This document provides an overview of common cybersecurity interview questions for freshers. It discusses questions about preventing cross-site scripting, defining key cybersecurity concepts like threats, vulnerabilities and risks, explaining botnets, and distinguishing between intrusion detection and prevention systems.
2. www.infosectrain.com | sales@infosectrain.com
Aspiring to start your career in Cybersecurity? Here we bring the top
Cybersecurity interview questions for freshers that will help you get your
Ѓ˥˦˧˝ˢ˕ʡ
ˊ˘˟˜˩˘˜ˡ˦˨˖˛˔ˡ˘˥˔˪˛˘˥˘˘˩˘˥ˬ˧˛˜ˡ˚˜˦˗˜˚˜˧˔˟˜˭˘˗ʡʹ˥ˢˠ˥˘˦˧˔˨˥˔ˡ˧
ˢ˥˗˘˥˦˧ˢ˧˛˘ˣ˨˕˟˜˖˛˘˔˟˧˛˖˔˥˘˦ˬ˦˧˘ˠ˔ˡ˗˘˩˘ˡ˖˥˜˧˜˖˔˟˜ˡ˙ˢ˥ˠ˔˧˜ˢˡˢ˙˔
ˡ˔˧˜ˢˡϠ˦˗˘˙˘ˡ˦˘˦ˬ˦˧˘ˠ˜˦˗˜˚˜˧˔˟˜˭˘˗ʡˊ˜˧˛˨˦˘˥˦˦˧ˢ˥˜ˡ˚ˠ˔˦˦˜˩˘˔ˠˢ˨ˡ˧˦
of data online, it is no doubt that the data is vulnerable to fraudulent
˛˔˖˞˘˥˦ʡ
ʼˇʶˢˠˣ˔ˡ˜˘˦˔˥˘ˡˢ˧˜˖˜ˡ˚˧˛˘˖˥˜˧˜˖˔˟˜˧ˬˢ˙˧˛˘˦˜˧˨˔˧˜ˢˡʟ˔ˡ˗˛˘ˡ˖˘ʟ˧˛˘
˗˘ˠ˔ˡ˗˙ˢ˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬˢ˙Ѓ˖˘˥˦˜˦˥˔ˣ˜˗˟ˬ˜ˡ˖˥˘˔˦˜ˡ˚ʡʷ˨˘˧ˢ˧˛˘
˜ˡ˖˥˘˔˦˘˜ˡ˗˘ˠ˔ˡ˗ʟ˧˛˘˥˘˜˦˔˟ˢ˧ˢ˙˖ˢˠˣ˘˧˜˧˜ˢˡ˔ˠˢˡ˚˧˛˘˗ˢˠ˔˜ˡʡ
4. www.infosectrain.com | sales@infosectrain.com
A Botnet basically refers to a group of devices that are internet
˖ˢˡˡ˘˖˧˘˗ʟ˦˨˖˛˔˦˦˘˥˩˘˥˦ʟ˃ʶ˦ʟ˔ˡ˗ˠˢ˕˜˟˘˗˘˩˜˖˘˦˧˛˔˧˖˔ˡ˕˘
˔˙˙˘˖˧˘˗˔ˡ˗˖ˢˡ˧˥ˢ˟˟˘˗˕ˬ˦ˢˠ˘˞˜ˡ˗ˢ˙ˠ˔˟˪˔˥˘ʡˇ˛˘˔˕ˢ˩˘
cybersecurity interview questions for freshers will be asked when
the interviewers want to know about your understanding of the
˕˔˦˜˖˖ˢˡ˖˘ˣ˧˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ
ˉ˨˟ˡ˘˥˔˕˜˟˜˧ˬ˜˦˥˘˙˘˥˥˘˗˧ˢ˔˦˧˛˘˪˘˔˞ˡ˘˦˦˘˦˙ˢ˨ˡ˗˜ˡ˔˦ˬ˦˧˘ˠ
˧˛˔˧˖˔ˡ˖˔˨˦˘ˣˢ˧˘ˡ˧˜˔˟˧˛˥˘˔˧ˢ˨˧˖ˢˠ˘˦ʟ˟˜˞˘ˆ˄ʿ˜ˡ˝˘˖˧˜ˢˡ˦˔ˡ˗
˖˥ˢ˦˦ʠ˦˜˧˘˦˖˥˜ˣ˧˜ˡ˚ʡ˅˜˦˞˥˘˙˘˥˦˧ˢ˧˛˘˗˔ˠ˔˚˘˧˛˔˧˖˔ˡ˕˘˗ˢˡ˘˧ˢ
the data if or when a threat exploits the vulnerability that was
˔˟˥˘˔˗ˬˣ˥˘˦˘ˡ˧ʡ
What is a Botnet
4
ʼˡ˧˥˨˦˜ˢˡʷ˘˧˘˖˧˜ˢˡˆˬ˦˧˘ˠ˦ʛʼʷˆʜ˜˦˔˦˜ˠˣ˟˘ˠˢˡ˜˧ˢ˥˜ˡ˚˦ˬ˦˧˘ˠ
˧˛˔˧˗˘˧˘˖˧˦˜ˡ˧˥˨˦˜ˢˡ˕˨˧˖˔ˡˡˢ˧ˣ˥˘˩˘ˡ˧˜˧ʡʼˡ˧˥˨˦˜ˢˡ˃˥˘˩˘ˡ˧˜ˢˡ
ˆˬ˦˧˘ˠ˦ʛʼ˃ˆʜ˜˦˔˖ˢˡ˧˥ˢ˟˦ˬ˦˧˘ˠ˧˛˔˧˗˘˧˘˖˧˦˔˦˪˘˟˟˔˦ˣ˥˘˩˘ˡ˧˦
˜ˡ˧˥˨˦˜ˢˡʡ
State the difference between IDS and IPS
5
ˌ˘˦ʡʼˡ˙ˢ˥ˠ˔˧˜ˢˡˣ˥ˢ˧˘˖˧˜ˢˡ˨˦˘˦˦˘˖˨˥˜˧ˬ˦ˢ˙˧˪˔˥˘˔ˡ˗˘ˡ˖˥ˬˣ˧˜ˢˡ
˧ˢˣ˥ˢ˧˘˖˧˧˛˘˗˔˧˔˙˥ˢˠ˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˖˘˦˦ʡˊ˛˜˟˘˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ
˔˦˦˨˥˔ˡ˖˘˘ˡ˦˨˥˘˦˔˨˧˛˘ˡ˧˜˖˔˧˜ˢˡʟ˔˩˔˜˟˔˕˜˟˜˧ˬʟ˔ˡ˗˖ˢˡЃ˗˘ˡ˧˜˔˟˜˧ˬ
ˢ˙˗˔˧˔˔ˡ˗˞˘˘ˣ˦˜˧˥˘˟˜˔˕˟˘ʡ
Is there any difference between information
protection and information assurance
6
5. www.infosectrain.com | sales@infosectrain.com
Cybersecurity interview questions for freshers like these test your
˞ˡˢ˪˟˘˗˚˘ˢˡ˩˔˥˜ˢ˨˦˧˘˖˛ˡ˜˖˔˟˜˧˜˘˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ
˅ʷ˃ˢ˥˅˘ˠˢ˧˘ʷ˘˦˞˧ˢˣ˃˥ˢ˧ˢ˖ˢ˟˜˦˔ˀ˜˖˥ˢ˦ˢ˙˧ˣ˥ˢ˧ˢ˖ˢ˟˧˛˔˧˜˦
˗˘˦˜˚ˡ˘˗˙ˢ˥˧˥˔ˡ˦˙˘˥˦˘˖˨˥˜˧ˬ˔ˡ˗˘ˡ˖˥ˬˣ˧˜ˢˡˢ˙˗˔˧˔ʡˇ˛˜˦˜˦
˜ˠˣ˟˘ˠ˘ˡ˧˘˗˕˘˧˪˘˘ˡ˨˦˘˥˦ʟ˖˟˜˘ˡ˧˗˘˩˜˖˘˦ʟ˔ˡ˗˔˩˜˥˧˨˔˟ˡ˘˧˪ˢ˥˞
˦˘˥˩˘˥ʡ
7
ˇ˛˘˗˘˧˘˖˧˜ˢˡˢ˙˩˨˟ˡ˘˥˔˕˟˘˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˔˦˦˘˧˦˟˜˞˘˖˨˦˧ˢˠ˘˥˗˔˧˔
and hardware, that are prone to cyber-attacks is called cybersecu-
˥˜˧ˬ˥˜˦˞˔˦˦˘˦˦ˠ˘ˡ˧ʡʼ˧˜˦ˣ˥˔˖˧˜˖˘˗˧ˢЃ˚˨˥˘ˢ˨˧˔ˡ˗ˣ˥˜ˢ˥˜˧˜˭˘˥˜˦˞˦
˔˖˥ˢ˦˦˖ˢˠˣ˔ˡ˜˘˦ʡ
What is cybersecurity risk assessment
8
ʴ˙˔˟˦˘ˣˢ˦˜˧˜˩˘˜ˡʼʷˆ˜˦˖ˢˡ˦˜˗˘˥˘˗˔˙˔˟˦˘˔˟˔˥ˠ˧˛˔˧˜˦Ѓ˥˘˗˙ˢ˥
˟˘˚˜˧˜ˠ˔˧˘ˡ˘˧˪ˢ˥˞˔˖˧˜˩˜˧ˬʡ
ʴ˙˔˟˦˘ˡ˘˚˔˧˜˩˘˜˦˖ˢˡ˦˜˗˘˥˘˗˧ˢ˕˘˧˛˘ˠˢ˦˧˖ˢˠˣ˟˜˖˔˧˘˗˦˧˔˧˘
˔ˡ˗ˢ˖˖˨˥˦˪˛˘ˡ˧˛˘ʼʷˆ˙˔˜˟˦˧ˢ˜˗˘ˡ˧˜˙ˬ˔ˡ˗˔˟˘˥˧ˠ˔˟˜˖˜ˢ˨˦
ˡ˘˧˪ˢ˥˞˧˥˔˙Ѓ˖ʡ
What is a false positive and false negative
in IDS
9
ʶˢ˚ˡ˜˧˜˩˘˦˘˖˨˥˜˧ˬ˜˦ˣ˥˜ˠ˔˥˜˟ˬ˔ˡ˔ˣˣ˟˜˖˔˧˜ˢˡˢ˙ʴʼ˧˘˖˛ˡˢ˟ˢ˚ˬ˧˛˔˧
˜˗˘ˡ˧˜Ѓ˘˦˧˛˥˘˔˧˦˔ˡ˗ˣ˥ˢ˧˘˖˧˦˧˛˘ˣ˛ˬ˦˜˖˔˟˔ˡ˗˗˜˚˜˧˔˟˦ˬ˦˧˘ˠ˦ʡʼ˧˜˦
˕˔˦˘˗ˢˡ˛˨ˠ˔ˡ˨ˡ˗˘˥˦˧˔ˡ˗˜ˡ˚ˣ˥ˢ˖˘˦˦˘˦ʡ
What is cognitive security
10
6. www.infosectrain.com | sales@infosectrain.com
ʷˁˆˢ˥ʷˢˠ˔˜ˡˁ˔ˠ˘ˆˬ˦˧˘ˠˀˢˡ˜˧ˢ˥˜ˡ˚˛˘˟ˣ˦˘ˡ˦˨˥˘˧˛˘
˖ˢˡ˧˜ˡ˨˜˧ˬˢ˙ˣ˥ˢˣ˘˥˧˥˔˙Ѓ˖˥ˢ˨˧˜ˡ˚˧ˢ˦˘˥˩˜˖˘˦ʟ˪˘˕˦˜˧˘˦ʟ˔ˡ˗
˘˟˘˖˧˥ˢˡ˜˖˖ˢˠˠ˨ˡ˜˖˔˧˜ˢˡ˦ʡ
What is the importance of DNS
monitoring
11
ʼʺˀ˃ˢ˥ʼˡ˧˘˥ˡ˘˧ʺ˥ˢ˨ˣˀ˔ˡ˔˚˘ˠ˘ˡ˧˃˥ˢ˧ˢ˖ˢ˟˜˦˔
˖ˢˠˠ˨ˡ˜˖˔˧˜ˢˡˣ˥ˢ˧ˢ˖ˢ˟˨˦˘˗˕ˬ˩˜˗˘ˢˢ˥˚˔ˠ˘˦˧˥˘˔ˠ˜ˡ˚ʡ
What is IGMP
12
These cybersecurity interview questions for freshers target the
˖˔ˡ˗˜˗˔˧˘Ϡ˦˚˥˔˦ˣˢˡ˧˛˘ˡˢ˧˜ˢˡ˦ˢ˙˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˘˖ˢ˦ˬ˦˧˘ˠʡ
ˆˬˠˠ˘˧˥˜˖˘ˡ˖˥ˬˣ˧˜ˢˡ˘ˡ˖˥ˬˣ˧˦˔ˡ˗˗˘˖˥ˬˣ˧˦˨˦˜ˡ˚˧˛˘˦˔ˠ˘˞˘ˬʡ
ʼ˧Ϡ˦ˠ˨˖˛˙˔˦˧˘˥˗˨˘˧ˢ˧˛˘˦˜ˠˣ˟˘˥ˠ˔˧˛˦˜ˡ˩ˢ˟˩˘˗ʡʴ˦ˬˠˠ˘˧˥˜˖
˘ˡ˖˥ˬˣ˧˜ˢˡ˘ˡ˖˥ˬˣ˧˦˔ˡ˗˗˘˖˥ˬˣ˧˦˨˦˜ˡ˚˗˜˙˙˘˥˘ˡ˧˞˘˧˦ʡ
Mention a difference between symmetric
and asymmetric encryption
13
ʶˆ˅ʹˢ˥ʶ˥ˢ˦˦ʠˆ˜˧˘˅˘ˤ˨˘˦˧ʹˢ˥˚˘˥ˬ˜˦˔˩˨˟ˡ˘˥˔˕˜˟˜˧ˬˢ˙˪˘˕
applications where the server goes straight to processing before
˖˛˘˖˞˜ˡ˚˪˛˘˧˛˘˥˔˥˘ˤ˨˘˦˧˛˔˦˖ˢˠ˘˙˥ˢˠ˔˧˥˨˦˧˘˗˖˟˜˘ˡ˧ˢ˥ˡˢ˧ʡ
What is CSRF
14
7. www.infosectrain.com | sales@infosectrain.com
This cybersecurity interview questions for freshers is asked to
˨˦˨˔˟˟ˬ˖ˢˡ˙˨˦˘˧˛˘˜ˡ˧˘˥˩˜˘˪˘˘ʡʴ˧˜ˣ˙ˢ˥˔ˡ˦˪˘˥˜ˡ˚˜˧˜˦˧ˢ˞˘˘ˣ
˧˛˘˔ˡ˦˪˘˥˩˘˥ˬ˦˜ˠˣ˟˘ʡʴʵ˟˔˖˞˛˔˧˛˔˖˞˘˥˛˔˖˞˦˪˜˧˛ˢ˨˧
˔˨˧˛ˢ˥˜˧ˬʡʴˊ˛˜˧˘˛˔˧˛˔˖˞˘˥ˣ˘˥˙ˢ˥ˠ˦˔ˡ˔˨˧˛ˢ˥˜˭˘˗˛˔˖˞˜ˡ˚
˔˧˧˘ˠˣ˧˨ˡ˗˘˥˦˜˚ˡ˘˗ˁʷʴʡʴʺ˥˘ˬ˛˔˧˛˔˖˞˘˥˜˦˜ˡ˜˧˜˔˟˟ˬ˔˪˛˜˧˘
˛˔˧˛˔˖˞˘˥˪˛ˢˣ˘˥˙ˢ˥ˠ˦˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˧˜˩˜˧˜˘˦˦ˢˠ˘˧˜ˠ˘˦ʡ
What is a Black hat, White hat, and
Grey hat hacker
15
ʴʶʼʴ˧˥˜˔ˡ˚˟˘˥˘˙˘˥˦˧ˢʶˢˡЃ˗˘ˡ˧˜˔˟˜˧ˬʟʼˡ˧˘˚˥˜˧ˬʟ˔ˡ˗ʴ˩˔˜˟˔˕˜˟˜˧ˬʡʼ˧
˜˦˞˘˘ˣ˜ˡ˚˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˦˘˖˥˘˧ʟ˨ˡ˔˟˧˘˥˘˗ʟ˔ˡ˗˔˩˔˜˟˔˕˟˘˔˧˔˟˟
˧˜ˠ˘˦ʡ
What is a CIA triangle
16
ʶˢˠˣ˟˜˔ˡ˖˘˜˦˥˘˙˘˥˥˘˗˧ˢ˧˛˘˙ˢ˟˟ˢ˪˜ˡ˚˔˖˘˥˧˔˜ˡ˦˘˧ˢ˙
˦˧˔ˡ˗˔˥˗˦˔ˡ˗˥˨˟˘˦˧˛˔˧˜˦˦˘˧˕ˬ˔˚ˢ˩˘˥ˡˠ˘ˡ˧ʢʼˡ˗˘ˣ˘ˡ˗˘ˡ˧
ˣ˔˥˧ˬʢˢ˥˚˔ˡ˜˭˔˧˜ˢˡʡ
What is compliance
17
ʹˢ˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥˙˥˘˦˛˘˥˦˟˜˞˘˧˛˘˦˘ʟ˜˧˜˦
best to stay generic as different architecture contains different
ˢ˕˝˘˖˧˦ʡʵ˔˦˜˖˪˘˕˔˥˖˛˜˧˘˖˧˨˥˘˦˛ˢ˨˟˗˖ˢˡ˧˔˜ˡˢ˕˝˘˖˧˦ʟ˜ˡ˖˟˨˗˜ˡ˚
a database server, front-ending server, and a web application
˦˘˥˩˘˥ʡ
Explain the objects of Basic web
architecture
18