Cyber Security Questions and Answers
Cyber Security Questions and Answers
can handle the task of securing the information and data efficiently. If you are planning to
appear for a cybersecurity interview, then this article will provide you with some of the top
cyber security interview questions and answers to help you to succeed in your upcoming
interview.
Q2. Can you tell us the difference between a threat, vulnerability, and risk?
Ans. These are mixed up terms that need to be clearly defined –
Threat – Threats are cybersecurity events that have the potential to pose danger to
information or systems.
Vulnerability – This refers to weaknesses in any system. Any system can be exploited through
a vulnerability
Risk – Often confused with a treat, the risk is mainly a combination of threats and losses,
usually monetary ones
Q8. What are the ways that a malicious user would crack any password?
Ans. The most common password cracking techniques are –
Dictionary attacks
Brute forcing attacks
Hybrid attacks
Syllable attacks
Rule based attacks
Rainbow table attacks
Phishing
Social engineering
Shoulder surfing
Spidering
Guessing
Q23. What are the various response codes that can be received from a web application?
Ans. Response codes received from a web application include –
1xx – Informational responses
2xx – Success
3xx – Redirection
4xx – Client-side error
5xx – Server-side error
Q29. What are proxy servers and how do they protect computer networks?
Ans. Proxy servers prevent external users from identifying the IP addresses of an internal
network. They make a network virtually invisible to external users, who cannot identify the
physical location of a network without knowledge of the correct IP address.
Q38. Which methods are used in preventing a brute force login attack?
Ans. The following methods are used in preventing a brute force login attack:
Strong password policy and frequent password changes.
Account lockout policy – account is locked after a set number of failed login attempts. It is
locked until the administrator unlocks it.
Use of Captcha – the user is asked to manually input some text or solve a simple problem.
Progressive delays – account is locked for a certain period after three failed login attempts.
Limit logins to a specified IP address or range – if you allow access only from a designated IP
address or range, it will be difficult for brute force attackers to gain access.
Two-factor authentication (2FA) – it reduces the risk of a potential data breach.
Monitor your server logs – ensure that you analyze your log files diligently.
Q50. Explain Black hat, White hat, and Grey hat hackers.
Ans. Black hat: Black hat hackers are those people who have a good knowledge of breaching
network security. They may work individually or may be backed by an organization to breach
into the corporate or public networks to access, encrypt, or destroy data illegally.
White hat: These are the security professionals specialized in penetration testing to identify the
vulnerabilities in an organization. They hack into organizations legally and protect the
information system of an organization.
Grey hat hackers: They are the hackers who violate ethical standards without any malicious
intent. They sometimes turn into black hat hackers based on their demand.