Basic Cyber Security Interview Questions and Answe
Basic Cyber Security Interview Questions and Answe
1. What is cryptography?
Cryptography aids to secure information from third parties who are called
adversaries. It allows only the sender and the recipient to access the data securely.
Traceroute is a network diagnostic tool. It helps track the route taken by a packet
that is sent across the IP network. It shows the IP addresses of all the routers it
pinged between the source and the destination.
Uses:
It shows the time taken by the packet for each hop during the transmission.
When the packet is lost during the transmission, the traceroute will identify
where the point of failure is.
Uses:
Enroll in our Cyber Security course to learn from experts and get certified!
Step 3: The client acknowledges the server’s response with ACK, and the actual data
transmission beginsest
HTTP response codes indicate a server’s response when a client makes a request to
the server. It shows whether an HTTP request is completed or not.
1xx: Informational
The request is received, and the process is continuing. Some example codes are:
100 (continue)
101 (switching protocol)
102 (processing)
103 (early hints)
2xx: Success
The action is received, understood, and accepted successfully. A few example codes
for this are:
200 (OK)
202 (accepted)
205 (reset content)
208 (already reported)
3xx: Redirection
To complete the request, further action is required to take place. Example codes:
300 (multiple choice)
302 (found)
308 (permanent redirect)
The request has incorrect syntax, or it is not fulfilled. Here are the example codes for
this:
The server fails to complete a valid request. Example codes for this are:
Also, check out this blog for Top Cyber Security Skills!
CIA Triad is a security model to ensure IT security. CIA stands for confidentiality,
integrity, and availability.
1. Man in the Middle attack: The attacker puts himself in the communication
between the sender and the receiver. This is done to eavesdrop and impersonate
to steal data.
2. Phishing: Here, the attacker will act as a trusted entity to perform malicious
activities such as getting usernames, passwords, and credit card numbers.
3. Rogue Software: It is a fraudulent attack where the attacker fakes a virus on
the target device and offers an anti-virus tool to remove the malware. This is
done to install malicious software into the system.
4. Malware: Malware is software that is designed to attack the target system.
The software can be a virus, worm, ransomware, spyware, and so on.
5. Drive-by Downloads: The hacker takes advantage of the lack of updates on
the OS, app, or browser, which automatically downloads malicious code to the
system.
6. DDoS: This is done to overwhelm the target network with massive traffic,
making it impossible for the website or the service to be operable.
7. Malvertising: Malvertising refers to the injections of maleficent code to
legitimate advertising networks, which redirect users to unintended websites.
8. Password Attacks: As the name suggests, here, the cyber hacker cracks
credentials like passwords.
Check out our blog on Cyber Security Tips and Best Practices to prevent Cyber
Security attacks!
A port scan helps you determine the ports that are open, listening, or closed on a
network. Administrators use this to test network security and the system’s firewall
strength. For hackers, it is a popular reconnaissance tool to identify the weak point
to break into a system.
Some of the common basic port scanning techniques are:
1. UDP
2. Ping scan
3. TCP connect
4. TCP half-open
5. Stealth scanning
10. Explain brute force attack and the ways to prevent it.
A brute force attack is a hack where the attacker tries to guess the target password
by trial and error. It is mostly implemented with the help of automated software
used to login with credentials.
12. What is the difference between vulnerability assessment (VA) and penetration
testing (PT)?
Vulnerability Assessment (VA) Penetration Testing (PT)
Identifies the vulnerabilities in a network Identifies vulnerabilities to exploit them to
penetrate the system
Tells how susceptible the network is Tells whether the detected vulnerability is
genuine
Conducted at regular intervals when Conducted annually when there are
there is a change in the system or significant changes introduced into the
network system
13. Mention the steps to set up a firewall.
Want to know How to become a cyber security engineer in 2023? check this blog out!
Secure Socket Layer is a security protocol that is used for the purpose of encryption.
It ensures privacy, data integrity, and authentication in the network like online
transactions.
A server that is secured uses the Secure Socket Layer (SSL) protocol to encrypt and
decrypt data to protect it from unauthorized access.
OSI model was introduced by the International Organization for Standardization for
different computer systems to communicate with each other using standard
protocols.
Physical layer: This layer allows the transmission of raw data bits over a
physical medium.
Datalink layer: This layer determines the format of the data in the network.
Network layer: It tells which path the data will take.
Transport layer: This layer allows the transmission of data using TCP/UDP
protocols.
Session layer: It controls sessions and ports to maintain the connections in
the network.
Presentation layer: Data encryptions happen in this layer, and it ensures that
the data is in a usable/presentable format.
Application layer: This is where the user interacts with the application.
VPN stands for virtual private network. It is a private network that gives you online
anonymity and privacy from a public Internet connection. VPN helps you protect
your online activities, such as sending an email, paying bills, or shopping online.
Are you excited to know about the Access Control List, so check out this blog!
23. Who are White Hat, Grey Hat, and Black Hat Hackers?
Patch management has to be done immediately once the updates to the software is
released. All the network devices in the organization should get patch management
in less than a month.
BIOS being hardware, setting it up with a password locks the operating system.
There are three ways to reset the BIOS password:
1. you need to unplug the PC and remove the CMOS battery in the cabinet for
15–30 minutes. Then, you can put it back.
2. You can use third-party software such as CmosPwd and Kiosk.
3. You can run the below commands from the MS-DOS prompt with the help of
the debug tool. For this method to work, you need to have access to the OS
installed.
Debug
o 70 2E
o 71 FF
quit
This will reset all BIOS configurations, and you need to re-enter the settings for it.
26. Explain the MITM attack. How to prevent it?
Flooding attacks: This is the most commonly occurring type of DDoS attack. Flooding
attacks stop the system when the server is accumulated with massive amounts of
traffic that it cannot handle. The attacker sends packets continuously with the help
of automated software.
Crash attacks: This is the least common DDoS attack where the attacker exploits a
bug in the targeted system to cause a system crash. It prevents legitimate users from
accessing email, websites, banking accounts, and gaming sites.
Cross-site scripting also known as XSS attack allows the attacker to pretend as a
victim user to carry out the actions that the user can perform, in turn, stealing any of
the user’s data. If the attacker can masquerade as a privileged victim user, one can
gain full control over all the application’s data and functionality. Here, the attacker
injects malicious client-side code into web services to steal information, run
destructive code, take control of a user’s session, and perform a phishing scam.
It refers to restricting users from accessing a set of services within the local area
network. The main aim is to stop the source from providing access to destination
nodes via ports. Since all applications run on the ports, it is necessary to block the
ports to restrict unauthorized access, which might violate the security vulnerability in
the network infrastructure.
31. What are the protocols that fall under the TCP/IP Internet layer?
Application NFS, NIS, SNMP, telnet, ftp, rlogin, rsh, rcp, RIP, RDISC, DNS, LDAP,
Layer and others
Transport Layer TCP, SCTP, UDP, etc.
Internet IPv4, ARP, ICMP, IPv6, etc.
Data Link Layer IEEE 802.2, PPP, etc.
Physical Layer Ethernet (IEEE 802.3), FDDI, Token Ring, RS-232, and others
A botnet, which is also known as a robot network, is a malware that infects networks
of computers and gets them under the control of a single attacker who is called a
‘bot herder.’ A bot is an individual machine that is under the control of bot herders.
The attacker acts as a central party who can command every bot to perform
simultaneous and coordinated criminal actions.
The botnet is a large-scale attack since a bot herder can control millions of bots at a
time. All the botnets can receive updates from the attacker to change their behavior
in no time.
When two users have the same password, it will result in the creation of the same
password hashes. In such a case, an attacker can easily crack the password by
performing a dictionary or brute-force attack. To avoid this, a salted hash is
implemented.
36. What is 2FA, and how can it be implemented for public websites?
1. Install firewalls
2. Rotate passwords frequently
3. Do not click on or download from unknown sources
4. Get free anti-phishing tools
5. Do not provide your personal information on an unsecured/unknown site
Have a look at this Cyber Security Tutorial, which will make it easier for you to dive
into this field!
41. You have a suture from where you receive the following email from the help
desk:
Dear YYY,
We are deleting all inactive emails to create space for other new users. If you want
to save your account data, please provide the following details:
First Name and Last Name:
Email ID:
Password:
Date of Birth:
Alternate Email:
Please submit the above detail by the end of the week to avoid any account
termination.
Considering the above scenario, how would you react as a user? Explain briefly.
The above email is an excellent illustration of phishing. Here are the reasons why:
As a rule of thumb, you should never revert to a sender who demands personal
information and passwords via emails, phone calls, text messages, and instant
messages (IMs). You must not disclose your data to any external party even if the
sender works for organizations such as ITS or UCSC.
Want to learn more about Cyber Security? Enroll in our Cyber Security Course now
and practice essential cyber security interview questions!
42. You get an e-card in your mail from a friend. It asks you to download an
attachment to view the card. What will you do? Justify your answer.
It is highly likely that the above-mentioned three newsletters are from a parent
company, which are distributed through different channels. It can be used to gather
essential pieces of information that might look safe in the user’s eyes. However, this
can be misused to sell personal information to carry out identity theft. It might
further ask the user for the date of birth for the activation of the fourth newsletter.
In many scenarios, questions that involve personal details are unnecessary, and you
should not provide them to any random person, company, or website unless it is for
a legitimate purpose.
44. To print billing, you have to provide your login credentials in your computing
labs. Recently, people started to get a bill for the print, which was never done by
them. When they called to complain, the bill turned out to be correct. How do you
explain the above situation?
To avoid this situation, you should always sign out of all accounts, close the browser,
and quit the programs when you use a shared or public computer. There are chances
that an illegitimate user can retrieve your authorized data and perform actions on
behalf of you without your knowledge when you keep the accounts in a logged-in
state.
45. In our campus computer lab, one of my friends logged into her Yahoo account.
When she left the lab, she made sure that the account was not left open. Later, she
came to realize that someone re-accessed her account from the browser, which
she has used to send emails, by impersonating her. How do you think this
happened?
1. The attacker can visit the browser’s history to access her account if she hasn’t
logged out.
2. Even if she has logged out but has not cleared the web cache (pages a
browser saves to gain easy and quick access for the future)
46. An employee’s bank account faces an error during a direct deposit. Two
different offices need to work on it to straighten this out. Office #1 contacts Office
#2 by email to send the valid account information for the deposit. The employee
now gives the bank confirmations that the error no longer exists. What is wrong
here?
Any sensitive information cannot be shared via email as it can lead to identity theft.
This is because emails are mostly not private and secure. Sharing or sending personal
information along the network is not recommended as the route can be easily
tracked.
In such scenarios, the involved parties should call each other and work with ITS as a
secure way of sending the information.
Check out this interesting blog on the difference between Cyber Security and
Information Security!
47. You see an unusual activity of the mouse pointer, which starts to move around
on its own and clicks on various things on the desktop. What should you do in this
situation?
The answer is (D) and (E). This kind of activity is surely suspicious as an unknown
authority seems to have the access to control the computer remotely. In such cases,
you should immediately report it to the respective supervisor. You can keep the
computer disconnected from the network till help arrives.
48. Check out the list of passwords below, which are pulled out from a database:
A. Password1
B. @#$)*&^%
C. UcSc4Evr!
D. akHGksmLN
Choose the passwords that are in line with the UCSC’s password requirements.
The answer is C (UcSc4Evr!). As per the UCSC requirements, a password should be:
49. The bank sends you an email, which says it has encountered a problem with
your account. The email is provided with instructions and also a link to log in to the
account so that you can fix it. What do you infer from the above situation? Explain.
It appears to be an unsolicited email. You should report it as spam and move the
email to the trash immediately in the respective web client you use (Yahoo Mail,
Gmail, etc.). Before providing any bank-related credentials online, you should call the
bank to check if the message is legitimate and is from the bank.
50. In your IT company, employees are registering numerous complaints that the
campus computers are delivering Viagra spam. To verify it, you check the reports,
and it turns out to be correct. The computer program is automatically sending tons
of spam emails without the owner’s knowledge. This happened because a hacker
had installed a malicious program into the system. What are the reasons you think
might have caused this incident?
This type of attack happens when the password is hacked. To avoid this, whenever
you set a password, always use a proper standard, i.e., use passwords that are at
least 8-character length and have a combination of upper case/lower case letters,
symbols/special characters, and numbers.