Cyber Security Interview Questions
Cyber Security Interview Questions
It only detects intrusions but unable to prevent It detects and prevents intrusions.
intrusions.
It is used for stealing data, sending spam, performing distributed denial-of-service attack (DDoS
attack), and more, and also to enable the user to access the device and its connection.
Q7) What is a CIA triad?
Ans. CIA (confidentiality, integrity, and availability) triad is a model designed to
handle policies for information security within an organization.
Confidentiality - A collection of rules that limits access to information.
Integrity - It assures the information is trustworthy and reliable.
Availability - It provides reliable access to data for authorized people.
Q8) Symmetric Vs Asymmetric encryption.
Ans.
Purpose Symmetric Encryption Asymmetric Encryption
Encryption Uses a single key to encrypt and Uses a pair of public and private
decrypt information. keys to encrypt and decrypt
information.
Purpose Preferred for transferring huge Mostly used for exchanging secr
data keys safely.
Q9) What is the difference between hashing and encryption?
Ans. Both hashing and encryption are used to convert readable data into an
unreadable format. The significant difference is that encrypted data can be
transformed into original data by decryption, whereas hashed data cannot be
processed back to the original data.
Q10) What is two-factor authentication and how it can be implemented for
public websites?
Ans.
Tw0-factor authentication is also referred to as dual-factor authentication or two-step verification
where the user provides two authentication factors for protecting both user credentials and
resources while accessing.
The two-factor authentication can be implemented on public websites such as Twitter, Microsoft,
LinkedIn, and more for enabling another protection on your already protected account with a
password.
For enabling this double factor authentication, you can easily go to settings and then manage
security settings.
Q11) What is the use of a firewall and how it can be implemented?
Ans. A firewall is a security system used to control and monitor network traffic. It is
used for protecting the system/network from malware, viruses, worms, etc., and
secures unauthorized access from a private network.
The steps required to set up and configure the firewall are listed below:
Change the default password for a firewall device.
Configure port forwarding for specific applications to function correctly, such as an FTP server or
a web server.
Firewall installation on a network with an existing DHCP server can cause errors unless its
firewall’s DHCP is disabled.
Vulnerability Assessment: It’s a process to define, detect, and prioritize the vulnerabilities in
computer systems, network infrastructure, applications, etc., and gives the organization with the
required information to fix the flaws.
Penetration Testing: It is also called as pen testing or ethical hacking. It’s a process of testing a
network, system, application, etc.to identify vulnerabilities that attackers could exploit. In the
context of web application security, it is most widely used to augment a web application firewall
(WAF).
Q13) What is the difference between stored and reflected XSS?
Ans.
Stored XSS Attacks - The attacks where the injected scripts are stored on the target servers
permanently. In this, the victim retrieves the malicious script from the server when requests the
stored information.
Reflected XSS Attacks - In this, the user has to send the request first, then it will start running on
the victim’s browser and reflects results from the browser to the user who sent the request.
Q14) What is a three-way handshake process?
Ans. A three-way handshake process is used in TCP (Transmission Control
Protocol) network for transmission of data in a reliable way between the host and the
client.
It’s called a three-way handshake because three segments are exchanged between
the server and the client.
SYN: The client wants to establish a connection with the server, and sends a segment with
SYN(Synchronize Sequence Number) to the server if the server is up and has open ports.
SYN + ACK: The server responds to the client request with SYN-ACK signal bits set if it has open
ports.
ACK: The client acknowledges the response of a server and sends an ACK(Acknowledgment)
packet back to the server.
Q15) What are HTTP response codes?
Ans. HTTP response codes display whether a particular HTTP request has been
completed.
1xx (Informational) - The request has been received, and the process is continuing.
2xx (Success) - The request was successfully received and accepted.
3xx (Redirection) - Further action must be taken to complete it.
4xx (Client Error) - Request cannot be fulfilled or has incorrect syntax.
5xx (Server Error) - The server fails to fulfill the request.
Q16) What are the techniques used in preventing a Brute Force Attack?
Subscribe to our youtube channel to get new updates..!
Ans. Brute Force Attack is a trial and error method that is employed for application
programs to decode encrypted data such as data encryption keys or passwords
using brute force rather than using intellectual strategies. It’s a way to identify the
right credentials by repetitively attempting all the possible methods.
Brute Force attacks can be avoided by the following practices:
Adding password complexity: Include different formats of characters to make passwords
stronger.
Limit login attempts: set a limit on login failures.
Two-factor authentication: Add this layer of security to avoid brute force attacks.
Q17) List the common types of cybersecurity attacks.
Ans. The following are the most common types of cybersecurity attacks:
Malware
Denial-of-Service (DoS)
Man-in-the-Middle Attacks
Credential Reuse
Phishing
Session Hijacking
Q18) Define data leakage and its types?
Ans. Data Leakage refers to the illegal transmission of data to an external
destination or unauthorized entity within an organization. It can transfer data either
physically or electronically. It usually occurs via the web, emails, and mobile data
storage devices.
Types of data leakage:
1. The Accidental Breach - Majority of data leakage incidents are accidental.
Ex: An entity may choose the wrong recipient while sending confidential data.
2. The Disgruntled or ill-intentioned Employee - The authorized entity sends
confidential data to an unauthorized body.
3. Electronic Communications with Malicious Intent - The problem is all the
electronic mediums are capable of file transferring and external access sources over
the internet.
Ans. A Traceroute is a network diagnostic tool, used for tracking the pathway of an
IP network from source to destination. It records the period of each hop the packet
makes while its route to its destination.
Q20) How to prevent CSRF attacks?
Ans. CSRF is referred to as Cross-site Request Forgery, where an attacker tricks a
victim into performing actions on their behalf.
CSRF attacks can be prevented by using the following ways:
Employing the latest antivirus software which helps in blocking malicious scripts.
While authenticating to your banking site or performing any financial transactions on any other
website do not browse other sites or open any emails, which helps in executing malicious scripts
while being authenticated to a financial site.
Never save your login/password within your browser for financial transactions.
TCP connect
TCP half-open
UDP
Q22) What is the need for DNS monitoring?
Ans.
DNS (Domain Name System) is a service that is used for converting user-friendly domain names
into a computer-friendly IP address. It allows websites under a particular domain name which is
easy to remember.
DNS monitoring is nothing but monitoring DNS records to ensure does it route traffic properly to
your website, electronic communication, services, and more.
Q23) What is the difference between hashing and salting?
Ans.
Hashing is majorly used for authentication and is a one-way function where data is planned to a
fixed-length value.
Salting is an extra step for hashing, where it adds additional value to passwords that change the
hash value created.
Q24) How to prevent ‘Man-in-the-Middle Attack’?
Use a VPN for a secure environment to protect sensitive information. It uses key-based
encryption.
Public key pair based authentication must be used in various layers of a stack for ensuring
whether you are communicating the right things are not.
HTTPS must be employed for securely communicating over HTTP through the public-private key
exchange.
Q25) What are the common methods of authentication for network security?
Ans.
Biometrics - It is a known and registered physical attributes of a user specifically used for
verifying their identity.
Token - A token is used for accessing systems. It makes more difficult for hackers to access
accounts as they have long credentials.
Transaction Authentication - A one time pin or password is used in processing online
transactions through which they verify their identity.
Multi-Factor Authentication - It’s a security system that needs more than one method of
authentication.
Out-of-Band Authentication - This authentication needs two different signals from two different
channels or networks. It prevents most of the attacks from hacking and identity thefts in online
banking.
Q26) Which is more secure SSL or HTTPS?
Ans.
SSL (Secure Sockets Layer) is a secure protocol which provides safer conversations between
two or more parties across the internet. It works on top of the HTTP to provide security.
HTTPS (Hypertext Transfer Protocol Secure) is a combination of HTTP and SSL to provide a
safer browsing experience with encryption.
White-hat hackers are also known as ethical hackers; they are well-versed with ethical hacking
tools, methodologies, and tactics for securing organization data. They try to detect and fix
vulnerabilities and security holes in the systems. Many top companies recruit white hat hackers.
Grey hat hacker is a computer security expert who may violate ethical standards or rules
sometimes, but do not have malicious intent of black hat hacker.
Q28) What is cognitive security?
Ans. Cognitive security is one of the applications of AI technologies that is used
explicitly for identifying threats and protecting physical and digital systems based on
human understanding processes.
Self-learning security systems use pattern recognition, natural language processing,
and data mining to mimic the human brain.
Q29) What is phishing and how it can be prevented?
Ans. Phishing is a malicious attempt of pretending oneself as an authorized entity in
electronic communication for obtaining sensitive information such as usernames,
passwords, etc. through fraudulent messages and emails.
The following practices can prevent phishing:
Use firewalls on your networks and systems.
Don't enter sensitive information such as financial or digital transaction details on the web pages
that you don't trust.
It helps in defining and achieving IT targets and also in mitigating threats through processes like
vulnerability management.
Q34) What is the use of Patch Management?
Ans.
The purpose of patch management is to keep updating various systems in a network and protect
them against malware and hacking attacks.
Many enterprise patch management tools manage the patching process by installing or deploying
agents on a target computer, and they provide a link between centralized patch servers and
computers to be patched.
Q35) What is the difference between a false positive and false negative in IDS?
Ans.
A false positive is considered to be a false alarm and false negative is considered to be the most
complicated state.
A false positive occurs when an IDS fires an alarm for legitimate network activity.
A false negative occurs when IDS fails to identify malicious network traffic.
Compared to both, a false positive is more acceptable than false-negative as they
lead to intrusions without getting noticed.
Q36) what is the difference between the Red team and Blue team?
Ans.
Red team and blue team refers to cyberwarfare. Many organizations split the security team into
two groups as red team and blue team.
The red team refers to an attacker who exploits weaknesses in an organization's security.
The blue team refers to a defender who identifies and patches vulnerabilities into successful
breaches.
Q37) Explain System hardening?
Ans.
Generally, system hardening refers to a combination of tools and techniques for controlling
vulnerabilities in systems, applications, firmware, and more in an organization.
The purpose of system hardening is to decrease the security risks by reducing the potential
attacks and condensing the system’s attack surface.
3. Application hardening
4. Server hardening
5. Network hardening
Q38) What is a cybersecurity risk assessment?
Ans. A cybersecurity risk assessment refers to detecting the information assets that
are prone to cyber-attacks(including customer data, hardware, laptop, etc.) and also
evaluates various risks that could affect those assets.
It is mostly performed to identify, evaluate, and prioritize risks across organizations.
The best way to perform cybersecurity risk assessment is to detect:
Relevant threats in your organization
By using software
Definition of data Here data moves actively from one Here data is not transferred from
location to another across the one location to another as data is
internet or private network. stored on hard drives, flash drive
etc.
Encryption in data protection It encrypts sensitive data before It encrypts sensitive files before
sending or using encrypted storing or choosing the encrypte
connections(SSL, HTTPS, TLS, storage drive itself.
etc.)
Q43) What are the several indicators of compromise(IOC) that organizations
should monitor?
Ans. The key indicators of compromise that organizations should monitor are listed
below:
Unusual Outbound Network Traffic
Geographical Irregularities
It allows administrators to remotely evaluate and resolve issues individual subscribers encounter.
It supports up to 64,000 separate data channels with a provision for multipoint transmission.
Q45) What is the difference between Diffie Hellman and RSA?
Ans.
Diffie-Helman: It’s a key exchange protocol where two parties exchange a shared key that either
one can use to encrypt/decrypt messages between them.
RSA: It’s asymmetric key encryption where it has two different keys. The public key can be given
to anyone and decrypted with another, which is kept private.
Q46) What is Forward Secrecy and how does it work?
Ans.
Forward secrecy is a feature of specific key agreement protocols which gives assurance that
even if the private key of the server is compromised the session keys will not be compromised. It
is also known as perfect forward secrecy(PFS).
The Algorithm that helps in achieving this is called "Diffie–Hellman key exchange".
Q47) What is an active reconnaissance?
Ans.
Active reconnaissance is a kind of computer attack where intruder engages the target system for
collecting the data about vulnerabilities.
The attackers mostly use port scanning to identify vulnerable ports and then exploit the
vulnerabilities of services that are associated with open ports.
Q48) What is security misconfiguration?
Ans. Security misconfiguration is a vulnerability that could happen if an
application/network/device is susceptible to attack due to an insecure configuration
option. It can be as simple as keeping the default username/password unchanged.
Q49) What is the difference between information protection and information
assurance?
Ans.
Information protection: It protects the data using encryption, security software, etc., from
unauthorized access.
Information Assurance: It keeps the data reliable by ensuring availability, authentication,
confidentiality, etc.
Q50) What do you mean by Chain of Custody?
Ans.
Chain of custody refers to the probability of data provided as originally acquired and has not been
changed before admission into evidence.
In legal terms, it’s a chronological documentation/paper trail that records a proper sequence of
custody, control, analysis, and disposition of electronic or physical evidence.
Are you looking to get trained on Cyber Security, we have the right course
designed according to your needs. Our expert trainers help you gain the essential
knowledge required for the latest industry needs. Join our Cyber Security
Certification Training program from your nearest city.