SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
www.infosectrain.com | sales@infosectrain.com
CYBERSECURITY
interview questions for freshers
www.infosectrain.com | sales@infosectrain.com
Aspiring to start your career in Cybersecurity? Here we bring the top
Cybersecurity interview questions for freshers that will help you get your
Ѓ˥˦˧˝ˢ˕ʡ
ˊ˘˟˜˩˘˜ˡ˦˨˖˛˔ˡ˘˥˔˪˛˘˥˘˘˩˘˥ˬ˧˛˜ˡ˚˜˦˗˜˚˜˧˔˟˜˭˘˗ʡʹ˥ˢˠ˥˘˦˧˔˨˥˔ˡ˧
ˢ˥˗˘˥˦˧ˢ˧˛˘ˣ˨˕˟˜˖˛˘˔˟˧˛˖˔˥˘˦ˬ˦˧˘ˠ˔ˡ˗˘˩˘ˡ˖˥˜˧˜˖˔˟˜ˡ˙ˢ˥ˠ˔˧˜ˢˡˢ˙˔
ˡ˔˧˜ˢˡϠ˦˗˘˙˘ˡ˦˘˦ˬ˦˧˘ˠ˜˦˗˜˚˜˧˔˟˜˭˘˗ʡˊ˜˧˛˨˦˘˥˦˦˧ˢ˥˜ˡ˚ˠ˔˦˦˜˩˘˔ˠˢ˨ˡ˧˦
of data online, it is no doubt that the data is vulnerable to fraudulent
˛˔˖˞˘˥˦ʡ
ʼˇʶˢˠˣ˔ˡ˜˘˦˔˥˘ˡˢ˧˜˖˜ˡ˚˧˛˘˖˥˜˧˜˖˔˟˜˧ˬˢ˙˧˛˘˦˜˧˨˔˧˜ˢˡʟ˔ˡ˗˛˘ˡ˖˘ʟ˧˛˘
˗˘ˠ˔ˡ˗˙ˢ˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬˢ˙Ѓ˖˘˥˦˜˦˥˔ˣ˜˗˟ˬ˜ˡ˖˥˘˔˦˜ˡ˚ʡʷ˨˘˧ˢ˧˛˘
˜ˡ˖˥˘˔˦˘˜ˡ˗˘ˠ˔ˡ˗ʟ˧˛˘˥˘˜˦˔˟ˢ˧ˢ˙˖ˢˠˣ˘˧˜˧˜ˢˡ˔ˠˢˡ˚˧˛˘˗ˢˠ˔˜ˡʡ
www.infosectrain.com | sales@infosectrain.com
ʻ˘ˡ˖˘ʟ˜˙ˬˢ˨˪˔ˡ˧˔˝ˢ˕˜ˡʶˬ˕˘˥˦˘˖˨˥˜˧ˬʟˬˢ˨˛˔˩˘˧ˢ˕˘ˢˡ˘ˢ˙˧˛˘˕˘˦˧ʡ
ʹ˥˘˦˛˘˥˦˧˛˔˧˚˜˩˘ˤ˨˜˖˞˔ˡ˦˪˘˥˦˧ˢ˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥
˙˥˘˦˛˘˥˦˚˘˧˔˚ˢˢ˗˛˘˔˗˦˧˔˥˧˙ˢ˥˦˧˔˥˧˜ˡ˚˧˛˘˜˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˖˔˥˘˘˥ʡʼ˧˜˦
˛˜˚˛˟ˬ˔˗˩˜˦˘˗˧˛˔˧ˬˢ˨ˣ˥˘ˣ˔˥˘˙˥ˢˠ˦˔ˠˣ˟˘˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪
ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥˙˥˘˦˛˘˥˦˧ˢ˜ˠˣ˥ˢ˩˘ˬˢ˨˥˚˥˔˦ˣˢ˩˘˥˧˛˘˖ˢ˥˘˖ˢˡ˖˘ˣ˧˦ˢ˙
ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ
Top Cybersecurity Interview Questions
Cybersecurity is the protection given to internet-connected
˦ˬ˦˧˘ˠ˦˟˜˞˘˦ˢ˙˧˪˔˥˘ʟ˛˔˥˗˪˔˥˘ʟ˔ˡ˗˘˟˘˖˧˥ˢˡ˜˖˗˔˧˔ʟ˙˥ˢˠ
˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˖˘˦˦˔ˡ˗˖ˬ˕˘˥ʠ˔˧˧˔˖˞˦ʡ
ʷ˘Ѓˡ˘ʶˬ˕˘˥˦˘˖˨˥˜˧ˬ
1
To prevent Cross-Site Scripting, we can follow a few practices such
˔˦ˈ˦˜ˡ˚˔ˡˋˆˆʻˇˀʿʹ˜˟˧˘˥ʟʸˡ˖ˢ˗˜ˡ˚˦ˣ˘˖˜˔˟˖˛˔˥˔˖˧˘˥˦ʟˈ˦˜ˡ˚
ʴˡ˧˜ʠˋˆˆ˦˘˥˩˜˖˘˦ʢ˧ˢˢ˟˦ʟ˔ˡ˗ˉ˔˟˜˗˔˧˜ˡ˚˨˦˘˥˜ˡˣ˨˧˦ʡ
What can you do to prevent Cross-Site
Scripting
2
Cybersecurity interview questions for freshers like these checks
ˬˢ˨˥˘˫ˣ˘˥˧˜˦˘˜ˡ˔˟˟˧˛˘˖ˢ˥˘˖ˢˡ˖˘ˣ˧˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡʴ˧˛˥˘˔˧˜˦
˪˛˘ˡ˦ˢˠ˘ˢˡ˘˛˔˦˧˛˘ˣˢ˧˘ˡ˧˜˔˟˧ˢ˛˔˥ˠ˧˛˘ˢ˙Ѓ˖˜˔˟˗˔˧˔˧ˢ˔
˦ˬ˦˧˘ˠ˕ˬ˗˔ˠ˔˚˜ˡ˚ˢ˥˗˘˦˧˥ˢˬ˜ˡ˚˜˧ʟ˟˜˞˘˔˃˛˜˦˛˜ˡ˚˔˧˧˔˖˞
Mention the difference between Threat
Vulnerability, and Risk
3
www.infosectrain.com | sales@infosectrain.com
A Botnet basically refers to a group of devices that are internet
˖ˢˡˡ˘˖˧˘˗ʟ˦˨˖˛˔˦˦˘˥˩˘˥˦ʟ˃ʶ˦ʟ˔ˡ˗ˠˢ˕˜˟˘˗˘˩˜˖˘˦˧˛˔˧˖˔ˡ˕˘
˔˙˙˘˖˧˘˗˔ˡ˗˖ˢˡ˧˥ˢ˟˟˘˗˕ˬ˦ˢˠ˘˞˜ˡ˗ˢ˙ˠ˔˟˪˔˥˘ʡˇ˛˘˔˕ˢ˩˘
cybersecurity interview questions for freshers will be asked when
the interviewers want to know about your understanding of the
˕˔˦˜˖˖ˢˡ˖˘ˣ˧˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ
ˉ˨˟ˡ˘˥˔˕˜˟˜˧ˬ˜˦˥˘˙˘˥˥˘˗˧ˢ˔˦˧˛˘˪˘˔˞ˡ˘˦˦˘˦˙ˢ˨ˡ˗˜ˡ˔˦ˬ˦˧˘ˠ
˧˛˔˧˖˔ˡ˖˔˨˦˘ˣˢ˧˘ˡ˧˜˔˟˧˛˥˘˔˧ˢ˨˧˖ˢˠ˘˦ʟ˟˜˞˘ˆ˄ʿ˜ˡ˝˘˖˧˜ˢˡ˦˔ˡ˗
˖˥ˢ˦˦ʠ˦˜˧˘˦˖˥˜ˣ˧˜ˡ˚ʡ˅˜˦˞˥˘˙˘˥˦˧ˢ˧˛˘˗˔ˠ˔˚˘˧˛˔˧˖˔ˡ˕˘˗ˢˡ˘˧ˢ
the data if or when a threat exploits the vulnerability that was
˔˟˥˘˔˗ˬˣ˥˘˦˘ˡ˧ʡ
What is a Botnet
4
ʼˡ˧˥˨˦˜ˢˡʷ˘˧˘˖˧˜ˢˡˆˬ˦˧˘ˠ˦ʛʼʷˆʜ˜˦˔˦˜ˠˣ˟˘ˠˢˡ˜˧ˢ˥˜ˡ˚˦ˬ˦˧˘ˠ
˧˛˔˧˗˘˧˘˖˧˦˜ˡ˧˥˨˦˜ˢˡ˕˨˧˖˔ˡˡˢ˧ˣ˥˘˩˘ˡ˧˜˧ʡʼˡ˧˥˨˦˜ˢˡ˃˥˘˩˘ˡ˧˜ˢˡ
ˆˬ˦˧˘ˠ˦ʛʼ˃ˆʜ˜˦˔˖ˢˡ˧˥ˢ˟˦ˬ˦˧˘ˠ˧˛˔˧˗˘˧˘˖˧˦˔˦˪˘˟˟˔˦ˣ˥˘˩˘ˡ˧˦
˜ˡ˧˥˨˦˜ˢˡʡ
State the difference between IDS and IPS
5
ˌ˘˦ʡʼˡ˙ˢ˥ˠ˔˧˜ˢˡˣ˥ˢ˧˘˖˧˜ˢˡ˨˦˘˦˦˘˖˨˥˜˧ˬ˦ˢ˙˧˪˔˥˘˔ˡ˗˘ˡ˖˥ˬˣ˧˜ˢˡ
˧ˢˣ˥ˢ˧˘˖˧˧˛˘˗˔˧˔˙˥ˢˠ˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˖˘˦˦ʡˊ˛˜˟˘˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ
˔˦˦˨˥˔ˡ˖˘˘ˡ˦˨˥˘˦˔˨˧˛˘ˡ˧˜˖˔˧˜ˢˡʟ˔˩˔˜˟˔˕˜˟˜˧ˬʟ˔ˡ˗˖ˢˡЃ˗˘ˡ˧˜˔˟˜˧ˬ
ˢ˙˗˔˧˔˔ˡ˗˞˘˘ˣ˦˜˧˥˘˟˜˔˕˟˘ʡ
Is there any difference between information
protection and information assurance
6
www.infosectrain.com | sales@infosectrain.com
Cybersecurity interview questions for freshers like these test your
˞ˡˢ˪˟˘˗˚˘ˢˡ˩˔˥˜ˢ˨˦˧˘˖˛ˡ˜˖˔˟˜˧˜˘˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ
˅ʷ˃ˢ˥˅˘ˠˢ˧˘ʷ˘˦˞˧ˢˣ˃˥ˢ˧ˢ˖ˢ˟˜˦˔ˀ˜˖˥ˢ˦ˢ˙˧ˣ˥ˢ˧ˢ˖ˢ˟˧˛˔˧˜˦
˗˘˦˜˚ˡ˘˗˙ˢ˥˧˥˔ˡ˦˙˘˥˦˘˖˨˥˜˧ˬ˔ˡ˗˘ˡ˖˥ˬˣ˧˜ˢˡˢ˙˗˔˧˔ʡˇ˛˜˦˜˦
˜ˠˣ˟˘ˠ˘ˡ˧˘˗˕˘˧˪˘˘ˡ˨˦˘˥˦ʟ˖˟˜˘ˡ˧˗˘˩˜˖˘˦ʟ˔ˡ˗˔˩˜˥˧˨˔˟ˡ˘˧˪ˢ˥˞
˦˘˥˩˘˥ʡ
7
ˇ˛˘˗˘˧˘˖˧˜ˢˡˢ˙˩˨˟ˡ˘˥˔˕˟˘˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˔˦˦˘˧˦˟˜˞˘˖˨˦˧ˢˠ˘˥˗˔˧˔
and hardware, that are prone to cyber-attacks is called cybersecu-
˥˜˧ˬ˥˜˦˞˔˦˦˘˦˦ˠ˘ˡ˧ʡʼ˧˜˦ˣ˥˔˖˧˜˖˘˗˧ˢЃ˚˨˥˘ˢ˨˧˔ˡ˗ˣ˥˜ˢ˥˜˧˜˭˘˥˜˦˞˦
˔˖˥ˢ˦˦˖ˢˠˣ˔ˡ˜˘˦ʡ
What is cybersecurity risk assessment
8
ʴ˙˔˟˦˘ˣˢ˦˜˧˜˩˘˜ˡʼʷˆ˜˦˖ˢˡ˦˜˗˘˥˘˗˔˙˔˟˦˘˔˟˔˥ˠ˧˛˔˧˜˦Ѓ˥˘˗˙ˢ˥
˟˘˚˜˧˜ˠ˔˧˘ˡ˘˧˪ˢ˥˞˔˖˧˜˩˜˧ˬʡ
ʴ˙˔˟˦˘ˡ˘˚˔˧˜˩˘˜˦˖ˢˡ˦˜˗˘˥˘˗˧ˢ˕˘˧˛˘ˠˢ˦˧˖ˢˠˣ˟˜˖˔˧˘˗˦˧˔˧˘
˔ˡ˗ˢ˖˖˨˥˦˪˛˘ˡ˧˛˘ʼʷˆ˙˔˜˟˦˧ˢ˜˗˘ˡ˧˜˙ˬ˔ˡ˗˔˟˘˥˧ˠ˔˟˜˖˜ˢ˨˦
ˡ˘˧˪ˢ˥˞˧˥˔˙Ѓ˖ʡ
What is a false positive and false negative
in IDS
9
ʶˢ˚ˡ˜˧˜˩˘˦˘˖˨˥˜˧ˬ˜˦ˣ˥˜ˠ˔˥˜˟ˬ˔ˡ˔ˣˣ˟˜˖˔˧˜ˢˡˢ˙ʴʼ˧˘˖˛ˡˢ˟ˢ˚ˬ˧˛˔˧
˜˗˘ˡ˧˜Ѓ˘˦˧˛˥˘˔˧˦˔ˡ˗ˣ˥ˢ˧˘˖˧˦˧˛˘ˣ˛ˬ˦˜˖˔˟˔ˡ˗˗˜˚˜˧˔˟˦ˬ˦˧˘ˠ˦ʡʼ˧˜˦
˕˔˦˘˗ˢˡ˛˨ˠ˔ˡ˨ˡ˗˘˥˦˧˔ˡ˗˜ˡ˚ˣ˥ˢ˖˘˦˦˘˦ʡ
What is cognitive security
10
www.infosectrain.com | sales@infosectrain.com
ʷˁˆˢ˥ʷˢˠ˔˜ˡˁ˔ˠ˘ˆˬ˦˧˘ˠˀˢˡ˜˧ˢ˥˜ˡ˚˛˘˟ˣ˦˘ˡ˦˨˥˘˧˛˘
˖ˢˡ˧˜ˡ˨˜˧ˬˢ˙ˣ˥ˢˣ˘˥˧˥˔˙Ѓ˖˥ˢ˨˧˜ˡ˚˧ˢ˦˘˥˩˜˖˘˦ʟ˪˘˕˦˜˧˘˦ʟ˔ˡ˗
˘˟˘˖˧˥ˢˡ˜˖˖ˢˠˠ˨ˡ˜˖˔˧˜ˢˡ˦ʡ
What is the importance of DNS
monitoring
11
ʼʺˀ˃ˢ˥ʼˡ˧˘˥ˡ˘˧ʺ˥ˢ˨ˣˀ˔ˡ˔˚˘ˠ˘ˡ˧˃˥ˢ˧ˢ˖ˢ˟˜˦˔
˖ˢˠˠ˨ˡ˜˖˔˧˜ˢˡˣ˥ˢ˧ˢ˖ˢ˟˨˦˘˗˕ˬ˩˜˗˘ˢˢ˥˚˔ˠ˘˦˧˥˘˔ˠ˜ˡ˚ʡ
What is IGMP
12
These cybersecurity interview questions for freshers target the
˖˔ˡ˗˜˗˔˧˘Ϡ˦˚˥˔˦ˣˢˡ˧˛˘ˡˢ˧˜ˢˡ˦ˢ˙˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˘˖ˢ˦ˬ˦˧˘ˠʡ
ˆˬˠˠ˘˧˥˜˖˘ˡ˖˥ˬˣ˧˜ˢˡ˘ˡ˖˥ˬˣ˧˦˔ˡ˗˗˘˖˥ˬˣ˧˦˨˦˜ˡ˚˧˛˘˦˔ˠ˘˞˘ˬʡ
ʼ˧Ϡ˦ˠ˨˖˛˙˔˦˧˘˥˗˨˘˧ˢ˧˛˘˦˜ˠˣ˟˘˥ˠ˔˧˛˦˜ˡ˩ˢ˟˩˘˗ʡʴ˦ˬˠˠ˘˧˥˜˖
˘ˡ˖˥ˬˣ˧˜ˢˡ˘ˡ˖˥ˬˣ˧˦˔ˡ˗˗˘˖˥ˬˣ˧˦˨˦˜ˡ˚˗˜˙˙˘˥˘ˡ˧˞˘˧˦ʡ
Mention a difference between symmetric
and asymmetric encryption
13
ʶˆ˅ʹˢ˥ʶ˥ˢ˦˦ʠˆ˜˧˘˅˘ˤ˨˘˦˧ʹˢ˥˚˘˥ˬ˜˦˔˩˨˟ˡ˘˥˔˕˜˟˜˧ˬˢ˙˪˘˕
applications where the server goes straight to processing before
˖˛˘˖˞˜ˡ˚˪˛˘˧˛˘˥˔˥˘ˤ˨˘˦˧˛˔˦˖ˢˠ˘˙˥ˢˠ˔˧˥˨˦˧˘˗˖˟˜˘ˡ˧ˢ˥ˡˢ˧ʡ
What is CSRF
14
www.infosectrain.com | sales@infosectrain.com
This cybersecurity interview questions for freshers is asked to
˨˦˨˔˟˟ˬ˖ˢˡ˙˨˦˘˧˛˘˜ˡ˧˘˥˩˜˘˪˘˘ʡʴ˧˜ˣ˙ˢ˥˔ˡ˦˪˘˥˜ˡ˚˜˧˜˦˧ˢ˞˘˘ˣ
˧˛˘˔ˡ˦˪˘˥˩˘˥ˬ˦˜ˠˣ˟˘ʡʴʵ˟˔˖˞˛˔˧˛˔˖˞˘˥˛˔˖˞˦˪˜˧˛ˢ˨˧
˔˨˧˛ˢ˥˜˧ˬʡʴˊ˛˜˧˘˛˔˧˛˔˖˞˘˥ˣ˘˥˙ˢ˥ˠ˦˔ˡ˔˨˧˛ˢ˥˜˭˘˗˛˔˖˞˜ˡ˚
˔˧˧˘ˠˣ˧˨ˡ˗˘˥˦˜˚ˡ˘˗ˁʷʴʡʴʺ˥˘ˬ˛˔˧˛˔˖˞˘˥˜˦˜ˡ˜˧˜˔˟˟ˬ˔˪˛˜˧˘
˛˔˧˛˔˖˞˘˥˪˛ˢˣ˘˥˙ˢ˥ˠ˦˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˧˜˩˜˧˜˘˦˦ˢˠ˘˧˜ˠ˘˦ʡ
What is a Black hat, White hat, and
Grey hat hacker
15
ʴʶʼʴ˧˥˜˔ˡ˚˟˘˥˘˙˘˥˦˧ˢʶˢˡЃ˗˘ˡ˧˜˔˟˜˧ˬʟʼˡ˧˘˚˥˜˧ˬʟ˔ˡ˗ʴ˩˔˜˟˔˕˜˟˜˧ˬʡʼ˧
˜˦˞˘˘ˣ˜ˡ˚˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˦˘˖˥˘˧ʟ˨ˡ˔˟˧˘˥˘˗ʟ˔ˡ˗˔˩˔˜˟˔˕˟˘˔˧˔˟˟
˧˜ˠ˘˦ʡ
What is a CIA triangle
16
ʶˢˠˣ˟˜˔ˡ˖˘˜˦˥˘˙˘˥˥˘˗˧ˢ˧˛˘˙ˢ˟˟ˢ˪˜ˡ˚˔˖˘˥˧˔˜ˡ˦˘˧ˢ˙
˦˧˔ˡ˗˔˥˗˦˔ˡ˗˥˨˟˘˦˧˛˔˧˜˦˦˘˧˕ˬ˔˚ˢ˩˘˥ˡˠ˘ˡ˧ʢʼˡ˗˘ˣ˘ˡ˗˘ˡ˧
ˣ˔˥˧ˬʢˢ˥˚˔ˡ˜˭˔˧˜ˢˡʡ
What is compliance
17
ʹˢ˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥˙˥˘˦˛˘˥˦˟˜˞˘˧˛˘˦˘ʟ˜˧˜˦
best to stay generic as different architecture contains different
ˢ˕˝˘˖˧˦ʡʵ˔˦˜˖˪˘˕˔˥˖˛˜˧˘˖˧˨˥˘˦˛ˢ˨˟˗˖ˢˡ˧˔˜ˡˢ˕˝˘˖˧˦ʟ˜ˡ˖˟˨˗˜ˡ˚
a database server, front-ending server, and a web application
˦˘˥˩˘˥ʡ
Explain the objects of Basic web
architecture
18
www.infosectrain.com | sales@infosectrain.com
ʼ˧˜˦˧˛˘ˣ˥ˢ˖˘˦˦ˢ˙˚˔˧˛˘˥˜ˡ˚˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˔˕ˢ˨˧ˡ˘˧˪ˢ˥˞ʟ˦ˬ˦˧˘ˠʟ
˘˧˖ʡ˕ˬ˦˘ˡ˗˜ˡ˚ˠ˘˦˦˔˚˘˦˔ˡ˗˧˛˘ˡ˔ˡ˔˟ˬ˭˜ˡ˚˧˛˘˥˘˦ˣˢˡ˦˘˦ʡ
ˊ˛˔˧˜˦˗˔˧˔˘˫Ѓ˟˧˥˔˧˜ˢˡ
19
ʻʼʷˆ˜˦˔˛ˢ˦˧˜ˡ˧˥˨˦˜ˢˡ˗˘˧˘˖˧˜ˢˡ˦ˬ˦˧˘ˠ˧˛˔˧˜˦ˣ˟˔˖˘˗ˢˡ˘˔˖˛
˛ˢ˦˧ʡˁʼʷˆ˜˦˔ˡ˘˧˪ˢ˥˞˜ˡ˧˥˨˦˜ˢˡ˗˘˧˘˖˧˜ˢˡ˦ˬ˦˧˘ˠ˧˛˔˧˜˦ˣ˟˔˖˘˗
˜ˡ˧˛˘ˡ˘˧˪ˢ˥˞ʡ
What is HIDS and NIDS
20

Mais conteúdo relacionado

Semelhante a CYBERSECURITY Interview Questions for Freshers.pdf

So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
abnmi
 
Answer each question in one to two paragraphs.Question 1
Answer each question in one to two paragraphs.Question 1Answer each question in one to two paragraphs.Question 1
Answer each question in one to two paragraphs.Question 1
brockdebroah
 

Semelhante a CYBERSECURITY Interview Questions for Freshers.pdf (20)

Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
 
200 IT Secutiry Job Interview Question
200 IT Secutiry Job Interview Question200 IT Secutiry Job Interview Question
200 IT Secutiry Job Interview Question
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
A Beginner's Guide To Cybersecurity For Startups
A Beginner's Guide To Cybersecurity For StartupsA Beginner's Guide To Cybersecurity For Startups
A Beginner's Guide To Cybersecurity For Startups
 
Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
Answer each question in one to two paragraphs.Question 1
Answer each question in one to two paragraphs.Question 1Answer each question in one to two paragraphs.Question 1
Answer each question in one to two paragraphs.Question 1
 
Infosec
InfosecInfosec
Infosec
 
Infosec
InfosecInfosec
Infosec
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
 
Ethical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth VasavadaEthical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth Vasavada
 
Web Security
Web SecurityWeb Security
Web Security
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
 
Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +
 
CompTIA Security+
CompTIA Security+CompTIA Security+
CompTIA Security+
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Make Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your FavorMake Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your Favor
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 

Mais de ShivamSharma909

Mais de ShivamSharma909 (20)

Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
Top 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdfTop 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdf
 
Top 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdfTop 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdf
 
Threat Hunting Professional Online Training Course
Threat Hunting Professional Online Training CourseThreat Hunting Professional Online Training Course
Threat Hunting Professional Online Training Course
 
Why cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fitWhy cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fit
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
 
Top 20 azure interview questions
Top 20 azure interview questionsTop 20 azure interview questions
Top 20 azure interview questions
 
Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questions
 
EC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystEC-Council Certified SOC Analyst
EC-Council Certified SOC Analyst
 
Ctia course outline
Ctia course outlineCtia course outline
Ctia course outline
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application Hacking
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter Hacking
 
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack TechniquesDomain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
 
Domain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance TechniquesDomain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance Techniques
 
Domain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical HackingDomain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical Hacking
 
How is az 303 different from az-304
How is az 303 different from az-304How is az 303 different from az-304
How is az 303 different from az-304
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
 
Cisa domain 4
Cisa domain 4Cisa domain 4
Cisa domain 4
 
Cisa domain 3
Cisa domain 3Cisa domain 3
Cisa domain 3
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Último (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 

CYBERSECURITY Interview Questions for Freshers.pdf

  • 2. www.infosectrain.com | sales@infosectrain.com Aspiring to start your career in Cybersecurity? Here we bring the top Cybersecurity interview questions for freshers that will help you get your Ѓ˥˦˧˝ˢ˕ʡ ˊ˘˟˜˩˘˜ˡ˦˨˖˛˔ˡ˘˥˔˪˛˘˥˘˘˩˘˥ˬ˧˛˜ˡ˚˜˦˗˜˚˜˧˔˟˜˭˘˗ʡʹ˥ˢˠ˥˘˦˧˔˨˥˔ˡ˧ ˢ˥˗˘˥˦˧ˢ˧˛˘ˣ˨˕˟˜˖˛˘˔˟˧˛˖˔˥˘˦ˬ˦˧˘ˠ˔ˡ˗˘˩˘ˡ˖˥˜˧˜˖˔˟˜ˡ˙ˢ˥ˠ˔˧˜ˢˡˢ˙˔ ˡ˔˧˜ˢˡϠ˦˗˘˙˘ˡ˦˘˦ˬ˦˧˘ˠ˜˦˗˜˚˜˧˔˟˜˭˘˗ʡˊ˜˧˛˨˦˘˥˦˦˧ˢ˥˜ˡ˚ˠ˔˦˦˜˩˘˔ˠˢ˨ˡ˧˦ of data online, it is no doubt that the data is vulnerable to fraudulent ˛˔˖˞˘˥˦ʡ ʼˇʶˢˠˣ˔ˡ˜˘˦˔˥˘ˡˢ˧˜˖˜ˡ˚˧˛˘˖˥˜˧˜˖˔˟˜˧ˬˢ˙˧˛˘˦˜˧˨˔˧˜ˢˡʟ˔ˡ˗˛˘ˡ˖˘ʟ˧˛˘ ˗˘ˠ˔ˡ˗˙ˢ˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬˢ˙Ѓ˖˘˥˦˜˦˥˔ˣ˜˗˟ˬ˜ˡ˖˥˘˔˦˜ˡ˚ʡʷ˨˘˧ˢ˧˛˘ ˜ˡ˖˥˘˔˦˘˜ˡ˗˘ˠ˔ˡ˗ʟ˧˛˘˥˘˜˦˔˟ˢ˧ˢ˙˖ˢˠˣ˘˧˜˧˜ˢˡ˔ˠˢˡ˚˧˛˘˗ˢˠ˔˜ˡʡ
  • 3. www.infosectrain.com | sales@infosectrain.com ʻ˘ˡ˖˘ʟ˜˙ˬˢ˨˪˔ˡ˧˔˝ˢ˕˜ˡʶˬ˕˘˥˦˘˖˨˥˜˧ˬʟˬˢ˨˛˔˩˘˧ˢ˕˘ˢˡ˘ˢ˙˧˛˘˕˘˦˧ʡ ʹ˥˘˦˛˘˥˦˧˛˔˧˚˜˩˘ˤ˨˜˖˞˔ˡ˦˪˘˥˦˧ˢ˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥ ˙˥˘˦˛˘˥˦˚˘˧˔˚ˢˢ˗˛˘˔˗˦˧˔˥˧˙ˢ˥˦˧˔˥˧˜ˡ˚˧˛˘˜˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˖˔˥˘˘˥ʡʼ˧˜˦ ˛˜˚˛˟ˬ˔˗˩˜˦˘˗˧˛˔˧ˬˢ˨ˣ˥˘ˣ˔˥˘˙˥ˢˠ˦˔ˠˣ˟˘˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪ ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥˙˥˘˦˛˘˥˦˧ˢ˜ˠˣ˥ˢ˩˘ˬˢ˨˥˚˥˔˦ˣˢ˩˘˥˧˛˘˖ˢ˥˘˖ˢˡ˖˘ˣ˧˦ˢ˙ ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ Top Cybersecurity Interview Questions Cybersecurity is the protection given to internet-connected ˦ˬ˦˧˘ˠ˦˟˜˞˘˦ˢ˙˧˪˔˥˘ʟ˛˔˥˗˪˔˥˘ʟ˔ˡ˗˘˟˘˖˧˥ˢˡ˜˖˗˔˧˔ʟ˙˥ˢˠ ˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˖˘˦˦˔ˡ˗˖ˬ˕˘˥ʠ˔˧˧˔˖˞˦ʡ ʷ˘Ѓˡ˘ʶˬ˕˘˥˦˘˖˨˥˜˧ˬ 1 To prevent Cross-Site Scripting, we can follow a few practices such ˔˦ˈ˦˜ˡ˚˔ˡˋˆˆʻˇˀʿʹ˜˟˧˘˥ʟʸˡ˖ˢ˗˜ˡ˚˦ˣ˘˖˜˔˟˖˛˔˥˔˖˧˘˥˦ʟˈ˦˜ˡ˚ ʴˡ˧˜ʠˋˆˆ˦˘˥˩˜˖˘˦ʢ˧ˢˢ˟˦ʟ˔ˡ˗ˉ˔˟˜˗˔˧˜ˡ˚˨˦˘˥˜ˡˣ˨˧˦ʡ What can you do to prevent Cross-Site Scripting 2 Cybersecurity interview questions for freshers like these checks ˬˢ˨˥˘˫ˣ˘˥˧˜˦˘˜ˡ˔˟˟˧˛˘˖ˢ˥˘˖ˢˡ˖˘ˣ˧˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡʴ˧˛˥˘˔˧˜˦ ˪˛˘ˡ˦ˢˠ˘ˢˡ˘˛˔˦˧˛˘ˣˢ˧˘ˡ˧˜˔˟˧ˢ˛˔˥ˠ˧˛˘ˢ˙Ѓ˖˜˔˟˗˔˧˔˧ˢ˔ ˦ˬ˦˧˘ˠ˕ˬ˗˔ˠ˔˚˜ˡ˚ˢ˥˗˘˦˧˥ˢˬ˜ˡ˚˜˧ʟ˟˜˞˘˔˃˛˜˦˛˜ˡ˚˔˧˧˔˖˞ Mention the difference between Threat Vulnerability, and Risk 3
  • 4. www.infosectrain.com | sales@infosectrain.com A Botnet basically refers to a group of devices that are internet ˖ˢˡˡ˘˖˧˘˗ʟ˦˨˖˛˔˦˦˘˥˩˘˥˦ʟ˃ʶ˦ʟ˔ˡ˗ˠˢ˕˜˟˘˗˘˩˜˖˘˦˧˛˔˧˖˔ˡ˕˘ ˔˙˙˘˖˧˘˗˔ˡ˗˖ˢˡ˧˥ˢ˟˟˘˗˕ˬ˦ˢˠ˘˞˜ˡ˗ˢ˙ˠ˔˟˪˔˥˘ʡˇ˛˘˔˕ˢ˩˘ cybersecurity interview questions for freshers will be asked when the interviewers want to know about your understanding of the ˕˔˦˜˖˖ˢˡ˖˘ˣ˧˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ ˉ˨˟ˡ˘˥˔˕˜˟˜˧ˬ˜˦˥˘˙˘˥˥˘˗˧ˢ˔˦˧˛˘˪˘˔˞ˡ˘˦˦˘˦˙ˢ˨ˡ˗˜ˡ˔˦ˬ˦˧˘ˠ ˧˛˔˧˖˔ˡ˖˔˨˦˘ˣˢ˧˘ˡ˧˜˔˟˧˛˥˘˔˧ˢ˨˧˖ˢˠ˘˦ʟ˟˜˞˘ˆ˄ʿ˜ˡ˝˘˖˧˜ˢˡ˦˔ˡ˗ ˖˥ˢ˦˦ʠ˦˜˧˘˦˖˥˜ˣ˧˜ˡ˚ʡ˅˜˦˞˥˘˙˘˥˦˧ˢ˧˛˘˗˔ˠ˔˚˘˧˛˔˧˖˔ˡ˕˘˗ˢˡ˘˧ˢ the data if or when a threat exploits the vulnerability that was ˔˟˥˘˔˗ˬˣ˥˘˦˘ˡ˧ʡ What is a Botnet 4 ʼˡ˧˥˨˦˜ˢˡʷ˘˧˘˖˧˜ˢˡˆˬ˦˧˘ˠ˦ʛʼʷˆʜ˜˦˔˦˜ˠˣ˟˘ˠˢˡ˜˧ˢ˥˜ˡ˚˦ˬ˦˧˘ˠ ˧˛˔˧˗˘˧˘˖˧˦˜ˡ˧˥˨˦˜ˢˡ˕˨˧˖˔ˡˡˢ˧ˣ˥˘˩˘ˡ˧˜˧ʡʼˡ˧˥˨˦˜ˢˡ˃˥˘˩˘ˡ˧˜ˢˡ ˆˬ˦˧˘ˠ˦ʛʼ˃ˆʜ˜˦˔˖ˢˡ˧˥ˢ˟˦ˬ˦˧˘ˠ˧˛˔˧˗˘˧˘˖˧˦˔˦˪˘˟˟˔˦ˣ˥˘˩˘ˡ˧˦ ˜ˡ˧˥˨˦˜ˢˡʡ State the difference between IDS and IPS 5 ˌ˘˦ʡʼˡ˙ˢ˥ˠ˔˧˜ˢˡˣ˥ˢ˧˘˖˧˜ˢˡ˨˦˘˦˦˘˖˨˥˜˧ˬ˦ˢ˙˧˪˔˥˘˔ˡ˗˘ˡ˖˥ˬˣ˧˜ˢˡ ˧ˢˣ˥ˢ˧˘˖˧˧˛˘˗˔˧˔˙˥ˢˠ˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˖˘˦˦ʡˊ˛˜˟˘˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ ˔˦˦˨˥˔ˡ˖˘˘ˡ˦˨˥˘˦˔˨˧˛˘ˡ˧˜˖˔˧˜ˢˡʟ˔˩˔˜˟˔˕˜˟˜˧ˬʟ˔ˡ˗˖ˢˡЃ˗˘ˡ˧˜˔˟˜˧ˬ ˢ˙˗˔˧˔˔ˡ˗˞˘˘ˣ˦˜˧˥˘˟˜˔˕˟˘ʡ Is there any difference between information protection and information assurance 6
  • 5. www.infosectrain.com | sales@infosectrain.com Cybersecurity interview questions for freshers like these test your ˞ˡˢ˪˟˘˗˚˘ˢˡ˩˔˥˜ˢ˨˦˧˘˖˛ˡ˜˖˔˟˜˧˜˘˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ ˅ʷ˃ˢ˥˅˘ˠˢ˧˘ʷ˘˦˞˧ˢˣ˃˥ˢ˧ˢ˖ˢ˟˜˦˔ˀ˜˖˥ˢ˦ˢ˙˧ˣ˥ˢ˧ˢ˖ˢ˟˧˛˔˧˜˦ ˗˘˦˜˚ˡ˘˗˙ˢ˥˧˥˔ˡ˦˙˘˥˦˘˖˨˥˜˧ˬ˔ˡ˗˘ˡ˖˥ˬˣ˧˜ˢˡˢ˙˗˔˧˔ʡˇ˛˜˦˜˦ ˜ˠˣ˟˘ˠ˘ˡ˧˘˗˕˘˧˪˘˘ˡ˨˦˘˥˦ʟ˖˟˜˘ˡ˧˗˘˩˜˖˘˦ʟ˔ˡ˗˔˩˜˥˧˨˔˟ˡ˘˧˪ˢ˥˞ ˦˘˥˩˘˥ʡ 7 ˇ˛˘˗˘˧˘˖˧˜ˢˡˢ˙˩˨˟ˡ˘˥˔˕˟˘˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˔˦˦˘˧˦˟˜˞˘˖˨˦˧ˢˠ˘˥˗˔˧˔ and hardware, that are prone to cyber-attacks is called cybersecu- ˥˜˧ˬ˥˜˦˞˔˦˦˘˦˦ˠ˘ˡ˧ʡʼ˧˜˦ˣ˥˔˖˧˜˖˘˗˧ˢЃ˚˨˥˘ˢ˨˧˔ˡ˗ˣ˥˜ˢ˥˜˧˜˭˘˥˜˦˞˦ ˔˖˥ˢ˦˦˖ˢˠˣ˔ˡ˜˘˦ʡ What is cybersecurity risk assessment 8 ʴ˙˔˟˦˘ˣˢ˦˜˧˜˩˘˜ˡʼʷˆ˜˦˖ˢˡ˦˜˗˘˥˘˗˔˙˔˟˦˘˔˟˔˥ˠ˧˛˔˧˜˦Ѓ˥˘˗˙ˢ˥ ˟˘˚˜˧˜ˠ˔˧˘ˡ˘˧˪ˢ˥˞˔˖˧˜˩˜˧ˬʡ ʴ˙˔˟˦˘ˡ˘˚˔˧˜˩˘˜˦˖ˢˡ˦˜˗˘˥˘˗˧ˢ˕˘˧˛˘ˠˢ˦˧˖ˢˠˣ˟˜˖˔˧˘˗˦˧˔˧˘ ˔ˡ˗ˢ˖˖˨˥˦˪˛˘ˡ˧˛˘ʼʷˆ˙˔˜˟˦˧ˢ˜˗˘ˡ˧˜˙ˬ˔ˡ˗˔˟˘˥˧ˠ˔˟˜˖˜ˢ˨˦ ˡ˘˧˪ˢ˥˞˧˥˔˙Ѓ˖ʡ What is a false positive and false negative in IDS 9 ʶˢ˚ˡ˜˧˜˩˘˦˘˖˨˥˜˧ˬ˜˦ˣ˥˜ˠ˔˥˜˟ˬ˔ˡ˔ˣˣ˟˜˖˔˧˜ˢˡˢ˙ʴʼ˧˘˖˛ˡˢ˟ˢ˚ˬ˧˛˔˧ ˜˗˘ˡ˧˜Ѓ˘˦˧˛˥˘˔˧˦˔ˡ˗ˣ˥ˢ˧˘˖˧˦˧˛˘ˣ˛ˬ˦˜˖˔˟˔ˡ˗˗˜˚˜˧˔˟˦ˬ˦˧˘ˠ˦ʡʼ˧˜˦ ˕˔˦˘˗ˢˡ˛˨ˠ˔ˡ˨ˡ˗˘˥˦˧˔ˡ˗˜ˡ˚ˣ˥ˢ˖˘˦˦˘˦ʡ What is cognitive security 10
  • 6. www.infosectrain.com | sales@infosectrain.com ʷˁˆˢ˥ʷˢˠ˔˜ˡˁ˔ˠ˘ˆˬ˦˧˘ˠˀˢˡ˜˧ˢ˥˜ˡ˚˛˘˟ˣ˦˘ˡ˦˨˥˘˧˛˘ ˖ˢˡ˧˜ˡ˨˜˧ˬˢ˙ˣ˥ˢˣ˘˥˧˥˔˙Ѓ˖˥ˢ˨˧˜ˡ˚˧ˢ˦˘˥˩˜˖˘˦ʟ˪˘˕˦˜˧˘˦ʟ˔ˡ˗ ˘˟˘˖˧˥ˢˡ˜˖˖ˢˠˠ˨ˡ˜˖˔˧˜ˢˡ˦ʡ What is the importance of DNS monitoring 11 ʼʺˀ˃ˢ˥ʼˡ˧˘˥ˡ˘˧ʺ˥ˢ˨ˣˀ˔ˡ˔˚˘ˠ˘ˡ˧˃˥ˢ˧ˢ˖ˢ˟˜˦˔ ˖ˢˠˠ˨ˡ˜˖˔˧˜ˢˡˣ˥ˢ˧ˢ˖ˢ˟˨˦˘˗˕ˬ˩˜˗˘ˢˢ˥˚˔ˠ˘˦˧˥˘˔ˠ˜ˡ˚ʡ What is IGMP 12 These cybersecurity interview questions for freshers target the ˖˔ˡ˗˜˗˔˧˘Ϡ˦˚˥˔˦ˣˢˡ˧˛˘ˡˢ˧˜ˢˡ˦ˢ˙˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˘˖ˢ˦ˬ˦˧˘ˠʡ ˆˬˠˠ˘˧˥˜˖˘ˡ˖˥ˬˣ˧˜ˢˡ˘ˡ˖˥ˬˣ˧˦˔ˡ˗˗˘˖˥ˬˣ˧˦˨˦˜ˡ˚˧˛˘˦˔ˠ˘˞˘ˬʡ ʼ˧Ϡ˦ˠ˨˖˛˙˔˦˧˘˥˗˨˘˧ˢ˧˛˘˦˜ˠˣ˟˘˥ˠ˔˧˛˦˜ˡ˩ˢ˟˩˘˗ʡʴ˦ˬˠˠ˘˧˥˜˖ ˘ˡ˖˥ˬˣ˧˜ˢˡ˘ˡ˖˥ˬˣ˧˦˔ˡ˗˗˘˖˥ˬˣ˧˦˨˦˜ˡ˚˗˜˙˙˘˥˘ˡ˧˞˘˧˦ʡ Mention a difference between symmetric and asymmetric encryption 13 ʶˆ˅ʹˢ˥ʶ˥ˢ˦˦ʠˆ˜˧˘˅˘ˤ˨˘˦˧ʹˢ˥˚˘˥ˬ˜˦˔˩˨˟ˡ˘˥˔˕˜˟˜˧ˬˢ˙˪˘˕ applications where the server goes straight to processing before ˖˛˘˖˞˜ˡ˚˪˛˘˧˛˘˥˔˥˘ˤ˨˘˦˧˛˔˦˖ˢˠ˘˙˥ˢˠ˔˧˥˨˦˧˘˗˖˟˜˘ˡ˧ˢ˥ˡˢ˧ʡ What is CSRF 14
  • 7. www.infosectrain.com | sales@infosectrain.com This cybersecurity interview questions for freshers is asked to ˨˦˨˔˟˟ˬ˖ˢˡ˙˨˦˘˧˛˘˜ˡ˧˘˥˩˜˘˪˘˘ʡʴ˧˜ˣ˙ˢ˥˔ˡ˦˪˘˥˜ˡ˚˜˧˜˦˧ˢ˞˘˘ˣ ˧˛˘˔ˡ˦˪˘˥˩˘˥ˬ˦˜ˠˣ˟˘ʡʴʵ˟˔˖˞˛˔˧˛˔˖˞˘˥˛˔˖˞˦˪˜˧˛ˢ˨˧ ˔˨˧˛ˢ˥˜˧ˬʡʴˊ˛˜˧˘˛˔˧˛˔˖˞˘˥ˣ˘˥˙ˢ˥ˠ˦˔ˡ˔˨˧˛ˢ˥˜˭˘˗˛˔˖˞˜ˡ˚ ˔˧˧˘ˠˣ˧˨ˡ˗˘˥˦˜˚ˡ˘˗ˁʷʴʡʴʺ˥˘ˬ˛˔˧˛˔˖˞˘˥˜˦˜ˡ˜˧˜˔˟˟ˬ˔˪˛˜˧˘ ˛˔˧˛˔˖˞˘˥˪˛ˢˣ˘˥˙ˢ˥ˠ˦˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˧˜˩˜˧˜˘˦˦ˢˠ˘˧˜ˠ˘˦ʡ What is a Black hat, White hat, and Grey hat hacker 15 ʴʶʼʴ˧˥˜˔ˡ˚˟˘˥˘˙˘˥˦˧ˢʶˢˡЃ˗˘ˡ˧˜˔˟˜˧ˬʟʼˡ˧˘˚˥˜˧ˬʟ˔ˡ˗ʴ˩˔˜˟˔˕˜˟˜˧ˬʡʼ˧ ˜˦˞˘˘ˣ˜ˡ˚˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˦˘˖˥˘˧ʟ˨ˡ˔˟˧˘˥˘˗ʟ˔ˡ˗˔˩˔˜˟˔˕˟˘˔˧˔˟˟ ˧˜ˠ˘˦ʡ What is a CIA triangle 16 ʶˢˠˣ˟˜˔ˡ˖˘˜˦˥˘˙˘˥˥˘˗˧ˢ˧˛˘˙ˢ˟˟ˢ˪˜ˡ˚˔˖˘˥˧˔˜ˡ˦˘˧ˢ˙ ˦˧˔ˡ˗˔˥˗˦˔ˡ˗˥˨˟˘˦˧˛˔˧˜˦˦˘˧˕ˬ˔˚ˢ˩˘˥ˡˠ˘ˡ˧ʢʼˡ˗˘ˣ˘ˡ˗˘ˡ˧ ˣ˔˥˧ˬʢˢ˥˚˔ˡ˜˭˔˧˜ˢˡʡ What is compliance 17 ʹˢ˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥˙˥˘˦˛˘˥˦˟˜˞˘˧˛˘˦˘ʟ˜˧˜˦ best to stay generic as different architecture contains different ˢ˕˝˘˖˧˦ʡʵ˔˦˜˖˪˘˕˔˥˖˛˜˧˘˖˧˨˥˘˦˛ˢ˨˟˗˖ˢˡ˧˔˜ˡˢ˕˝˘˖˧˦ʟ˜ˡ˖˟˨˗˜ˡ˚ a database server, front-ending server, and a web application ˦˘˥˩˘˥ʡ Explain the objects of Basic web architecture 18