Top 100+ Cyber Security Interview Questions and Answers
Top 100+ Cyber Security Interview Questions and Answers
and Answers
Here are Cyber Security interview questions and answers for fresher as well
experienced candidates to get their dream job.
1) Wha
Whatt is ccyber
ybersecurity?
security?
Cybersecurity refers to the protection of hardware, so!ware, and data from attackers.
The primary purpose of cyber security is to protect against cyberattacks like accessing,
changing, or destroying sensitive information.
Information security
Network security
Operational security
Application security
End-user education
Business continuity planning
4) Define Cryptography.
It is a technique used to protect information from third parties called adversaries.
Cryptography allows the sender and recipient of a message to read its details.
6) What is CIA?
Confidentiality, Integrity, and Availability (CIA) is a popular model which is designed to
develop a security policy. CIA model consists of three concepts:
7) What is a Firewall?
It is a security system designed for the network. A firewall is set on the boundaries of
any system or network which monitors and controls network tra"ic. Firewalls are
mostly used to protect the system or network from malware, worms, and viruses.
Firewalls can also prevent content filtering and remote access.
8) Explain Traceroute
It is a tool that shows the packet path. It lists all the points that the packet passes
through. Traceroute is used mostly when the packet does not reach the destination.
Traceroute is used to check where the connection breaks or stops or to identify the
failure.
9) Di"erentiate between HIDS and NIDS.
What does It monitors suspicious system activities It monitors the tra"ic of all
it do? and tra"ic of a specific device. device on the network.
urse
m
, IIT
ore
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Black box testing: It is a so!ware testing method in which the internal structure or
program code is hidden.
White box testing: A so!ware testing method in which internal structure or
program is known by tester.
39) Define the term residual risk. What are three ways to deal
with risk?
It is a threat that balances risk exposure a!er finding and eliminating threats.
1. Reduce it
2. Avoid it
3. Accept it.
Malware
Phishing
Password attacks
DDoS
Man in the middle
Drive-by downloads
Malvertising
Rogue so!ware
44) How to make the user authentication process more secure?
In order to authenticate users, they have to provide their identity. The ID and Key can
be used to confirm the user’s identity. This is an ideal way how the system should
authorize the user.
46) Name the protocol that broadcast the information across all
the devices.
Internet Group Management Protocol or IGMP is a communication protocol that is used
in game or video streaming. It facilitates routers and other communication devices to
send packets.
Public Wi-Fi may identify data that is passed through a network device like emails,
browsing history, passwords, and credit card data.
The user uses RDP client so!ware to serve this purpose while other device must run
RDP server so!ware. This protocol is specifically designed for remote management and
to access virtual PCs, applications, and terminal server.
How does it Stream cipher operates on small Block cipher works on large
work? plaintext units data blocks.
Code
It requires less code. It requires more code.
requirement
RCx
Blowfish
Rijndael (AES)
DES
There are mainly three types of social engineering attacks: 1) Human-based, 2) Mobile-
based, and 3) Computer-based.
Human-based attack: They may pretend like a genuine user who requests higher
authority to reveal private and confidential information of the organization.
Computer-based attack: In this attack, attackers send fake emails to harm the
computer. They ask people to forward such email.
Mobile-based attack: Attacker may send SMS to others and collect important
information. If any user downloads a malicious app, then it can be misused to
access authentication information.
68) What is IP and MAC Addresses?
IP Address is the acronym for Internet Protocol address. An internet protocol address is
used to uniquely identify a computer or device such as printers, storage disks on a
computer network.
MAC Address is the acronym for Media Access Control address. MAC addresses are used
to uniquely identify network interfaces for communication at the physical layer of the
network.
How they infect It inserts malicious code into a Generate it’s copy and spread
a computer? specific file or program. using email client.
Tcpdump
Kismet
Wireshark
NetworkMiner
Dsni"
Protocol Sni"ing
Web password sni"ing
Application-level sni"ing
TCP Session stealing
LAN Sni"ing
ARP Sni"ing
RSA
Twofish
AES
Triple DES
Aircrack
WebDecrypt
Kismet
WEPCrack
Acunetix
WebInspect
Probably
Netsparker
Angry IP scanner:
Burp Suite
Savvius
Financial sectors like stock trading exchanges, investment banking, want their
data to be secured, and penetration testing is essential to ensure security.
In case if the so!ware system is already hacked and the organization would like to
determine whether any threats are still present in the system to avoid future
hacks.
SQL Injection
Cross-site request forgery
Insecure cryptographic storage
Broken authentication and session management
Insu"icient transport layer protection
Unvalidated redirects and forwards
Failure to restrict URL access
99) Define an access token.
An access token is a credential which is used by the system to check whether the API
should be granted to a particular object or not.
ARP poisoning is sending fake addresses to the switch so that it can associate the fake
addresses with the IP address of a genuine computer on a network and hijack the
tra"ic.
Trojans
Adware
Worms
Spyware
Denial of Service Attacks
Distributed Denial of Service Attacks
Virus
Key loggers
Unauthorized access to computer systems resources
Phishing
Virus
Backdoors
Bots
Worm
109) List out the types of cyber attackers
There are four types of cyber attackers. They are: 1) cybercriminals, 2) hacktivists, 3)
insider threats, 4) state-sponsored attackers.
110) Define ac
accident
cident
cidental
al thr
threea t s
They are threats that are accidently done by organization employees. In these threats,
an employee unintentionally deletes any file or share confidential data with outsiders
or a business partner going beyond the policy of the company.