f6nd\u0259rm\u0259k \u0259v\u0259zin\u0259 veril\u0259nl\u0259rin d\u00fczg\u00fcn formatda v\u0259 m\u0259lumat strukturunda t\u0259qdim edilm\u0259si il\u0259 m\u0259\u015f\u011ful olur.T\u0259tbiq Layeri: T\u0259tbiq v\u0259 \u015f\u0259b\u0259k\u0259 aras\u0131nda interfeys t\u0259min edir. O, prosesd\u0259n proses\u0259 rabit\u0259y\u0259 diqq\u0259t yetirir v\u0259 \u00fcnsiyy\u0259t interfeysini t\u0259min edir.\u00a0 \u00a0\u00a019. VPN n\u0259dir?Cavab: Dem\u0259k olar ki, b\u00fct\u00fcn Kibert\u0259hl\u00fck\u0259sizlik M\u00fcsahib\u0259 Suallar\u0131na bu sual daxil edilir. VPN Virtual \u015e\u0259xsi \u015e\u0259b\u0259k\u0259 dem\u0259kdir. T\u0259hl\u00fck\u0259siz v\u0259 \u015fifr\u0259li \u0259laq\u0259 yaratmaq \u00fc\u00e7\u00fcn istifad\u0259 olunur. Bir VPN istifad\u0259 ed\u0259rk\u0259n, m\u00fc\u015ft\u0259rid\u0259n g\u0259l\u0259n m\u0259lumatlar VPN-d\u0259 \u015fifr\u0259l\u0259ndiyi bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir v\u0259 sonra internet vasit\u0259sil\u0259 ba\u015fqa bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir.Bu zaman veril\u0259nl\u0259rin \u015fifr\u0259si a\u00e7\u0131l\u0131r v\u0259 server\u0259 g\u00f6nd\u0259rilir. Server cavab g\u00f6nd\u0259rdikd\u0259, cavab VPN-in \u015fifr\u0259l\u0259ndiyi bir n\u00f6qt\u0259y\u0259 v\u0259 bu \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat VPN-in \u015fifr\u0259sinin a\u00e7\u0131ld\u0131\u011f\u0131 ba\u015fqa bir n\u00f6qt\u0259y\u0259 g\u00f6nd\u0259rilir. V\u0259 n\u0259hay\u0259t, \u015fifr\u0259si a\u00e7\u0131lm\u0131\u015f m\u0259lumatlar m\u00fc\u015ft\u0259riy\u0259 g\u00f6nd\u0259rilir. VPN-d\u0259n istifad\u0259 etm\u0259yin b\u00fct\u00fcn m\u0259qs\u0259di \u015fifr\u0259l\u0259nmi\u015f m\u0259lumat \u00f6t\u00fcr\u00fclm\u0259sini t\u0259min etm\u0259kdir.20. \u015e\u0259b\u0259k\u0259d\u0259 Risk, Z\u0259iflik v\u0259 T\u0259hdid dedikd\u0259 n\u0259 ba\u015fa d\u00fc\u015f\u00fcrs\u00fcn\u00fcz?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Cvaab: T\u0259hdid: Sistem\u0259 v\u0259 ya t\u0259\u015fkilata z\u0259r\u0259r vurma potensial\u0131 olan kims\u0259Z\u0259iflik: Potensial haker t\u0259r\u0259find\u0259n istifad\u0259 edil\u0259 bil\u0259n sistemd\u0259ki z\u0259iflikRisk: T\u0259hl\u00fck\u0259li z\u0259iflikd\u0259n istifad\u0259 etdikd\u0259 itki v\u0259 ya z\u0259d\u0259l\u0259nm\u0259 potensial\u013121. Black Hat, White Hat v\u0259 Gray Hat hakerl\u0259ri n\u0259dir?\u00a0 \u00a0Cavab:Blach Hat hakerl\u0259r komp\u00fcter \u015f\u0259b\u0259k\u0259l\u0259rin\u0259 m\u00fcdaxil\u0259 haqq\u0131nda geni\u015f biliy\u0259 malik olmaqlar\u0131 il\u0259 tan\u0131n\u0131rlar. Onlar bu sisteml\u0259r\u0259 daxil olmaq \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259n z\u0259r\u0259rli proqramlar yaza bilirl\u0259r. Bu tip hakerl\u0259r m\u0259lumat o\u011furlamaq v\u0259 ya s\u0131nd\u0131r\u0131lm\u0131\u015f sistemd\u0259n z\u0259r\u0259rli m\u0259qs\u0259dl\u0259r \u00fc\u00e7\u00fcn \u00f6z bacar\u0131qlar\u0131ndan sui-istifad\u0259 edirl\u0259r.White Hat hakerl\u0259r \u00f6z s\u0259lahiyy\u0259tl\u0259rini yax\u015f\u0131 i\u015fl\u0259r \u00fc\u00e7\u00fcn istifad\u0259 edirl\u0259r v\u0259 buna g\u00f6r\u0259 d\u0259 onlara Etik Hakerl\u0259r deyilir. Onlar Black Hat hackerler il\u0259 eyni biliy\u0259 malik olurlar. Bunlar \u0259sas\u0259n \u015firk\u0259tl\u0259r t\u0259r\u0259find\u0259n sisteml\u0259rd\u0259 z\u0259iflikl\u0259ri v\u0259 t\u0259hl\u00fck\u0259sizlik bo\u015fluqlar\u0131n\u0131 tapma\u011fa v\u0259 d\u00fcz\u0259ltm\u0259y\u0259 \u00e7al\u0131\u015fan bir t\u0259hl\u00fck\u0259sizlik m\u00fct\u0259x\u0259ssisi kimi i\u015f\u0259 g\u00f6t\u00fcr\u00fcl\u00fcrl\u0259r. Onlar t\u0259hl\u00fck\u0259sizliyi yax\u015f\u0131la\u015fd\u0131rmaq \u00fc\u00e7\u00fcn \u00f6z bacar\u0131qlar\u0131ndan istifad\u0259 edirl\u0259r.Gray Hat hakerl\u0259r White v\u0259 Black Hat hakerinin birl\u0259\u015fm\u0259sidir. Sahibinin icaz\u0259si olmadan sistem z\u0259iflikl\u0259rini axtar\u0131rlar. H\u0259r hans\u0131 bir z\u0259iflik a\u015fkar ed\u0259rl\u0259rs\u0259, bu bar\u0259d\u0259 sahibin\u0259 m\u0259lumat verirl\u0259r. Black Hat hakerl\u0259rd\u0259n f\u0259rqli olaraq, onlar a\u015fkar edilmi\u015f z\u0259iflikl\u0259rd\u0259n istifad\u0259 etmirl\u0259r.22.XSS h\u00fccumunu izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?Cavab:XSS (Saytlararas\u0131 Skriptl\u0259m\u0259) hakerl\u0259r\u0259 veb s\u0259hif\u0259l\u0259r\u0259 z\u0259r\u0259rli client-side skriptl\u0259ri yeritm\u0259y\u0259 imkan ver\u0259n kiberh\u00fccumdur. XSS sessiyalar\u0131 v\u0259 kukil\u0259ri o\u011furlamaq, DOM-u d\u0259yi\u015fdirm\u0259k, remote code execution, serveri s\u0131nd\u0131rmaq v\u0259 s. \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r.XSS-in n\u00f6vl\u0259ri-\u00a0 \u00a0 \u00a0 \u00a0Reflected XSS-\u00a0 \u00a0 \u00a0 \u00a0Stored XSS-\u00a0 \u00a0 \u00a0 \u00a0DOM Based XSSA\u015fa\u011f\u0131dak\u0131 t\u0259cr\u00fcb\u0259l\u0259rd\u0259n istifad\u0259 etm\u0259kl\u0259 XSS h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:\u0130stifad\u0259\u00e7i daxiletm\u0259l\u0259rini t\u0259sdiql\u0259yin (Validate user inputs)\u00b7\u00a0 \u00a0 \u00a0 \u00a0\u0130stifad\u0259\u00e7i giri\u015fl\u0259rini t\u0259mizl\u0259yin (Sanitize user inputs)X\u00fcsusi simvollar\u0131 kodlay\u0131n(Encode special characters)Anti-XSS xidm\u0259tl\u0259rind\u0259n\/al\u0259tl\u0259rind\u0259n istifad\u0259 edin (Use Anti-XSS services\/tools)XSS HTML Filtrind\u0259n istifad\u0259 edin(Use XSS HTML Filter)24. Botnet n\u0259dir?Cavab: Botnet, h\u0259r bir cihaz\u0131n \u00fcz\u0259rind\u0259 bir v\u0259 ya daha \u00e7ox botun i\u015fl\u0259diyi internet\u0259 qo\u015fulmu\u015f bir s\u0131ra cihazlard\u0131r.Qur\u011fulardak\u0131 botlar v\u0259 z\u0259r\u0259rli skriptl\u0259r qurban\u0131 s\u0131nd\u0131rmaq \u00fc\u00e7\u00fcn istifad\u0259 olunurdu. Botnetl\u0259r m\u0259lumatlar\u0131 o\u011furlamaq, spam g\u00f6nd\u0259rm\u0259k v\u0259 DDOS h\u00fccumunu h\u0259yata ke\u00e7irm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r.25. SSL v\u0259 TLS-I a\u00e7\u0131qlay\u0131n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0Cavab: SSL g\u00f6nd\u0259r\u0259nin \u015f\u0259xsiyy\u0259tini yoxlamaq \u00fc\u00e7\u00fcn n\u0259z\u0259rd\u0259 tutulub, lakin o, bundan ba\u015fqa he\u00e7 n\u0259 axtarm\u0131r. SSL dan\u0131\u015fd\u0131\u011f\u0131n\u0131z insan\u0131 izl\u0259m\u0259y\u0259 k\u00f6m\u0259k ed\u0259 bil\u0259r, lakin bu da b\u0259z\u0259n aldad\u0131la bil\u0259r.TLS h\u0259m\u00e7inin SSL kimi eynil\u0259\u015fdirm\u0259 vasit\u0259sidir, lakin daha yax\u015f\u0131 t\u0259hl\u00fck\u0259sizlik x\u00fcsusiyy\u0259tl\u0259ri t\u0259klif edir. M\u0259lumatlara \u0259lav\u0259 qorunma t\u0259min edir v\u0259 buna g\u00f6r\u0259 d\u0259 SSL v\u0259 TLS daha yax\u015f\u0131 qorunmaq \u00fc\u00e7\u00fcn tez-tez birlikd\u0259 istifad\u0259 olunur.26. 2FA n\u0259dir v\u0259 ictimai vebsaytlar \u00fc\u00e7\u00fcn nec\u0259 t\u0259tbiq oluna bil\u0259r?\u00a0 \u00a0Cavab: \"\u00c7ox faktorlu autentifikasiya\" kimi tan\u0131nan \u0259lav\u0259 t\u0259hl\u00fck\u0259sizlik s\u0259viyy\u0259sidir.Yaln\u0131z parol v\u0259 istifad\u0259\u00e7i ad\u0131 deyil, h\u0259m d\u0259 yaln\u0131z v\u0259 yaln\u0131z h\u0259min istifad\u0259\u00e7inin onlarda olan bir \u015feyi, y\u0259ni ancaq onlar\u0131n bilm\u0259li olduqlar\u0131 v\u0259 ya d\u0259rhal \u0259ld\u0259 etm\u0259li oldu\u011fu bir m\u0259lumat\u0131, m\u0259s\u0259l\u0259n, fiziki token t\u0259l\u0259b edir.Authenticator proqramlar\u0131 m\u0259tn, s\u0259sli z\u0259ng v\u0259 ya e-po\u00e7t vasit\u0259sil\u0259 do\u011frulama kodu \u0259ld\u0259 etm\u0259k ehtiyac\u0131n\u0131 \u0259v\u0259z edir.Bu Proqramlara n\u00fcmun\u0259 kimi Google Authenticator v\u0259 Autify kimi proqramlar\u0131 g\u00f6st\u0259rm\u0259k olar.27. Fi\u015finqi izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?Cavab:Fi\u015finq kiberh\u00fccumdur ki, burada haker etibarl\u0131 \u015f\u0259xs v\u0259 ya biznes kimi maskalan\u0131r v\u0259 saxta e-po\u00e7t v\u0259 ya ani mesaj vasit\u0259sil\u0259 h\u0259ssas maliyy\u0259 v\u0259 ya \u015f\u0259xsi m\u0259lumatlar\u0131 o\u011furlama\u011fa \u00e7al\u0131\u015f\u0131rA\u015fa\u011f\u0131dak\u0131 \u00fcsullardan istifad\u0259 etm\u0259kl\u0259 fi\u015finq h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:\u00b7\u00a0 \u00a0 \u00a0 \u00a0Etibar etm\u0259diyiniz veb s\u0259hif\u0259l\u0259r\u0259 h\u0259ssas m\u0259lumatlar\u0131 daxil etm\u0259yin\u00b7\u00a0 \u00a0 \u00a0 \u00a0Sayt\u0131n t\u0259hl\u00fck\u0259sizliyini yoxlay\u0131n\u00b7\u00a0 \u00a0 \u00a0 \u00a0Firewall-lardan istifad\u0259 edin\u00b7\u00a0 \u00a0 \u00a0 \u00a0\u0130nternet T\u0259hl\u00fck\u0259sizliyi olan AntiVirus Proqram\u0131ndan istifad\u0259 edin\u00b7\u00a0 \u00a0 \u00a0 \u00a0Anti-Fi\u015finq Al\u0259tl\u0259r Panelind\u0259n istifad\u0259 edin28. SQL Enjeksiyonunu izah edin v\u0259 bunun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?Cavab: SQL Injection (SQLi) t\u0259cav\u00fczkar\u0131n veb t\u0259tbiqinin veril\u0259nl\u0259r bazas\u0131 serverin\u0259 n\u0259zar\u0259t etm\u0259k \u00fc\u00e7\u00fcn z\u0259r\u0259rli SQL sor\u011fular\u0131n\u0131 yerin\u0259 yetirm\u0259k \u00fc\u00e7\u00fcn server\u0259 g\u00f6nd\u0259ril\u0259n m\u0259lumatlar\u0131 manipulyasiya etdiyi, bununla da icaz\u0259siz m\u0259lumatlara daxil olmaq, d\u0259yi\u015fdirm\u0259k v\u0259 silm\u0259k \u00fc\u00e7\u00fcn kod yeritm\u0259 h\u00fccumudur. Bu h\u00fccum \u0259sas\u0259n veril\u0259nl\u0259r bazas\u0131 serverl\u0259rini \u0259l\u0259 ke\u00e7irm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunur.A\u015fa\u011f\u0131dak\u0131 t\u0259cr\u00fcb\u0259l\u0259rd\u0259n istifad\u0259 etm\u0259kl\u0259 SQL Injection h\u00fccumlar\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 ala bil\u0259rsiniz:\u00b7\u00a0 \u00a0 \u00a0 \u00a0Haz\u0131rlanm\u0131\u015f ifad\u0259l\u0259ri daxil edin (parametrl\u0259\u015fdirilmi\u015f sor\u011fularla)\u00b7\u00a0 \u00a0 \u00a0 \u00a0Saxlan\u0131lan Prosedurlardan istifad\u0259 edin\u0130stifad\u0259\u00e7i daxiletm\u0259sini t\u0259sdiq edin(Validate user input)\u00b7\u00a0 \u00a0 \u00a0 \u00a0Error mesaj\u0131ndan m\u0259lumatlar\u0131 gizl\u0259din\u00b7\u00a0 \u00a0 \u00a0 \u00a0Sisteminizi yenil\u0259yinVeril\u0259nl\u0259r bazas\u0131 etimadnam\u0259sini ayr\u0131 v\u0259 \u015fifr\u0259l\u0259nmi\u015f \u015f\u0259kild\u0259 saxlay\u0131nShell v\u0259 ehtiyac\u0131n\u0131z olmayan h\u0259r hans\u0131 dig\u0259r funksiyalar\u0131 s\u00f6nd\u00fcr\u00fcn29. T\u0259hl\u00fck\u0259sizlik s\u0259hv konfiqurasiyas\u0131(security misconfiguration) n\u0259dir?Cavab:Security Misconfiguration t\u0259hl\u00fck\u0259siz olmayan konfiqurasiya se\u00e7imi s\u0259b\u0259bind\u0259n proqram\/\u015f\u0259b\u0259k\u0259\/cihaz h\u00fccuma m\u0259ruz qald\u0131qda ba\u015f ver\u0259 bil\u0259c\u0259k z\u0259iflikdir. Bu, standart istifad\u0259\u00e7i ad\u0131\/parolun d\u0259yi\u015fm\u0259z saxlan\u0131lmas\u0131 q\u0259d\u0259r sad\u0259 ola bil\u0259r.30. Remote Desktop Protocol (RDP) n\u0259dir?Cavab:-\u00a0 \u00a0 \u00a0 \u00a0RDP (Remote Desktop Protocol) x\u00fcsusi olaraq m\u00fc\u015ft\u0259ri cihazlar\u0131, istifad\u0259\u00e7il\u0259r v\u0259 virtual \u015f\u0259b\u0259k\u0259 serveri aras\u0131nda proqram m\u0259lumatlar\u0131n\u0131n \u00f6t\u00fcr\u00fclm\u0259si t\u0259hl\u00fck\u0259sizliyi v\u0259 \u015fifr\u0259l\u0259m\u0259si \u00fc\u00e7\u00fcn n\u0259z\u0259rd\u0259 tutulmu\u015f Microsoft protokoludur.-\u00a0 \u00a0 \u00a0 \u00a0Bu, administratorlara f\u0259rdi abun\u0259\u00e7il\u0259rin qar\u015f\u0131la\u015fd\u0131\u011f\u0131 probleml\u0259ri uzaqdan qiym\u0259tl\u0259ndirm\u0259y\u0259 v\u0259 h\u0259ll etm\u0259y\u0259 imkan verir.-\u00a0 \u00a0 \u00a0 \u00a0O, \u00e7oxn\u00f6qt\u0259li \u00f6t\u00fcrm\u0259 t\u0259min etm\u0259kl\u0259 64.000-\u0259 q\u0259d\u0259r ayr\u0131 m\u0259lumat kanal\u0131n\u0131 d\u0259st\u0259kl\u0259yir.31. Address Resolution Protocol (ARP) n\u0259 \u00fc\u00e7\u00fcn istifad\u0259 olunur?Cavab: ARP x\u00fcsusi olaraq IP \u015f\u0259b\u0259k\u0259 \u00fcnvanlar\u0131n\u0131 Ethernet \u00fcnvanlar\u0131 kimi fiziki \u00fcnvanlarla \u0259laq\u0259l\u0259ndirm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 olunan protokoldur.32 bitlik \u00fcnvanlar\u0131 48 bitlik \u00fcnvanlara v\u0259 \u0259ksin\u0259 t\u0259rc\u00fcm\u0259 edir. Bu laz\u0131md\u0131r, \u00e7\u00fcnki bu g\u00fcn istifad\u0259 etdiyimiz internet protokolunun (IP) \u0259n \u00fcmumi s\u0259viyy\u0259si 32 bit uzunlu\u011funda v\u0259 MAC \u00fcnvanlar\u0131 48 bit uzunlu\u011fundad\u0131r.33. \u015e\u0259b\u0259k\u0259 t\u0259hl\u00fck\u0259sizliyi \u00fc\u00e7\u00fcn autentifikasiyan\u0131n \u00fcmumi \u00fcsullar\u0131 hans\u0131lard\u0131r?\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Cavab: Biometrics - Bu, istifad\u0259\u00e7inin \u015f\u0259xsiyy\u0259tini yoxlamaq \u00fc\u00e7\u00fcn x\u00fcsusi olaraq istifad\u0259 edil\u0259n m\u0259lum v\u0259 qeyd\u0259 al\u0131nm\u0131\u015f fiziki atributudurToken - Sisteml\u0259r\u0259 daxil olmaq \u00fc\u00e7\u00fcn tokenl\u0259rd\u0259n d\u0259 istifad\u0259 olunur. Bu, hakerl\u0259rin etimadnam\u0259l\u0259r\u0259 malik olduqlar\u0131 halda hesablara daxil olmalar\u0131n\u0131 \u00e7\u0259tinl\u0259\u015fdirir.Transaction Authentication - Bird\u0259f\u0259lik pin v\u0259 ya parol, onlar\u0131n \u015f\u0259xsiyy\u0259tini t\u0259sdiql\u0259y\u0259n onlayn \u0259m\u0259liyyatlar\u0131n i\u015fl\u0259nm\u0259si zaman\u0131 istifad\u0259 olunur.Multi-Factor Authentication - Bu, bird\u0259n \u00e7ox autentifikasiya metoduna ehtiyac\u0131 olan bir t\u0259hl\u00fck\u0259sizlik sistemidir.Out-of-Band Authentication - Bu autentifikasiya iki f\u0259rqli kanaldan v\u0259 ya \u015f\u0259b\u0259k\u0259d\u0259n iki f\u0259rqli siqnal t\u0259l\u0259b edir. Bu, onlayn bank\u00e7\u0131l\u0131qda h\u00fccumlar\u0131n \u0259ks\u0259riyy\u0259tinin hack v\u0259 \u015f\u0259xsiyy\u0259t o\u011furlanmas\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 al\u0131r.34. Hashing v\u0259 Salting aras\u0131ndak\u0131 f\u0259rq n\u0259dir?Cavab:\u00a0 \u00a0 Hashing \u0259sas\u0259n autentifikasiya \u00fc\u00e7\u00fcn istifad\u0259 olunur v\u0259 m\u0259lumatlar\u0131n sabit uzunluqlu d\u0259y\u0259r\u0259 planla\u015fd\u0131r\u0131ld\u0131\u011f\u0131 birt\u0259r\u0259fli funksiyad\u0131r.Salting hash \u00fc\u00e7\u00fcn \u0259lav\u0259 bir add\u0131md\u0131r, burada \u015fifr\u0259y\u0259 salt \u0259lav\u0259 olunur v\u0259 o \u015f\u0259kild\u0259 hashl\u0259nir35. Stored v\u0259 Reflected XSS aras\u0131ndak\u0131 f\u0259rq n\u0259dir?Cavab: Stored XSS attacks - Enjekte edilmi\u015f skriptl\u0259rin h\u0259d\u0259f serverl\u0259rd\u0259 qal\u0131c\u0131 olaraq saxland\u0131\u011f\u0131 h\u00fccumlara deyilir. Bununla birlikd\u0259 qurban saxlan\u0131lan m\u0259lumatlar\u0131 h\u0259r d\u0259f\u0259 t\u0259l\u0259b etdikd\u0259 z\u0259r\u0259rli script yenid\u0259n i\u015f\u0259 d\u00fc\u015f\u00fcr.Reflected XSS Attacks \u2013 Stored XSS-d\u0259n f\u0259rqli olaraq bu tip XSS serverd\u0259 qal\u0131c\u0131 olaraq qalm\u0131r v\u0259 bir anl\u0131q ba\u015f verir v\u0259 bitir.37. \u015e\u0259xsiyy\u0259t o\u011furlu\u011funun qar\u015f\u0131s\u0131n\u0131 nec\u0259 almaq olar?\u00a0 \u00a0 \u00a0 \u00a0\u00a0\u00b7\u00a0 \u00a0 \u00a0 \u015e\u0259xsi qeydl\u0259rinizi qoruyun.\u00b7\u00a0 \u00a0 \u00a0 M\u0259xfi m\u0259lumatlar\u0131n onlayn payla\u015f\u0131lmas\u0131ndan \u00e7\u0259kinin.\u00b7\u00a0 \u00a0 \u00a0 G\u00fccl\u00fc parollardan istifad\u0259 edin v\u0259 onlar\u0131 m\u00fcnt\u0259z\u0259m olaraq d\u0259yi\u015fdirin.\u00b7\u00a0 \u00a0 \u00a0 Etibars\u0131z saytlarda bank m\u0259lumatlar\u0131n\u0131z\u0131 t\u0259qdim etm\u0259yin.\u00b7\u00a0 \u00a0 \u00a0 \u0130l\u0259ri s\u0259viyy\u0259 firewall v\u0259 spyware al\u0259tl\u0259ri vasit\u0259l\u0259ri il\u0259 sisteminizi qoruyun.\u00b7\u00a0 \u00a0 \u00a0 Brauzerl\u0259rinizi, sisteminizi v\u0259 proqram t\u0259minat\u0131n\u0131z\u0131 \u0259n son versiyada tutun.38. LAN daxilind\u0259 port bloklanmas\u0131 n\u0259dir?\u00a0 \u00a0Cavab: Bu, istifad\u0259\u00e7il\u0259rin yerli \u015f\u0259b\u0259k\u0259 daxilind\u0259 bir s\u0131ra xidm\u0259tl\u0259r\u0259 daxil olmas\u0131n\u0131 m\u0259hdudla\u015fd\u0131rma\u011fa k\u00f6m\u0259k edir. \u018fsas m\u0259qs\u0259d m\u0259nb\u0259nin portlar vasit\u0259sil\u0259 t\u0259yinat adresin\u0259 \u00e7\u0131x\u0131\u015f t\u0259min etm\u0259sini dayand\u0131rmaqd\u0131r. B\u00fct\u00fcn proqramlar portlarda i\u015fl\u0259diyi \u00fc\u00e7\u00fcn icaz\u0259siz giri\u015fi m\u0259hdudla\u015fd\u0131rmaq \u00fc\u00e7\u00fcn portlar\u0131 bloklamaq laz\u0131md\u0131r ki, bu da \u015f\u0259b\u0259k\u0259 infrastrukturunda t\u0259hl\u00fck\u0259sizlik z\u0259ifliyini poza bil\u0259r.41. Veril\u0259nl\u0259r bazas\u0131ndan \u00e7\u0131xar\u0131lan a\u015fa\u011f\u0131dak\u0131 parollar\u0131n siyah\u0131s\u0131na bax\u0131n:\u00a0\u00a0A. Password1B. @#$)*&^%C. UcSc4Evr!D. akHGksmLNCavab:A\u015fa\u011f\u0131dak\u0131 parollardan hans\u0131 UCSC-nin parol t\u0259l\u0259bl\u0259rin\u0259 cavab verir? Cavab UcSc4Evr! Bu, a\u015fa\u011f\u0131dak\u0131 UCSC t\u0259l\u0259bl\u0259rinin ham\u0131s\u0131na cavab ver\u0259n yegan\u0259 se\u00e7imdir:42. Kiber h\u00fccum\u00e7ular\u0131n n\u00f6vl\u0259rini sadalay\u0131nD\u00f6rd n\u00f6v kiber h\u00fccum\u00e7u var.43.SRM dey\u0259rk\u0259n n\u0259yi n\u0259z\u0259rd\u0259 tutursunuz?Cavab: SRM T\u0259hl\u00fck\u0259sizlik Referans Monitoru m\u0259nas\u0131n\u0131 verir, komp\u00fcter s\u00fcr\u00fcc\u00fcl\u0259rin\u0259 obyekt\u0259 giri\u015f h\u00fcquqlar\u0131n\u0131 verm\u0259k \u00fc\u00e7\u00fcn rutinl\u0259r t\u0259qdim edir.56.Komp\u00fcter virusu n\u0259dir?Cavab:Virus istifad\u0259\u00e7inin raz\u0131l\u0131\u011f\u0131 olmadan h\u0259yata ke\u00e7iril\u0259n z\u0259r\u0259rli proqramd\u0131r. Viruslar CPU vaxt\u0131 v\u0259 yadda\u015f kimi komp\u00fcter resurslar\u0131n\u0131 istehlak ed\u0259 bil\u0259r. B\u0259z\u0259n virus dig\u0259r komp\u00fcter proqramlar\u0131nda d\u0259yi\u015fiklikl\u0259r edir v\u0259 komp\u00fcter sistemin\u0259 z\u0259r\u0259r verm\u0259k \u00fc\u00e7\u00fcn \u00f6z kodunu daxil edir.Komp\u00fcter virusu a\u015fa\u011f\u0131dak\u0131lar \u00fc\u00e7\u00fcn istifad\u0259 edil\u0259 bil\u0259r:\u0130stifad\u0259\u00e7i id v\u0259 parol kimi \u015f\u0259xsi m\u0259lumatlara daxil olun\u0130stifad\u0259\u00e7iy\u0259 bezdirici mesajlar g\u00f6st\u0259rinKomp\u00fcterinizd\u0259ki m\u0259lumatlar\u0131n z\u0259d\u0259l\u0259nm\u0259si\u0130stifad\u0259\u00e7inin d\u00fcym\u0259 vuru\u015flar\u0131n\u0131 qeyd edinARP poisoning n\u0259dir?Cavab:\u00a0Address Resolution Protocol z\u0259h\u0259rl\u0259nm\u0259si IP \u00fcnvan\u0131n\u0131n \u015f\u0259b\u0259k\u0259 cihaz\u0131nda fiziki \u00fcnvana \u00e7evrildiyi bir h\u00fccum n\u00f6v\u00fcd\u00fcr. Ev sahibi ARP yay\u0131m\u0131 g\u00f6nd\u0259r\u0259c\u0259k v\u0259 b\u00fct\u00fcn q\u0259buledicil\u0259r fiziki \u00fcnvanlar\u0131 il\u0259 cavab ver\u0259c\u0259kl\u0259r. Ba\u015fqa s\u00f6zl\u0259 des\u0259k, ARP z\u0259h\u0259rl\u0259nm\u0259si, \u015f\u0259b\u0259k\u0259y\u0259 qo\u015fulmu\u015f komp\u00fcterin \u0130P \u00fcnvan\u0131 il\u0259 saxta \u00fcnvanlar\u0131 \u0259laq\u0259l\u0259ndirm\u0259k v\u0259 trafiki qa\u00e7\u0131rmaq \u00fc\u00e7\u00fcn ke\u00e7id\u0259 saxta \u00fcnvanlar g\u00f6nd\u0259rilm\u0259sinin ad\u0131d\u0131r.Bunlar:1) kibercinay\u0259tkarlar2) hacktivistl\u0259r3) daxili t\u0259hdidl\u0259r(\u0130nsider threats\u0259)4) d\u00f6vl\u0259t t\u0259r\u0259find\u0259n d\u0259st\u0259kl\u0259n\u0259n h\u00fccum\u00e7ular(State sponsored).45. \u018fl\u00e7atan olan Hacker Al\u0259tl\u0259ri\u00a0 \u00a0 \u00a0 \u00a0 \u00a0A\u015fa\u011f\u0131da faydal\u0131 hack al\u0259tl\u0259rinin siyah\u0131s\u0131 verilmi\u015fdir.AcunetixWebInspectProbablyNetsparkerAngry IP scanner:Burp SuiteSavvius49.Situasiya #1Cavab:Bank hesab\u0131n\u0131zla ba\u011fl\u0131 probleml\u0259 \u00fczl\u0259\u015fdiyini bildir\u0259n e-po\u00e7t m\u0259ktubu g\u00f6nd\u0259rir. E-po\u00e7t t\u0259limatlar v\u0259 h\u0259m\u00e7inin hesaba daxil olmaq \u00fc\u00e7\u00fcn ke\u00e7idl\u0259 t\u0259min edilir ki, siz onu d\u00fcz\u0259ld\u0259 bil\u0259siniz. Yuxar\u0131dak\u0131 v\u0259ziyy\u0259td\u0259n n\u0259 n\u0259tic\u0259 \u00e7\u0131xar\u0131rs\u0131n\u0131z? izah edin.Bu, ist\u0259nm\u0259y\u0259n e-po\u00e7t kimi g\u00f6r\u00fcn\u00fcr. Siz onu spam kimi bildirm\u0259li v\u0259 e-po\u00e7tu d\u0259rhal istifad\u0259 etdiyiniz m\u00fcvafiq veb m\u00fc\u015ft\u0259rid\u0259 (Yahoo Mail, Gmail v\u0259 s.) zibil qutusuna k\u00f6\u00e7\u00fcrm\u0259lisiniz. Bankla ba\u011fl\u0131 h\u0259r hans\u0131 etimadnam\u0259sini onlayn t\u0259qdim etm\u0259zd\u0259n \u0259vv\u0259l, mesaj\u0131n qanuni olub-olmad\u0131\u011f\u0131n\u0131 v\u0259 bankdan oldu\u011funu yoxlamaq \u00fc\u00e7\u00fcn banka z\u0259ng etm\u0259lisiniz.50. Simmetrik \u015fifr\u0259l\u0259m\u0259 alqoritmin\u0259 b\u0259zi n\u00fcmun\u0259l\u0259r verin.A\u015fa\u011f\u0131da simmetrik \u015fifr\u0259l\u0259m\u0259 alqoritminin b\u0259zi n\u00fcmun\u0259l\u0259ri verilmi\u015fdir.RCxBlowfishRijndael (AES)DES51. ECB v\u0259 CBC-nin abreviaturas\u0131 n\u0259dir?Cavab:ECB-nin tam formas\u0131 Elektron Kod Kitab\u0131d\u0131r v\u0259 CBC-nin tam formas\u0131 Cipher Block Chaining-dir.52.Casus proqram\u0131 m\u00fc\u0259yy\u0259nl\u0259\u015fdirin.Cavab:Casus proqram t\u0259\u015fkilat v\u0259 ya \u015f\u0259xs haqq\u0131nda m\u0259lumatlar\u0131 o\u011furlamaq m\u0259qs\u0259di da\u015f\u0131yan z\u0259r\u0259rli proqramd\u0131r. Bu z\u0259r\u0259rli proqram t\u0259\u015fkilat\u0131n komp\u00fcter sistemin\u0259 z\u0259r\u0259r ver\u0259 bil\u0259r.53. ARP poisoning n\u0259dir?Cavab:Address Resolution Protocol z\u0259h\u0259rl\u0259nm\u0259si IP \u00fcnvan\u0131n\u0131n \u015f\u0259b\u0259k\u0259 cihaz\u0131nda fiziki \u00fcnvana \u00e7evrildiyi bir h\u00fccum n\u00f6v\u00fcd\u00fcr. Ev sahibi ARP yay\u0131m\u0131 g\u00f6nd\u0259r\u0259c\u0259k v\u0259 b\u00fct\u00fcn q\u0259buledicil\u0259r fiziki \u00fcnvanlar\u0131 il\u0259 cavab ver\u0259c\u0259kl\u0259r. Ba\u015fqa s\u00f6zl\u0259 des\u0259k, ARP z\u0259h\u0259rl\u0259nm\u0259si, \u015f\u0259b\u0259k\u0259y\u0259 qo\u015fulmu\u015f komp\u00fcterin \u0130P \u00fcnvan\u0131 il\u0259 saxta \u00fcnvanlar\u0131 \u0259laq\u0259l\u0259ndirm\u0259k v\u0259 trafiki qa\u00e7\u0131rmaq \u00fc\u00e7\u00fcn ke\u00e7id\u0259 saxta \u00fcnvanlar g\u00f6nd\u0259rilm\u0259sinin ad\u0131d\u0131r.54. Fiziki olmayan t\u0259hdidl\u0259rin \u00fcmumi n\u00f6vl\u0259rini s\u0131ralay\u0131n:TrojansAdwareWormsSpywareDoS AttackDistributed DoS AttacksVirusKey loggersPhishingKomp\u00fcter sisteml\u0259rinin resurslar\u0131na icaz\u0259siz giri\u015f55.Nmap n\u0259dir?Cavab: Nmap b\u00fct\u00fcn qo\u015fulmu\u015f cihazlar\u0131 m\u00fc\u0259yy\u0259n etm\u0259k v\u0259 i\u015fl\u0259tdikl\u0259ri \u0259m\u0259liyyat sisteml\u0259ri haqq\u0131nda m\u0259lumat \u00e7atd\u0131rmaq \u00fc\u00e7\u00fcn IP paketl\u0259rind\u0259n istifad\u0259 ed\u0259n \u015f\u0259b\u0259k\u0259 skan al\u0259tidir.56.Sistem \u0259sasl\u0131 h\u00fccumlar\u0131n b\u0259zi n\u00fcmun\u0259l\u0259riVirusBackdoorsBotsWorm57.Veb serverin t\u0259hl\u00fck\u0259sizliyini t\u0259min etm\u0259k \u00fc\u00e7\u00fcn hans\u0131 add\u0131mlar at\u0131lmal\u0131d\u0131r?Cavab:Update the ownership of the fileKeep your webserver up-to-dateDisable all extra modulesDelete default scriptsM\u00fc\u0259llif:\u00a0Orkhan Jalalov","breadcrumb":{"@id":"https:\/\/yusif.az\/main\/?p=6777#breadcrumb"},"inLanguage":"az","potentialAction":[{"@type":"ReadAction","target":["https:\/\/yusif.az\/main\/?p=6777"]}]},{"@type":"ImageObject","inLanguage":"az","@id":"https:\/\/yusif.az\/main\/?p=6777#primaryimage","url":"https:\/\/yusif.az\/main\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-02-112002.png","contentUrl":"https:\/\/yusif.az\/main\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-02-112002.png","width":1496,"height":549},{"@type":"BreadcrumbList","@id":"https:\/\/yusif.az\/main\/?p=6777#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/yusif.az\/main"},{"@type":"ListItem","position":2,"name":"Kibert\u0259hl\u00fck\u0259sizlik sah\u0259sind\u0259 veril\u0259n interv\u00fc suallar\u0131"}]},{"@type":"WebSite","@id":"https:\/\/yusif.az\/main\/#website","url":"https:\/\/yusif.az\/main\/","name":"www.YUSIF.az","description":"Birlikd\u0259 Y\u00fcks\u0259li\u015f\u0259 Do\u011fru!!!","publisher":{"@id":"https:\/\/yusif.az\/main\/#\/schema\/person\/904da2c1a1bbe7e501df95c2bc38d146"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/yusif.az\/main\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"az"},{"@type":["Person","Organization"],"@id":"https:\/\/yusif.az\/main\/#\/schema\/person\/904da2c1a1bbe7e501df95c2bc38d146","name":"auto61","image":{"@type":"ImageObject","inLanguage":"az","@id":"https:\/\/secure.gravatar.com\/avatar\/206904355e04c426b5ca443938aabf7f3ee8e177abeb155e7567388fa9c208a3?s=96&d=wavatar&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/206904355e04c426b5ca443938aabf7f3ee8e177abeb155e7567388fa9c208a3?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/206904355e04c426b5ca443938aabf7f3ee8e177abeb155e7567388fa9c208a3?s=96&d=wavatar&r=g","caption":"auto61"},"logo":{"@id":"https:\/\/secure.gravatar.com\/avatar\/206904355e04c426b5ca443938aabf7f3ee8e177abeb155e7567388fa9c208a3?s=96&d=wavatar&r=g"}}]}},"_links":{"self":[{"href":"https:\/\/yusif.az\/main\/index.php?rest_route=\/wp\/v2\/posts\/6777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yusif.az\/main\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yusif.az\/main\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yusif.az\/main\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/yusif.az\/main\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6777"}],"version-history":[{"count":4,"href":"https:\/\/yusif.az\/main\/index.php?rest_route=\/wp\/v2\/posts\/6777\/revisions"}],"predecessor-version":[{"id":6783,"href":"https:\/\/yusif.az\/main\/index.php?rest_route=\/wp\/v2\/posts\/6777\/revisions\/6783"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/yusif.az\/main\/index.php?rest_route=\/wp\/v2\/media\/6778"}],"wp:attachment":[{"href":"https:\/\/yusif.az\/main\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yusif.az\/main\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yusif.az\/main\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}