Cyber Security Interview Questions
Cyber Security Interview Questions
The cyber attackers are mainly aimed at accessing, changing, or destroying sensitive
information, extorting money from users, or interrupting normal business processes.
Cyber Security is also known as computer security, information technology (IT) security,
cybersecurity etc. It is used to measure the combat threats against networked systems
and applications, whether those threats originate from inside or outside of an
organization.
We can divide the term cyber security into two parts: cyber and security. Cyber refers to
the technology that includes systems, networks, programs, and data of an internet-
connected system. The word security specifies the protection of the systems, networks,
applications, and information.
ADVERTISEMENT
o Identity Theft
o Online Predators
o Hacking of sensitive information from the Internet
o BEC ("Business Email Compromise")
o Ransomware
o Stealing intellectual property
3) Why is Cyber Crime increasing day by day every year?
Cyber Crime is increasing day by day every year because of the following reasons:
Integrity: The Integrity principle is used to assure that the data is genuine, correct, and
safe from unwanted threat actors or unintentional user alteration. It also specifies that the
source of information must be genuine. If any changes are made, precautions should be
taken to protect sensitive data from corruption or loss and recover from such an incident
quickly.
Availability: The Availability principle ensures that the information is constantly available
and accessible to those who have access to it. It also ensures that any types of system
failures or cyber-attacks do not obstruct these accesses.
IDS IPS
IDS stands for Intrusion Detection Systems. IPS stands for Intrusion Prevention Systems.
IDS can only detect intrusions, but it is IPS can detect as well as prevent intrusions.
unable to prevent intrusions.
IDS requires a human or another system to IPS only requires a regularly updated database
look at the results. with the latest threat data.
o Information security
o Network security
o Operational security
o Application security
o End-user security
o Business continuity planning
8) What is Cryptography?
Cryptography is a technique or practice used to protect information from third parties
called adversaries. It is a method of protecting information and communications through
codes so that only those for whom the information is intended can read and process the
data. In Cryptography, we also study several techniques for secure communication, mainly
to protect the sensitive data from third parties that the data is not intended for.
Threat: A threat can be any form of hazard capable of destroying or stealing data,
disrupting operations, or cause harm in general. Some examples of threats are Malware,
phishing, data breaches, and even unethical employees etc. Any type of threat may be
harmful for the organization, so; it is essential to understand threats for developing
effective mitigation and making informed cyber security decisions.
To control and manage the risk, we use a method called Risk management. It is a process
of identifying all potential hazards, analyzing their impact, and determining the best
course of action. This is an always running procedure used to examine the new threats
and vulnerabilities regularly. By using this method, we can avoid or minimize risks. We can
also accept or passed them to a third party according to the response chosen.
Encryption key- Symmetric Encryption uses the same Asymmetric Encryption uses
key for Encryption & decryption. different keys for Encryption &
decryption.
Algorithms- It uses the algorithms such as DES, It uses the algorithms such as
3DES, AES and RC4. Diffie-Hellman, RSA
Purpose- It is mainly used for bulk data It is most often used for securely
transmission. exchanging secret keys.
Encryption Hashing
Encryption is used to make temporary data Hashing is used to make permanent data
conversions. conversion into message digest.
In Encryption, the encrypted data can be converted In Hashing, the hashed data cannot be
back to original data by the process of decryption. converted back to original data.
Encryption works in two ways, i.e. encode and Hashing is a one-way encryption process.
decode the data. For example, it only encodes the data.
Encryption is used to secure sensitive data from the Hashing is used to protect the integrity
reach of third parties. of the information.
Encryption focuses on the confidentiality of the Hashing focuses on the integrity of the
data. data.
IPS stands for Intrusion Prevention System, and it facilitates the system to find the
intrusion and prevent it.
Message-Digest Algorithm or MD5 is the latest and advanced form of MD4. It was
introduced after finding severe security issues in MD4. MD5 is used to generate 128-bit
outputs for a variable length of inputs.
MD5 is the advanced version and the successor to MD4. It covers a lot of security threats
but fails to provide full data security services. It is one of the most widely used algorithms,
but the main issue with using MD5 is its vulnerability and collisions.
Tiger cypher algorithm is a faster and more efficient algorithm compared to Message
Digest (MD5) and Secure Hashing Algorithm. It is mostly used in new generation
computers and has a 192-bit hashing system. Its latest and advanced version is the Tiger2
algorithm which is more powerful than the Tiger algorithm.
RIPMEND Algorithm
WHIRLPOOL Algorithm
Vincent Rijmenand Paul Barreto designed the WHIRLPOOL algorithm. It accepts any
messages of a length less than 2256 bits and returns a 512-bit message digest. Its first
version was whirlpool-0, the second version was named Whirlpool-T, and the latest and
most advanced version is Whirlpool.
Hashing is required when we have to compare a huge amount of data. We can create
different hash values for different data, and we can compare hashes too.
Black Hat Hacking is always illegal due to its malicious aim. The main purpose of Black
Hat Hacking is to steal company data, violate privacy, cause system damage, block
network connections, etc.
White Hat Hackers: White Hat Hackers are used to accessing the system for penetration
testing and vulnerability assessments. They never intend to harm the system; rather, than
strive to uncover holes in a computer or network system. White Hat Hackers are also
referred to as Ethical Hackers.
Hacking done by White Hat Hackers is called Ethical hacking. It is not a crime, and it is
considered one of the most difficult professions in the IT business. Many businesses hire
ethical hackers to do penetration tests and vulnerability assessments.
Grey Hat Hackers: Grey Hat Hackers are a combination of Black Hat Hackers and White
Hat Hackers. They use elements of both black and white hat hacking techniques. They are
supposed to act without malice, but for the sake of amusement, they can exploit the
security flaw in a computer system or network without the permission or knowledge of
the owner.
The main goal of Grey Hat Hackers is to draw the owners' attention to the security flaw or
hole in the network in the hope of receiving gratitude or a reward.
Suppose a user has a VPN client installed on their machine. The VPN client then creates
an encrypted tunnel to the VPN server, and the user can securely send or receive
information over the internet.
21) What do you understand by Brute Force Attack? How can you
prevent it?
Brute Force Attack is a method of finding the right credentials by repetitively trying all the
permutations and combinations of possible credentials. Brute Force Attacks are
automated in most cases where the tool/software automatically tries to log in with a list
of possible credentials.
o Ping Scan
o TCP Half-Open
o TCP Connect
o UDP
o Stealth Scanning
23) What is the difference between the Host Intrusion Detection
System (HIDS) and Network Intrusion Detection System (NIDS)?
As we know, HIDS and NIDS are both Intrusion Detection Systems and work for the same
purpose, i.e., to detect intrusions.
HIDS is set up on a particular host/device and On the other hand, NIDS is set up on a
monitors the traffic of a particular device and network and is used to monitor the traffic
suspicious system activities. of all network devices.
HIDS is used to detect intrusions. NIDS is used for the network to monitor
the traffic of all devices.
o Network security: Network security is one of the most important types of Cyber
security. In this process, we have to secure a computer network against
unauthorized access, intruders, attacks, disruption, and misuse using hardware and
software. This security also adds an extra layer in protecting an organization's
assets from both external and internal threats. An example of Network security is
using a Firewall.
o Application security: Application security is used to safeguard software and
devices against malicious attacks. This can be achieved by regularly updating the
apps to ensure that they are secure against threats.
o Identity management & security: Identity management & security identifies
each individual's level of access inside an organization. For example, you can
restrict and allow access to data according to an individual's job role in the
company.
o Data security: Data security is used to ensure that you put your data in a strong
data storage system to ensure data integrity and privacy while in storage and
transport.
o Operational security: Operational security is used to analyze and make decisions
about handling and securing the data assets. For example: Storing data in an
encrypted form in the database is an example of Operational security.
o Mobile security: Mobile security is used to specify the protection of organizational
and personal data held on mobile devices such as cell phones, PCs, tablets, and
other similar devices against various hostile attacks. Examples of mobile security
threats are unauthorized access, device loss or theft, malware, and other threats
that can harm mobile devices.
o Cloud security: The main aim of cloud security is to safeguard the data held in a
digital environment or cloud infrastructures for an organization. It uses various
cloud service providers, including AWS, Azure, Google, and others, to assure
protection against a variety of threats.
o Atera
o NinjaRMM
o Acronis Cyber Protect Cloud
o Acronis Cyber Protect
o PDQ Deploy
o ManageEngine Patch Manager Plus
o Microsoft System Center
o Automox
o SmartDeploy
o SolarWinds Patch Manager
34) What are the most common types of cyber security attacks?
The most common types of cyber security attacks are:
o Malware
o Phishing
o Cross-Site Scripting (XSS)
o Denial-of-Service (DoS)
o Domain Name System Attack
o Man-in-the-Middle Attacks
o SQL Injection Attack
o Session Hijacking
o Brute Force etc.
36) What is an XSS attack, and how can you prevent it?
The full form of XSS attack is a Cross-Site Scripting attack. It is a cyberattack that makes
hackers able to inject malicious client-side scripts into web pages. The XSS attacks are
mainly used to hijack sessions, steal cookies, modify DOM, remote code execution, crash
the server, etc.
The attacks where the injected scripts are The attacks where the user has to send the request first,
permanently stored on the target servers are called then start running on the victim's browser, are called
stored XSS attacks. reflected XSS attacks.
In stored XSS attacks, the victim retrieves the The reflected XSS attacks reflect results from the browser
server's malicious script when requesting the to the user who sent the request.
stored information.
37) What is the difference between stored XSS and reflected XSS?
Difference between stored XSS attacks and reflected XSS attacks:
The attacks where the injected scripts are The attacks where the user has to send the
permanently stored on the target servers request first, then start running on the
are called stored XSS attacks. victim's browser, are called reflected XSS
attacks.
In stored XSS attacks, the victim retrieves The reflected XSS attacks reflect results from
the server's malicious script when the browser to the user who sent the
requesting the stored information. request.