Interview Preparation Cybersecurity
Interview Preparation Cybersecurity
Cybersecurity is all about protecting computers, networks, and data from cyber threats like
hackers, viruses, and unauthorized access. It helps keep our information safe and ensures
that systems work without problems. In today’s digital world, with more people using the
internet and online services, the risk of cyberattacks is higher. Cybersecurity is important
because it prevents data theft, financial loss, and damage to a company’s reputation.
Example: A company might use firewalls and antivirus software to block harmful attacks and
keep sensitive data safe, ensuring that only authorized people can access it.
What are some common types of cyberattacks and how can they be prevented?
How does encryption play a role in cybersecurity?
What are the main challenges organizations face when securing their networks?
Can you provide examples of threats to each component of the CIA triad?
How do organizations balance confidentiality and availability?
What tools and technologies help ensure data integrity?
The principle of least privilege states that users should have the minimum level of access
necessary to perform their tasks. This limits potential damage from accidental or intentional
misuse of privileges.
Example: A junior employee in HR can view employee records but cannot modify salary
details.
2FA is a security method that requires two types of verification to access a system—typically
something you know (password) and something you have (OTP or security token).
Example: Logging into a cloud storage account using a password and a code sent to your
phone.
What are the most common types of second factors used in 2FA?
What are the limitations of 2FA?
How does 2FA differ from multi-factor authentication (MFA)?
6. What is a firewall?
A firewall is a network security device or software that monitors and controls incoming and
outgoing traffic based on predefined security rules. It acts as a barrier between a trusted
internal network and untrusted external networks.
Example: A company configures a firewall to block traffic from specific IP addresses to
prevent unauthorized access.
IDS (Intrusion Detection System): Monitors network traffic for malicious activity and
alerts administrators but doesn’t block the traffic.
IPS (Intrusion Prevention System): Detects and actively blocks malicious traffic in real-
time.
Example: An IDS detects unusual login attempts and alerts the admin, while an IPS
automatically blocks the attempts.
8. What is phishing?
Phishing is a social engineering attack where attackers trick users into revealing sensitive
information, like passwords or credit card details, by pretending to be a trusted entity.
Example: An attacker sends an email impersonating a bank, asking users to click a link and
update their account details on a fake website.
A VPN (Virtual Private Network) creates a secure and encrypted connection over the internet,
allowing users to access a private network remotely and anonymously. It protects data from
interception.
Example: A remote worker uses a VPN to securely access their company’s internal systems
from home.
A brute force attack is a trial-and-error method used to guess login credentials, encryption
keys, or passwords by systematically trying all possible combinations.
Example: An attacker uses an automated tool to guess a user’s email password by trying
thousands of common password combinations.
A MITM attack occurs when an attacker secretly intercepts and relays communication
between two parties, making them believe they are communicating directly. This allows the
attacker to steal or manipulate data.
Example: An attacker intercepts traffic between a user and a banking website on an
unsecured Wi-Fi network, stealing login credentials.
SQL injection is a code injection attack that exploits vulnerabilities in a database query by
inserting malicious SQL statements, allowing attackers to access, modify, or delete data.
Example: An attacker enters ' OR '1'='1 in a login form, bypassing authentication and gaining
unauthorized access to the database.
Expected Follow-Up Questions:
XSS is a vulnerability where attackers inject malicious scripts into trusted websites, which are
then executed in users' browsers, often stealing cookies or sensitive information.
Example: An attacker injects a <script> tag into a comment section, stealing session cookies
of other users who view the page.
Ransomware is a type of malware that encrypts a victim's data and demands a ransom
payment for decryption. It often spreads through phishing emails or malicious downloads.
Example: The WannaCry ransomware attack in 2017 encrypted files on Windows systems
worldwide, demanding Bitcoin payments to restore access.
Hashing: Converts data into a fixed-length value (hash) that cannot be reversed. Used for
verifying data integrity.
Encryption: Transforms data into ciphertext, which can be decrypted back to plaintext
using a key. Used for securing data transmission or storage.
Example: Passwords are hashed before storage in a database, while credit card details
are encrypted for secure transactions.
Network sniffing is the process of monitoring and capturing data packets as they travel across
a network. While it is used for legitimate network troubleshooting, attackers use it to steal
sensitive data.
Example: An attacker uses Wireshark to capture unencrypted login credentials sent over an
insecure network.
A DoS attack floods a system, server, or network with excessive traffic or requests,
overwhelming its resources and rendering it unavailable to legitimate users.
Example: An attacker uses a botnet to send millions of requests to a website, causing it to
crash and become inaccessible.
MFA is a security measure that requires users to provide two or more verification factors to
access a system, ensuring stronger protection than single-factor authentication. Factors
include:
The MITRE ATT&CK framework is a knowledge base of adversary tactics, techniques, and
procedures (TTPs) used in cybersecurity to understand and respond to threats. It helps
organizations map attack behaviors and enhance their defenses.
Example: A SOC team uses MITRE ATT&CK to identify that an attacker is using lateral
movement techniques, such as Pass-the-Hash, to move within the network.
Expected Follow-Up Questions:
How does the MITRE ATT&CK framework differ from the Cyber Kill Chain?
How can organizations integrate MITRE ATT&CK into their SIEM tools?
Can you give an example of how the framework helps in incident response?
Symmetric encryption: Uses a single key for both encryption and decryption.
Asymmetric encryption: Uses a pair of keys—a public key for encryption and a private key
for decryption.
Example: AES is a symmetric encryption algorithm, while RSA is an asymmetric
encryption algorithm used for secure key exchange.
23. What is the difference between black hat, white hat, and gray hat hackers?
Black hat hackers: Malicious hackers who exploit vulnerabilities for personal gain.
White hat hackers: Ethical hackers who identify and fix vulnerabilities.
Gray hat hackers: Hackers who exploit vulnerabilities without malicious intent but
without proper authorization.
Example: A white hat hacker is hired to perform penetration testing, while a black hat
hacker may exploit the same vulnerability to steal data.
DNS spoofing is an attack where an attacker manipulates DNS records to redirect users to
malicious websites instead of legitimate ones.
Example: A user tries to visit a banking website but is redirected to a phishing site due to
manipulated DNS records.
Expected Follow-Up Questions:
The Cyber Kill Chain is a model developed by Lockheed Martin that outlines the stages of a
cyberattack. It helps organizations understand and disrupt attacks at various phases. The
stages include:
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and Control (C2)
Actions on Objectives
Example: An attacker gathers information about a target during the reconnaissance
phase and later delivers a phishing email with a malicious payload.
How can organizations detect and prevent attacks during the reconnaissance phase?
What are the limitations of the Cyber Kill Chain model?
How does the Cyber Kill Chain compare to MITRE ATT&CK?
27. What is a zero-day vulnerability?
Lateral movement refers to the techniques attackers use to move within a network after
gaining initial access. It allows them to escalate privileges and access critical systems.
Example: An attacker uses compromised credentials to move from a low-privileged account
to an admin account on the same network.
A honeypot is a decoy system designed to attract attackers and monitor their behavior. It
mimics real systems but isolates malicious activities for analysis.
Example: A company deploys a fake database server as a honeypot to detect attackers
attempting SQL injection attacks.
EDR is a security solution that monitors and analyzes endpoint activities to detect,
investigate, and respond to threats. It provides real-time visibility and automated response
capabilities.
Example: An EDR solution detects unusual file encryption activity on an employee's laptop,
indicating ransomware, and immediately isolates the endpoint from the network.