Cybersecurity Interview Questions
Cybersecurity Interview Questions
Cybersecurity Interview Questions
Cybersecurity is the protection of internet-connected systems, including hardware, software and data
from cyberattacks to prevent unauthorized access to data.
• Threat: Someone with the potential to cause harm by damaging or destroying the official
data to a system or organization.
• Vulnerability: It refers to weaknesses in a system that makes threat outcomes more possible
and even more dangerous.
• Risk: It refers to a combination of threat probability and impact/loss. In simple terms, it is
related to potential damage or loss when threat exploits the vulnerability.
• Packet Filtering: Check each packet against rules for IP and port
• Stateful Inspection: Maintains information about the state of each connection (basic firewalls
sold today)
• Next-Generation (NGFWs): Uses contextual information about users, apps, and processes to
make decisions Web Application (WAFs): filters, monitors, and blocks HTTP traffic to and
from a web application. A WAF is able to filter the content of specific web applications
Protects against web application attacks like SQL injection and Cross-site Scripting
(SQL/XSS)
What is VPN?
A VPN secures the private network, using encryption and other security mechanisms to ensure that
only authorized users can access the network and that the data cannot be intercepted. This type of
network is designed to provides a secure, encrypted tunnel in which to transmit the data between the
remote user and the company network.
IPSEC:
Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts
the packets of data to provide secure encrypted communication between two computers over an
Internet Protocol network. It is used in virtual private networks (VPNs). IPsec involves two security
services:
• Authentication Header (AH): This authenticates the sender, and it discovers any changes in
data during transmission.
• Encapsulating Security Payload (ESP): This not only performs authentication for the sender
but also encrypts the data being sent
IDS: monitoring system that only detects intrusions but unable to prevent intrusions
IPS: control system that detects and prevents intrusions, It needs a regularly updated database with
the latest threat data
Steps:
1. Read the description of the patch in question
2. Deploy the patch on a test system that is identical to the systems to which you intend to roll it out
3. roll it out to a small number of live systems
What is Sandboxing?
Behavior based software management strategy that isolates applications from critical system
resources and other programs It provides an extra layer of security that prevents malware or harmful
applications from negatively affecting your system
Define baseline?
Network baselining is the act of measuring and rating the performance of a network in realtime
situations. Providing a network baseline requires testing and reporting of the physical connectivity,
normal network utilization, protocol usage, peak network utilization, and average throughput of the
network usage
What is the difference between the Red team and Blue team?
The red team refers to an attacker who exploits weaknesses in an organization's security.
The blue team refers to a defender who identifies and patches vulnerabilities into successful
breaches
Kerberos?
Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow
nodes communicating over a non-secure network to prove their identity to one another in a secure
manner
Kerberos authentication uses a key distribution center (KDC) to orchestrate the process
Risk Management? The process of identifying risks, analyzing them, developing a response
strategy for them, and mitigating their future impact.
Identification
Containment
Eradication
Recovery
Lessons learned
What is Disaster recovery?
Disaster recovery is the act of recovering data following a disaster in which it has been destroyed the
act of recovering data following a disaster in which it has been destroyed
Disaster-recovery plan, or scheme, helps an organization to respond effectively when a disaster
occurs
Types of malware?
Ransomware, Viruses, Worms, Trojans, Bots, Keylogger, Spyware, rootkit, spam, and Adware
• Stored XSS Attacks - The attacks where the injected scripts are stored on the target servers
permanently. In this, the victim retrieves the malicious script from the server when requests
the stored information.
• Reflected XSS Attacks - In this, the user has to send the request first, then it will start
running on the victim's browser and reflects results from the browser to the user who sent
the request.
Cryptography
Cryptography is a method of protecting information and communications through the use of codes so
that only those for whom the information is intended can read and process it.
symmetric-key or Single-key encryption algorithms: Use the same key to encrypt and decrypt data.
EX: AES, 3DES, DES
Asymmetric-key encryption algorithms: Use the different key (public & private) to encrypt and
decrypt data. EX: RSA, ALGamal
• Hashing is majorly used for authentication and is a one-way function where data is planned
to a fixed-length value.
• Salting is an extra step for hashing, where it adds additional value to passwords that change
the hash value created.