50 Cyber Security Interview Questions
50 Cyber Security Interview Questions
www.ministryofsecurity.co
Follow ministryofsecurity for more such infosec content.
Cyber
Public
School
TOP 50
CYBER SECURITY
INTERVIEW
QUESTIONS
https://cyberpublicschool.com/
TOP 50
CYBER
SECURITY
INTERVIEW
CYBER PUBLIC SCHOOL
QUESTIONS
https://cyberpublicschool.com/ PAGE||02
Part A - 40 Theoretical Questions
1. What is Cryptography?
Cryptography is the practice and study of techniques for
securing information andcommunication mainly to protect the
data from third parties that the data is not intended for.
https://cyberpublicschool.com/ PAGE||03
4. Explain CIA triad.
CIA stands for Confidentiality, Integrity, and Availability. CIA is
a model that is designed to guide policies for Information
Security. It is one of the most popular models used by
organizations.
Confidentiality
The information should be accessible and readable only to
authorized personnel. It should not be accessible by
unauthorized personnel. The information should be strongly
encrypted just in case someone uses hacking to access the
data so that even if the data isaccessed, it is not readable or
understandable.
Integrity
Making sure the data has not been modified by an
unauthorized entity. Integrity ensures that data is not
corrupted or CYBER
modifiedPUBLIC SCHOOLpersonnel. If an
by unauthorized
authorized individual/system is trying to modify the data and
the modification wasn't successful, then the data should be
reversed back and should not be corrupted.
Availability
The data should be available to the user whenever the user
requires it. Maintaining of Hardware, upgrading regularly,
Data Backups and Recovery, Network Bottlenecks should be
taken care of.
https://cyberpublicschool.com/ PAGE||04
5. How is Encryption different from Hashing?
Both Encryption and Hashing are used to convert readable
data into an unreadable format. The difference is that the
encrypted data can be converted back to original data by the
process of decryption, but the hashed data cannot be
converted back to original data.
6. What is a Firewall and why is it used?
A Firewall is a network security system set on the boundaries
of the system/network that monitors and controls network
traffic. Firewalls are mainly used to protect the
system/network from viruses, worms, malware, etc. Firewalls
can also be to prevent remote access and content filtering.
7. What is the difference between VA(Vulnerability
Assessment) and PT(Penetration Testing)?
Vulnerability Assessment is the process of finding flaws on the
target. Here,CYBER the PUBLIC SCHOOL
organization knows that their
system/network has flaws or weaknesses and want to find
these flaws and prioritize the flaws for fixing.
Penetration Testing is the process of finding vulnerabilities on
the target. In this case, the organization would have set up all
the security measures they could think of and would want to
test if there is any other way that their system/network can be
hacked.
https://cyberpublicschool.com/ PAGE||05
8. What is a three-way handshake?
A three-way handshake is a method used in a TCP/IP network
to create a connection between a host and a client. It's called
a three-way handshake because it is a three-step method in
which the client and server exchanges packets. The three
steps are as follows:
1. The client sends a SYN(Synchronize) packet to the server
check if the server is up or has open ports
2. The server sends SYN-ACK packet to the client if it has
open ports
3. The client acknowledges this and sends an
ACK(Acknowledgment) packetback to the server
9. What are the response codes that can be received from a
Web Application?
1XX Informational responses
2XX
CYBER PUBLIC SCHOOL
Success
3XX Redirection
4XX Client-side error
https://cyberpublicschool.com/ PAGE||06
11. What is the difference between HIDS and NIDS?
HIDS(Host IDS) and NIDS(Network IDS) are both Intrusion
Detection System and work for the same purpose i.e., to
detect the intrusions. The only difference is that the HIDS is
set up on a particular host/device. It monitors the traffic of a
particular device and suspicious system activities. On the
other hand, NIDS is set up on a network. It monitors traffic of
all device of the network.
12. What are the steps to set up a firewall?
Following are the steps to set up a firewall:
1. Username/password: modify the default password for a
firewall device
2. Remote administration: Disable the feature of the remote
administration
3. Port fotwarding: Configure appropriate port forwarding
for certain CYBER
applications to work
PUBLIC properly, such as a web
SCHOOL
server or FTP server
4. DHCP server: Installing a firewall on a network with an
existing DHCP server will cause conflict unless the
firewall's DHCP is disabled
5. Logging: To troubleshoot firewall issues or potential
attacks, ensure that logging is enabled and understand
how to view logs
6. Policies: You should have solid security policies in place
and make sure that the firewall is configured to enforce
those policies.
https://cyberpublicschool.com/ PAGE||07
13. Explain SSL Encryption
SSL(Secure Sockets Layer) is the industry-standard security
technology creating encrypted connections between Web
Server and a Browser. This is used to maintain data privacy
and to protect the information in online transactions. The
steps for establishing an SSL connection is as follows:
1. . A browser tries to connect to the webserver secured with
SSL
2. The browser sends a copy of its SSL certificate to the
browser
3. The browser checks if the SSL certificate is trustworthy or
not. If it is trustworthy, then the browser sends a message
to the web server requesting to establish an encrypted
connection
4. The web server sends an acknowledgment to start an SSL
encrypted connection
5. SSL encrypted CYBER PUBLIC SCHOOL
communication takes place between the
browser and the web server
14. What steps will you take to secure a server?
Secure servers use the Secure Sockets Layer (SSL) protocol for
data encryption and decryption to protect data from
unauthorized interception.
Here are four simple ways to secure server:
Step 1: Make sure you have a secure password for your root
and administrator users
https://cyberpublicschool.com/ PAGE||08
Step 2: The next thing you need to do is make new users on
your system. These willbe the users you use to manage the
system
Step 3: Remove remote access from the default
root/administrator accounts
Step 4: The next step is to configure your firewall rules for
remote access
15. Explain Data Leakage/Loss
Data Leakage is an intentional or unintentional transmission of
data from within the organization to an external unauthorized
destination. It is the disclosure of confidential information to
an unauthorized entity. Data Leakage can be divided into 3
categories based on how it happens:
1. Accidental Breach: An entity unintentionally send data to
an unauthorized person due to a fault or a blunder
2. IntentionalCYBER
Breach: The authorized
PUBLIC entity sends data to an
SCHOOL
unauthorized entity on purpose
3. System Hack: Hacking techniques are used to cause data
leakage
Data Leakage/Loss can be prevented by using tools, software,
and strategies known as DLP(Data Loss Prevention) Tools.
https://cyberpublicschool.com/ PAGE||09
16. What are some of the common Cyberattacks?
Following are some common cyber attacks that could
adversely affect your system.
1 Malware
2 Phishing
3 Password Attacks
4 DD0S
5 Man in the Middle
6 Drive-By Downloads
7 Malvertising
8 Rogue Software
17. What is a Brute Force Attack? How can you prevent it?
Brute Force is a way of finding out the right credentials by
repetitively trying all the permutations and combinations of
possible credentials. In most cases, brute force attacks
https://cyberpublicschool.com/ PAGE||10
are automated where the tool/software automatically tries to
login with a list of credentials. There are various ways to
prevent Brute Force attacks. Some of them are:
• Password Length: You can set a minimum length for
password. The lengthier the password, the harder it is to
find.
• Password Complexity: Including different formats of
characters in the password makes brute force attacks
harder. Using alpha-numeric passwords along with special
characters, and upper and lower case characters increase
the password complexity making it difficult to be cracked.
• Limiting Login Attempts: Set a limit on login failures. For
example, you can set the limit on login failures as 3. So,
when there are 3 consecutive login failures, restrict the
user from logging in for some time, or send an Email or
OTP to use to log in the next time. Because brute force is
CYBER
an automated PUBLIC
process, limitingSCHOOL
login attempts will break
the brute force process.
https://cyberpublicschool.com/ PAGE||11
1 Ping Scan
2 TCP Half-open
3 TCP Connect
4 UDP
5 Stealth Scanning
https://cyberpublicschool.com/ PAGE||12
Session Layer: Controls connection between the sender and
the receiver. It is responsible for starting, ending, and
managing the session and establishing, maintaining and
synchronizing interaction between the sender and the
receiver.
Presentation Layer: It deals with presenting the data in a
proper format and data structure instead of sending raw
datagrams or packets.
Application Layer: It provides an interface between the
application and the network. It focuses on process-to-process
communication and provides a communication interface.
20. What is a VPN?
Almost all Cybersecurity Interview Questions will have this
question included. VPN stands for Virtual Private Network. It is
used to createCYBER PUBLIC
a safe and SCHOOL
encrypted connection. When you
use a VPN, the data from the client is sent to a point in the
VPN where it is encrypted and then sent through the internet
to another point. At this point, the data is decrypted and sent
to the server. When the server sends a response, the response
is sent to a point in the VPN where it is encrypted and this
encrypted data is sent to another point in the VPN where it is
decrypted. And finally, the decrypted data is sent to the client.
The whole point of using a VPN is to ensure encrypted data
transfer.
https://cyberpublicschool.com/ PAGE||13
21. What do you understand by Risk, Vulnerability & Threat in
a network?
Threat: Someone with the potential to harm a system or an
organization Vulnerability: Weakness in a system that can be
exploited by a potential hacker Risk: Potential for loss or
damage when threat exploits a vulnerability
23. What are black hat, white hat and grey hat hackers?
Black hat hackers are known for having vast knowledge about
breaking into computer networks. They can write malware
which can be used to gain access to these systems. This type
of hackers misuse their skills to steal information or use the
hacked system for malicious purpose.
https://cyberpublicschool.com/ PAGE||14
White hat hackers use their powers for good deeds and so
they are also called Ethical Hackers. Look out for our Ethical
Hacking Course to learn more about the Ethical Hacking.
These are mostly hired by companies as a security specialist
that attempts to find and fix vulnerabilities and security holes
in the systems. They use their skills to help make the security
better.
Grey hat hackers are an amalgamation of a white hat and
black hat hacker. They look for system vulnerabilities without
the owner's permission. If they find any vulnerabilities, they
report it to the owner. Unlike Black hat hackers, they do not
exploit the vulnerabilities found.
https://cyberpublicschool.com/ PAGE||15
26. Explain MITM attack and how to prevent it?
A MITM(Man-in-the-Middle) attack is a type of attack where
the hacker places himself in between the communication of
two parties and steal the information. Suppose there are two
parties A and B having a communication. Then the hacker
joins this communication. He impersonates as party B to A
and impersonates as party A in front of B. The data from both
the parties are sent to the hacker and the hacker redirects the
data to the destination party after stealing the data required.
While the two parties think that they are communicating with
each other, in reality, they are communicating with the hacker.
You can prevent MITM attack by using the following practices:
• Use VPN
• Use strong WEP/WPA encryption
• Use Intrusion Detection Systems
• Force HTTPSCYBER PUBLIC SCHOOL
• Public Key Pair Based Authentication
https://cyberpublicschool.com/ PAGE||16
continuously send packets to the server.
2. Crash attacks: In this type, the hackers exploit a bug on the
server resulting in thesystem to crash and hence the server is
not able to provide service to the clients.
You can prevent DDOS attacks by using the following
practices:
• Use Anti-DDOS services
• Configure Firewalls and Routers
• Use Front-End Hardware
• Use Load Balancing
• Handle Spikes in Traffic
https://cyberpublicschool.com/ PAGE||17
29. What is an ARP and how does it work?
Address Resolution Protocol (ARP)is a protocol for mapping an
Internet Protocol address (IP address) to a physical machine
address that is recognized in the local network.
When an incoming packet destined for a host machine on a
particular local area network arrives at a gateway, the gateway
asks the ARP program to find a physical host or MAC address
that matches the IP address.
The ARP program looks in the ARP cache and, if it finds the
address, provides it so that the packet can be converted to the
right packet length and format and sent to the machine.
If no entry is found for the IP address, ARP broadcasts a
request packet in a special format to all the machines on the
LAN to see if one machine knows that it has that IP address
associated withCYBER
it. PUBLIC SCHOOL
30. What is port blocking within LAN?
Restricting the users from accessing a set of services within
the local area network is called port blocking.
Stopping the source to not to access the destination node via
ports. As the application works on the ports, so ports are
blocked to restricts the access filling up the security holes in
the network infrastructure.
https://cyberpublicschool.com/ PAGE||18
31. What protocols fall under TCP/IP internet layer?
TCP/IP TCP/IP Protocol Examples
Application NFS, NIS+, DNS, telnet, ftp, rlogin, rsh, rcp, RIP, RDISC, SNMP
and others
Transport TCP, UDP
https://cyberpublicschool.com/ PAGE||19
Example: If someone uses the same password on two
different systems and they are being used using the same
hashing algorithm, the hash value would be same, however, if
even one of the system uses salt with the hashes, the value
will be different.
When data is going from server When data just exists in its
to client database or on its hard drive
https://cyberpublicschool.com/ PAGE||20
36. What is 2FA and how can it be implemented for public
websites?
An extra layer of security that is known as "multi-factor
authentication".
Requires not only a password and username but also
something that only, and only, that user has on them, i.e. a
piece of information only they should know or have
immediately to hand — such as a physical token.
Authenticator apps replace the need to obtain a verification
code via text, voice call or email.
37. What is Cognitive Cybersecurity?
Cognitive Cybersecurity is an application of Al technologies
patterned on human thought processes to detect threats and
protect physical and digital systems.
CYBER PUBLIC SCHOOL
Self-learning security systems use data mining, pattern
recognition, and natural language processing to simulate the
human brain, albeit in a high-powered computer model.
https://cyberpublicschool.com/ PAGE||21
38. What is the difference between VPN and VLAN?
VPN VLAN
Helps to group workstations Related to remote access to the
that arenot within the same network of a company
locations into the same
broadcast domain
Means to logically segregate Used to connect two points in a
networks without physically secured and encrypted tunnel
segregating them with various
Switches
Saves the data from prying Does not involve any encryption
eyes while in transit and no technique but it is only used to
one on the net can capture slice up your logical network
the packets and read thedata into different sections for the
purpose management and
security
CYBER PUBLIC SCHOOL
39. Explain Phishing and how to prevent it?
Phishing is a Cyberattack in which a hacker disguises as a
trustworthy person or business and attempt to steal sensitive
financial or personal information through fraudulent email or
instant message.
https://cyberpublicschool.com/ PAGE||22
You can prevent Phishing attacks by using the following
practices:
• Don't enter sensitive information in the webpages that you
don't trust Verify the site's security
• Use Firewalls
• Use AntiVirus Software that has Internet Security
• Use Anti-Phishing Toolbar
https://cyberpublicschool.com/ PAGE||23
Part B - 10 Scenario Based Questions
1. Here's a situation- You receive the following email from
the help desk:
Dear XYZ Email user, To create space for more users we're
deleting all inactive email accounts. Here's what you have to
send to save your account from getting deleted:
• Name (first and last):
• Email Login:
• Password:
• Date of birth:
• Alternate email
If we don't receive the above information from you by the end
of the week, your email account will be terminated.
If you're a user what do you do? Justify your answer.
This email is a CYBER PUBLIC
classic example SCHOOL— trying to trick
of "phishing"
you into "biting". The justification is the generalized way of
addressing the receiver which is used in mass spam emails.
Above that, a corporate company will never ask for personal
details on mail.
They want your information. Don't respond to email, instant
messages (1M), texts, phone calls, etc., asking you for your
password or other private information.
You should never disclose your password to anyone, even if
they say they work for UCSC, ITS, or other campus
organizations.
https://cyberpublicschool.com/ PAGE||24
2. A friend of yours sends an e-card to your mail. You have to
click on the attachment to get the card.
What do you do? Justify your answer
There are four risks here:
• Some attachments contain viruses or other malicious
programs, so just in general, it's risky to open unknown or
unsolicited attachments.
• Also, in some cases just clicking on a malicious link can
infect a computer, so unless you are sure a link is safe,
don't click on it.
• Email addresses can be faked, so just because the email
says it is from someone you know, you can't be certain of
this without checking with the person.
• Finally, someCYBER
websitesPUBLIC
and linksSCHOOL
look legitimate, but they're
really hoaxes designed to steal your information.
https://cyberpublicschool.com/ PAGE||25
All three newsletters probably have the same parent company
or are distributed through the same service. The parent
company or service can combine individual pieces of
seemingly-harmless information and use or sell it for identity
theft
It is even possible that there is a fourth newsletter that asks
for a day of birth as one of the activation questions
Often questions about personal information are optional. In
addition to being suspicious about situations like the one
described here, never provide personal information when it is
not legitimately necessary, or to people or companies, you
don't personally know.
https://cyberpublicschool.com/ PAGE||26
This is an issue with shared or public computers in general. If
you don't log out of the computer properly when you leave,
someone else can come in behind you and retrieve what you
were doing, use your accounts, etc. Always log out of all
accounts, quit programs, and close browser windows before
you walk away.
https://cyberpublicschool.com/ PAGE||27
The employee confirms with the bank that everything has,
indeed, been straightened out.
What is wrong here?
Account and deposit information is sensitive data that could
be used for identity theft. Sending this or any kind of sensitive
information by email is very risky because email is typically
not private or secure. Anyone who knows how can access it
anywhere along its route.
As an alternative, the two offices could have called each other
or worked with ITS to send the information a more secure
way.
https://cyberpublicschool.com/ PAGE||28
This is definitely suspicious. Immediately report the problem
to your supervisor and the ITS Support Center:
itrequest.ucsc.edu, 459-HELP (4357), [email protected] or Kerr
Hall room 54, M-F 8AM-5PM
Also, since it seems possible that someone is controlling the
computer remotely, it is best if you can disconnect the
computer from the network (and turn off wireless if you have
it) until help arrives. If possible, don't turn off the computer.
https://cyberpublicschool.com/ PAGE||29
9. You receive an email from your bank telling you there is a
problem with your account. The email provides instructions
and a link so you can log into your account and fix the
problem.
What should you do?
Delete the email. Better yet, use the web client (e.g. Gmail,
Yahoo mail, etc.) and report it as spam or phishing, then
delete it.
Any unsolicited email or phone call asking you to enter your
account information, disclose your password, financial
account information, social security number, or other personal
or private information is suspicious — even if it appears to be
from a company you are familiar with. Always contact the
sender using a method you know is legitimate to verify that
the message is CYBER PUBLIC SCHOOL
from them.
https://cyberpublicschool.com/ PAGE||30
10. A while back, the IT folks got several complaints that one
of our campus computers was sending out Viagra spam. They
checked it out, and the reports were true: a hacker had
installed a program on the computer that made it
automatically send out tons of spam email without the
computer owner's knowledge.
How do you think the hacker got into the computer to set
this up?
https://cyberpublicschool.com/ PAGE||31
CYBER PUBLIC SCHOOL
https://cyberpublicschool.com/ PAGE||32