SlideShare a Scribd company logo
1 of 8
Download to read offline
www.infosectrain.com | sales@infosectrain.com
CYBERSECURITY
interview questions for freshers
www.infosectrain.com | sales@infosectrain.com
Aspiring to start your career in Cybersecurity? Here we bring the top
Cybersecurity interview questions for freshers that will help you get your
Ѓ˥˦˧˝ˢ˕ʡ
ˊ˘˟˜˩˘˜ˡ˦˨˖˛˔ˡ˘˥˔˪˛˘˥˘˘˩˘˥ˬ˧˛˜ˡ˚˜˦˗˜˚˜˧˔˟˜˭˘˗ʡʹ˥ˢˠ˥˘˦˧˔˨˥˔ˡ˧
ˢ˥˗˘˥˦˧ˢ˧˛˘ˣ˨˕˟˜˖˛˘˔˟˧˛˖˔˥˘˦ˬ˦˧˘ˠ˔ˡ˗˘˩˘ˡ˖˥˜˧˜˖˔˟˜ˡ˙ˢ˥ˠ˔˧˜ˢˡˢ˙˔
ˡ˔˧˜ˢˡϠ˦˗˘˙˘ˡ˦˘˦ˬ˦˧˘ˠ˜˦˗˜˚˜˧˔˟˜˭˘˗ʡˊ˜˧˛˨˦˘˥˦˦˧ˢ˥˜ˡ˚ˠ˔˦˦˜˩˘˔ˠˢ˨ˡ˧˦
of data online, it is no doubt that the data is vulnerable to fraudulent
˛˔˖˞˘˥˦ʡ
ʼˇʶˢˠˣ˔ˡ˜˘˦˔˥˘ˡˢ˧˜˖˜ˡ˚˧˛˘˖˥˜˧˜˖˔˟˜˧ˬˢ˙˧˛˘˦˜˧˨˔˧˜ˢˡʟ˔ˡ˗˛˘ˡ˖˘ʟ˧˛˘
˗˘ˠ˔ˡ˗˙ˢ˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬˢ˙Ѓ˖˘˥˦˜˦˥˔ˣ˜˗˟ˬ˜ˡ˖˥˘˔˦˜ˡ˚ʡʷ˨˘˧ˢ˧˛˘
˜ˡ˖˥˘˔˦˘˜ˡ˗˘ˠ˔ˡ˗ʟ˧˛˘˥˘˜˦˔˟ˢ˧ˢ˙˖ˢˠˣ˘˧˜˧˜ˢˡ˔ˠˢˡ˚˧˛˘˗ˢˠ˔˜ˡʡ
www.infosectrain.com | sales@infosectrain.com
ʻ˘ˡ˖˘ʟ˜˙ˬˢ˨˪˔ˡ˧˔˝ˢ˕˜ˡʶˬ˕˘˥˦˘˖˨˥˜˧ˬʟˬˢ˨˛˔˩˘˧ˢ˕˘ˢˡ˘ˢ˙˧˛˘˕˘˦˧ʡ
ʹ˥˘˦˛˘˥˦˧˛˔˧˚˜˩˘ˤ˨˜˖˞˔ˡ˦˪˘˥˦˧ˢ˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥
˙˥˘˦˛˘˥˦˚˘˧˔˚ˢˢ˗˛˘˔˗˦˧˔˥˧˙ˢ˥˦˧˔˥˧˜ˡ˚˧˛˘˜˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˖˔˥˘˘˥ʡʼ˧˜˦
˛˜˚˛˟ˬ˔˗˩˜˦˘˗˧˛˔˧ˬˢ˨ˣ˥˘ˣ˔˥˘˙˥ˢˠ˦˔ˠˣ˟˘˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪
ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥˙˥˘˦˛˘˥˦˧ˢ˜ˠˣ˥ˢ˩˘ˬˢ˨˥˚˥˔˦ˣˢ˩˘˥˧˛˘˖ˢ˥˘˖ˢˡ˖˘ˣ˧˦ˢ˙
ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ
Top Cybersecurity Interview Questions
Cybersecurity is the protection given to internet-connected
˦ˬ˦˧˘ˠ˦˟˜˞˘˦ˢ˙˧˪˔˥˘ʟ˛˔˥˗˪˔˥˘ʟ˔ˡ˗˘˟˘˖˧˥ˢˡ˜˖˗˔˧˔ʟ˙˥ˢˠ
˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˖˘˦˦˔ˡ˗˖ˬ˕˘˥ʠ˔˧˧˔˖˞˦ʡ
ʷ˘Ѓˡ˘ʶˬ˕˘˥˦˘˖˨˥˜˧ˬ
1
To prevent Cross-Site Scripting, we can follow a few practices such
˔˦ˈ˦˜ˡ˚˔ˡˋˆˆʻˇˀʿʹ˜˟˧˘˥ʟʸˡ˖ˢ˗˜ˡ˚˦ˣ˘˖˜˔˟˖˛˔˥˔˖˧˘˥˦ʟˈ˦˜ˡ˚
ʴˡ˧˜ʠˋˆˆ˦˘˥˩˜˖˘˦ʢ˧ˢˢ˟˦ʟ˔ˡ˗ˉ˔˟˜˗˔˧˜ˡ˚˨˦˘˥˜ˡˣ˨˧˦ʡ
What can you do to prevent Cross-Site
Scripting
2
Cybersecurity interview questions for freshers like these checks
ˬˢ˨˥˘˫ˣ˘˥˧˜˦˘˜ˡ˔˟˟˧˛˘˖ˢ˥˘˖ˢˡ˖˘ˣ˧˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡʴ˧˛˥˘˔˧˜˦
˪˛˘ˡ˦ˢˠ˘ˢˡ˘˛˔˦˧˛˘ˣˢ˧˘ˡ˧˜˔˟˧ˢ˛˔˥ˠ˧˛˘ˢ˙Ѓ˖˜˔˟˗˔˧˔˧ˢ˔
˦ˬ˦˧˘ˠ˕ˬ˗˔ˠ˔˚˜ˡ˚ˢ˥˗˘˦˧˥ˢˬ˜ˡ˚˜˧ʟ˟˜˞˘˔˃˛˜˦˛˜ˡ˚˔˧˧˔˖˞
Mention the difference between Threat
Vulnerability, and Risk
3
www.infosectrain.com | sales@infosectrain.com
A Botnet basically refers to a group of devices that are internet
˖ˢˡˡ˘˖˧˘˗ʟ˦˨˖˛˔˦˦˘˥˩˘˥˦ʟ˃ʶ˦ʟ˔ˡ˗ˠˢ˕˜˟˘˗˘˩˜˖˘˦˧˛˔˧˖˔ˡ˕˘
˔˙˙˘˖˧˘˗˔ˡ˗˖ˢˡ˧˥ˢ˟˟˘˗˕ˬ˦ˢˠ˘˞˜ˡ˗ˢ˙ˠ˔˟˪˔˥˘ʡˇ˛˘˔˕ˢ˩˘
cybersecurity interview questions for freshers will be asked when
the interviewers want to know about your understanding of the
˕˔˦˜˖˖ˢˡ˖˘ˣ˧˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ
ˉ˨˟ˡ˘˥˔˕˜˟˜˧ˬ˜˦˥˘˙˘˥˥˘˗˧ˢ˔˦˧˛˘˪˘˔˞ˡ˘˦˦˘˦˙ˢ˨ˡ˗˜ˡ˔˦ˬ˦˧˘ˠ
˧˛˔˧˖˔ˡ˖˔˨˦˘ˣˢ˧˘ˡ˧˜˔˟˧˛˥˘˔˧ˢ˨˧˖ˢˠ˘˦ʟ˟˜˞˘ˆ˄ʿ˜ˡ˝˘˖˧˜ˢˡ˦˔ˡ˗
˖˥ˢ˦˦ʠ˦˜˧˘˦˖˥˜ˣ˧˜ˡ˚ʡ˅˜˦˞˥˘˙˘˥˦˧ˢ˧˛˘˗˔ˠ˔˚˘˧˛˔˧˖˔ˡ˕˘˗ˢˡ˘˧ˢ
the data if or when a threat exploits the vulnerability that was
˔˟˥˘˔˗ˬˣ˥˘˦˘ˡ˧ʡ
What is a Botnet
4
ʼˡ˧˥˨˦˜ˢˡʷ˘˧˘˖˧˜ˢˡˆˬ˦˧˘ˠ˦ʛʼʷˆʜ˜˦˔˦˜ˠˣ˟˘ˠˢˡ˜˧ˢ˥˜ˡ˚˦ˬ˦˧˘ˠ
˧˛˔˧˗˘˧˘˖˧˦˜ˡ˧˥˨˦˜ˢˡ˕˨˧˖˔ˡˡˢ˧ˣ˥˘˩˘ˡ˧˜˧ʡʼˡ˧˥˨˦˜ˢˡ˃˥˘˩˘ˡ˧˜ˢˡ
ˆˬ˦˧˘ˠ˦ʛʼ˃ˆʜ˜˦˔˖ˢˡ˧˥ˢ˟˦ˬ˦˧˘ˠ˧˛˔˧˗˘˧˘˖˧˦˔˦˪˘˟˟˔˦ˣ˥˘˩˘ˡ˧˦
˜ˡ˧˥˨˦˜ˢˡʡ
State the difference between IDS and IPS
5
ˌ˘˦ʡʼˡ˙ˢ˥ˠ˔˧˜ˢˡˣ˥ˢ˧˘˖˧˜ˢˡ˨˦˘˦˦˘˖˨˥˜˧ˬ˦ˢ˙˧˪˔˥˘˔ˡ˗˘ˡ˖˥ˬˣ˧˜ˢˡ
˧ˢˣ˥ˢ˧˘˖˧˧˛˘˗˔˧˔˙˥ˢˠ˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˖˘˦˦ʡˊ˛˜˟˘˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ
˔˦˦˨˥˔ˡ˖˘˘ˡ˦˨˥˘˦˔˨˧˛˘ˡ˧˜˖˔˧˜ˢˡʟ˔˩˔˜˟˔˕˜˟˜˧ˬʟ˔ˡ˗˖ˢˡЃ˗˘ˡ˧˜˔˟˜˧ˬ
ˢ˙˗˔˧˔˔ˡ˗˞˘˘ˣ˦˜˧˥˘˟˜˔˕˟˘ʡ
Is there any difference between information
protection and information assurance
6
www.infosectrain.com | sales@infosectrain.com
Cybersecurity interview questions for freshers like these test your
˞ˡˢ˪˟˘˗˚˘ˢˡ˩˔˥˜ˢ˨˦˧˘˖˛ˡ˜˖˔˟˜˧˜˘˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ
˅ʷ˃ˢ˥˅˘ˠˢ˧˘ʷ˘˦˞˧ˢˣ˃˥ˢ˧ˢ˖ˢ˟˜˦˔ˀ˜˖˥ˢ˦ˢ˙˧ˣ˥ˢ˧ˢ˖ˢ˟˧˛˔˧˜˦
˗˘˦˜˚ˡ˘˗˙ˢ˥˧˥˔ˡ˦˙˘˥˦˘˖˨˥˜˧ˬ˔ˡ˗˘ˡ˖˥ˬˣ˧˜ˢˡˢ˙˗˔˧˔ʡˇ˛˜˦˜˦
˜ˠˣ˟˘ˠ˘ˡ˧˘˗˕˘˧˪˘˘ˡ˨˦˘˥˦ʟ˖˟˜˘ˡ˧˗˘˩˜˖˘˦ʟ˔ˡ˗˔˩˜˥˧˨˔˟ˡ˘˧˪ˢ˥˞
˦˘˥˩˘˥ʡ
7
ˇ˛˘˗˘˧˘˖˧˜ˢˡˢ˙˩˨˟ˡ˘˥˔˕˟˘˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˔˦˦˘˧˦˟˜˞˘˖˨˦˧ˢˠ˘˥˗˔˧˔
and hardware, that are prone to cyber-attacks is called cybersecu-
˥˜˧ˬ˥˜˦˞˔˦˦˘˦˦ˠ˘ˡ˧ʡʼ˧˜˦ˣ˥˔˖˧˜˖˘˗˧ˢЃ˚˨˥˘ˢ˨˧˔ˡ˗ˣ˥˜ˢ˥˜˧˜˭˘˥˜˦˞˦
˔˖˥ˢ˦˦˖ˢˠˣ˔ˡ˜˘˦ʡ
What is cybersecurity risk assessment
8
ʴ˙˔˟˦˘ˣˢ˦˜˧˜˩˘˜ˡʼʷˆ˜˦˖ˢˡ˦˜˗˘˥˘˗˔˙˔˟˦˘˔˟˔˥ˠ˧˛˔˧˜˦Ѓ˥˘˗˙ˢ˥
˟˘˚˜˧˜ˠ˔˧˘ˡ˘˧˪ˢ˥˞˔˖˧˜˩˜˧ˬʡ
ʴ˙˔˟˦˘ˡ˘˚˔˧˜˩˘˜˦˖ˢˡ˦˜˗˘˥˘˗˧ˢ˕˘˧˛˘ˠˢ˦˧˖ˢˠˣ˟˜˖˔˧˘˗˦˧˔˧˘
˔ˡ˗ˢ˖˖˨˥˦˪˛˘ˡ˧˛˘ʼʷˆ˙˔˜˟˦˧ˢ˜˗˘ˡ˧˜˙ˬ˔ˡ˗˔˟˘˥˧ˠ˔˟˜˖˜ˢ˨˦
ˡ˘˧˪ˢ˥˞˧˥˔˙Ѓ˖ʡ
What is a false positive and false negative
in IDS
9
ʶˢ˚ˡ˜˧˜˩˘˦˘˖˨˥˜˧ˬ˜˦ˣ˥˜ˠ˔˥˜˟ˬ˔ˡ˔ˣˣ˟˜˖˔˧˜ˢˡˢ˙ʴʼ˧˘˖˛ˡˢ˟ˢ˚ˬ˧˛˔˧
˜˗˘ˡ˧˜Ѓ˘˦˧˛˥˘˔˧˦˔ˡ˗ˣ˥ˢ˧˘˖˧˦˧˛˘ˣ˛ˬ˦˜˖˔˟˔ˡ˗˗˜˚˜˧˔˟˦ˬ˦˧˘ˠ˦ʡʼ˧˜˦
˕˔˦˘˗ˢˡ˛˨ˠ˔ˡ˨ˡ˗˘˥˦˧˔ˡ˗˜ˡ˚ˣ˥ˢ˖˘˦˦˘˦ʡ
What is cognitive security
10
www.infosectrain.com | sales@infosectrain.com
ʷˁˆˢ˥ʷˢˠ˔˜ˡˁ˔ˠ˘ˆˬ˦˧˘ˠˀˢˡ˜˧ˢ˥˜ˡ˚˛˘˟ˣ˦˘ˡ˦˨˥˘˧˛˘
˖ˢˡ˧˜ˡ˨˜˧ˬˢ˙ˣ˥ˢˣ˘˥˧˥˔˙Ѓ˖˥ˢ˨˧˜ˡ˚˧ˢ˦˘˥˩˜˖˘˦ʟ˪˘˕˦˜˧˘˦ʟ˔ˡ˗
˘˟˘˖˧˥ˢˡ˜˖˖ˢˠˠ˨ˡ˜˖˔˧˜ˢˡ˦ʡ
What is the importance of DNS
monitoring
11
ʼʺˀ˃ˢ˥ʼˡ˧˘˥ˡ˘˧ʺ˥ˢ˨ˣˀ˔ˡ˔˚˘ˠ˘ˡ˧˃˥ˢ˧ˢ˖ˢ˟˜˦˔
˖ˢˠˠ˨ˡ˜˖˔˧˜ˢˡˣ˥ˢ˧ˢ˖ˢ˟˨˦˘˗˕ˬ˩˜˗˘ˢˢ˥˚˔ˠ˘˦˧˥˘˔ˠ˜ˡ˚ʡ
What is IGMP
12
These cybersecurity interview questions for freshers target the
˖˔ˡ˗˜˗˔˧˘Ϡ˦˚˥˔˦ˣˢˡ˧˛˘ˡˢ˧˜ˢˡ˦ˢ˙˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˘˖ˢ˦ˬ˦˧˘ˠʡ
ˆˬˠˠ˘˧˥˜˖˘ˡ˖˥ˬˣ˧˜ˢˡ˘ˡ˖˥ˬˣ˧˦˔ˡ˗˗˘˖˥ˬˣ˧˦˨˦˜ˡ˚˧˛˘˦˔ˠ˘˞˘ˬʡ
ʼ˧Ϡ˦ˠ˨˖˛˙˔˦˧˘˥˗˨˘˧ˢ˧˛˘˦˜ˠˣ˟˘˥ˠ˔˧˛˦˜ˡ˩ˢ˟˩˘˗ʡʴ˦ˬˠˠ˘˧˥˜˖
˘ˡ˖˥ˬˣ˧˜ˢˡ˘ˡ˖˥ˬˣ˧˦˔ˡ˗˗˘˖˥ˬˣ˧˦˨˦˜ˡ˚˗˜˙˙˘˥˘ˡ˧˞˘˧˦ʡ
Mention a difference between symmetric
and asymmetric encryption
13
ʶˆ˅ʹˢ˥ʶ˥ˢ˦˦ʠˆ˜˧˘˅˘ˤ˨˘˦˧ʹˢ˥˚˘˥ˬ˜˦˔˩˨˟ˡ˘˥˔˕˜˟˜˧ˬˢ˙˪˘˕
applications where the server goes straight to processing before
˖˛˘˖˞˜ˡ˚˪˛˘˧˛˘˥˔˥˘ˤ˨˘˦˧˛˔˦˖ˢˠ˘˙˥ˢˠ˔˧˥˨˦˧˘˗˖˟˜˘ˡ˧ˢ˥ˡˢ˧ʡ
What is CSRF
14
www.infosectrain.com | sales@infosectrain.com
This cybersecurity interview questions for freshers is asked to
˨˦˨˔˟˟ˬ˖ˢˡ˙˨˦˘˧˛˘˜ˡ˧˘˥˩˜˘˪˘˘ʡʴ˧˜ˣ˙ˢ˥˔ˡ˦˪˘˥˜ˡ˚˜˧˜˦˧ˢ˞˘˘ˣ
˧˛˘˔ˡ˦˪˘˥˩˘˥ˬ˦˜ˠˣ˟˘ʡʴʵ˟˔˖˞˛˔˧˛˔˖˞˘˥˛˔˖˞˦˪˜˧˛ˢ˨˧
˔˨˧˛ˢ˥˜˧ˬʡʴˊ˛˜˧˘˛˔˧˛˔˖˞˘˥ˣ˘˥˙ˢ˥ˠ˦˔ˡ˔˨˧˛ˢ˥˜˭˘˗˛˔˖˞˜ˡ˚
˔˧˧˘ˠˣ˧˨ˡ˗˘˥˦˜˚ˡ˘˗ˁʷʴʡʴʺ˥˘ˬ˛˔˧˛˔˖˞˘˥˜˦˜ˡ˜˧˜˔˟˟ˬ˔˪˛˜˧˘
˛˔˧˛˔˖˞˘˥˪˛ˢˣ˘˥˙ˢ˥ˠ˦˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˧˜˩˜˧˜˘˦˦ˢˠ˘˧˜ˠ˘˦ʡ
What is a Black hat, White hat, and
Grey hat hacker
15
ʴʶʼʴ˧˥˜˔ˡ˚˟˘˥˘˙˘˥˦˧ˢʶˢˡЃ˗˘ˡ˧˜˔˟˜˧ˬʟʼˡ˧˘˚˥˜˧ˬʟ˔ˡ˗ʴ˩˔˜˟˔˕˜˟˜˧ˬʡʼ˧
˜˦˞˘˘ˣ˜ˡ˚˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˦˘˖˥˘˧ʟ˨ˡ˔˟˧˘˥˘˗ʟ˔ˡ˗˔˩˔˜˟˔˕˟˘˔˧˔˟˟
˧˜ˠ˘˦ʡ
What is a CIA triangle
16
ʶˢˠˣ˟˜˔ˡ˖˘˜˦˥˘˙˘˥˥˘˗˧ˢ˧˛˘˙ˢ˟˟ˢ˪˜ˡ˚˔˖˘˥˧˔˜ˡ˦˘˧ˢ˙
˦˧˔ˡ˗˔˥˗˦˔ˡ˗˥˨˟˘˦˧˛˔˧˜˦˦˘˧˕ˬ˔˚ˢ˩˘˥ˡˠ˘ˡ˧ʢʼˡ˗˘ˣ˘ˡ˗˘ˡ˧
ˣ˔˥˧ˬʢˢ˥˚˔ˡ˜˭˔˧˜ˢˡʡ
What is compliance
17
ʹˢ˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥˙˥˘˦˛˘˥˦˟˜˞˘˧˛˘˦˘ʟ˜˧˜˦
best to stay generic as different architecture contains different
ˢ˕˝˘˖˧˦ʡʵ˔˦˜˖˪˘˕˔˥˖˛˜˧˘˖˧˨˥˘˦˛ˢ˨˟˗˖ˢˡ˧˔˜ˡˢ˕˝˘˖˧˦ʟ˜ˡ˖˟˨˗˜ˡ˚
a database server, front-ending server, and a web application
˦˘˥˩˘˥ʡ
Explain the objects of Basic web
architecture
18
www.infosectrain.com | sales@infosectrain.com
ʼ˧˜˦˧˛˘ˣ˥ˢ˖˘˦˦ˢ˙˚˔˧˛˘˥˜ˡ˚˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˔˕ˢ˨˧ˡ˘˧˪ˢ˥˞ʟ˦ˬ˦˧˘ˠʟ
˘˧˖ʡ˕ˬ˦˘ˡ˗˜ˡ˚ˠ˘˦˦˔˚˘˦˔ˡ˗˧˛˘ˡ˔ˡ˔˟ˬ˭˜ˡ˚˧˛˘˥˘˦ˣˢˡ˦˘˦ʡ
ˊ˛˔˧˜˦˗˔˧˔˘˫Ѓ˟˧˥˔˧˜ˢˡ
19
ʻʼʷˆ˜˦˔˛ˢ˦˧˜ˡ˧˥˨˦˜ˢˡ˗˘˧˘˖˧˜ˢˡ˦ˬ˦˧˘ˠ˧˛˔˧˜˦ˣ˟˔˖˘˗ˢˡ˘˔˖˛
˛ˢ˦˧ʡˁʼʷˆ˜˦˔ˡ˘˧˪ˢ˥˞˜ˡ˧˥˨˦˜ˢˡ˗˘˧˘˖˧˜ˢˡ˦ˬ˦˧˘ˠ˧˛˔˧˜˦ˣ˟˔˖˘˗
˜ˡ˧˛˘ˡ˘˧˪ˢ˥˞ʡ
What is HIDS and NIDS
20

More Related Content

Similar to CYBERSECURITY Interview Questions for Freshers.pdf

So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
abnmi
 
Answer each question in one to two paragraphs.Question 1
Answer each question in one to two paragraphs.Question 1Answer each question in one to two paragraphs.Question 1
Answer each question in one to two paragraphs.Question 1
brockdebroah
 

Similar to CYBERSECURITY Interview Questions for Freshers.pdf (20)

Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
 
200 IT Secutiry Job Interview Question
200 IT Secutiry Job Interview Question200 IT Secutiry Job Interview Question
200 IT Secutiry Job Interview Question
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
A Beginner's Guide To Cybersecurity For Startups
A Beginner's Guide To Cybersecurity For StartupsA Beginner's Guide To Cybersecurity For Startups
A Beginner's Guide To Cybersecurity For Startups
 
Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
Answer each question in one to two paragraphs.Question 1
Answer each question in one to two paragraphs.Question 1Answer each question in one to two paragraphs.Question 1
Answer each question in one to two paragraphs.Question 1
 
Infosec
InfosecInfosec
Infosec
 
Infosec
InfosecInfosec
Infosec
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
 
Ethical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth VasavadaEthical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth Vasavada
 
Web Security
Web SecurityWeb Security
Web Security
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
 
Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +
 
CompTIA Security+
CompTIA Security+CompTIA Security+
CompTIA Security+
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Make Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your FavorMake Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your Favor
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 

More from ShivamSharma909

More from ShivamSharma909 (20)

Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
Top 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdfTop 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdf
 
Top 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdfTop 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdf
 
Threat Hunting Professional Online Training Course
Threat Hunting Professional Online Training CourseThreat Hunting Professional Online Training Course
Threat Hunting Professional Online Training Course
 
Why cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fitWhy cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fit
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
 
Top 20 azure interview questions
Top 20 azure interview questionsTop 20 azure interview questions
Top 20 azure interview questions
 
Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questions
 
EC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystEC-Council Certified SOC Analyst
EC-Council Certified SOC Analyst
 
Ctia course outline
Ctia course outlineCtia course outline
Ctia course outline
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application Hacking
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter Hacking
 
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack TechniquesDomain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
 
Domain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance TechniquesDomain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance Techniques
 
Domain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical HackingDomain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical Hacking
 
How is az 303 different from az-304
How is az 303 different from az-304How is az 303 different from az-304
How is az 303 different from az-304
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
 
Cisa domain 4
Cisa domain 4Cisa domain 4
Cisa domain 4
 
Cisa domain 3
Cisa domain 3Cisa domain 3
Cisa domain 3
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

CYBERSECURITY Interview Questions for Freshers.pdf

  • 2. www.infosectrain.com | sales@infosectrain.com Aspiring to start your career in Cybersecurity? Here we bring the top Cybersecurity interview questions for freshers that will help you get your Ѓ˥˦˧˝ˢ˕ʡ ˊ˘˟˜˩˘˜ˡ˦˨˖˛˔ˡ˘˥˔˪˛˘˥˘˘˩˘˥ˬ˧˛˜ˡ˚˜˦˗˜˚˜˧˔˟˜˭˘˗ʡʹ˥ˢˠ˥˘˦˧˔˨˥˔ˡ˧ ˢ˥˗˘˥˦˧ˢ˧˛˘ˣ˨˕˟˜˖˛˘˔˟˧˛˖˔˥˘˦ˬ˦˧˘ˠ˔ˡ˗˘˩˘ˡ˖˥˜˧˜˖˔˟˜ˡ˙ˢ˥ˠ˔˧˜ˢˡˢ˙˔ ˡ˔˧˜ˢˡϠ˦˗˘˙˘ˡ˦˘˦ˬ˦˧˘ˠ˜˦˗˜˚˜˧˔˟˜˭˘˗ʡˊ˜˧˛˨˦˘˥˦˦˧ˢ˥˜ˡ˚ˠ˔˦˦˜˩˘˔ˠˢ˨ˡ˧˦ of data online, it is no doubt that the data is vulnerable to fraudulent ˛˔˖˞˘˥˦ʡ ʼˇʶˢˠˣ˔ˡ˜˘˦˔˥˘ˡˢ˧˜˖˜ˡ˚˧˛˘˖˥˜˧˜˖˔˟˜˧ˬˢ˙˧˛˘˦˜˧˨˔˧˜ˢˡʟ˔ˡ˗˛˘ˡ˖˘ʟ˧˛˘ ˗˘ˠ˔ˡ˗˙ˢ˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬˢ˙Ѓ˖˘˥˦˜˦˥˔ˣ˜˗˟ˬ˜ˡ˖˥˘˔˦˜ˡ˚ʡʷ˨˘˧ˢ˧˛˘ ˜ˡ˖˥˘˔˦˘˜ˡ˗˘ˠ˔ˡ˗ʟ˧˛˘˥˘˜˦˔˟ˢ˧ˢ˙˖ˢˠˣ˘˧˜˧˜ˢˡ˔ˠˢˡ˚˧˛˘˗ˢˠ˔˜ˡʡ
  • 3. www.infosectrain.com | sales@infosectrain.com ʻ˘ˡ˖˘ʟ˜˙ˬˢ˨˪˔ˡ˧˔˝ˢ˕˜ˡʶˬ˕˘˥˦˘˖˨˥˜˧ˬʟˬˢ˨˛˔˩˘˧ˢ˕˘ˢˡ˘ˢ˙˧˛˘˕˘˦˧ʡ ʹ˥˘˦˛˘˥˦˧˛˔˧˚˜˩˘ˤ˨˜˖˞˔ˡ˦˪˘˥˦˧ˢ˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥ ˙˥˘˦˛˘˥˦˚˘˧˔˚ˢˢ˗˛˘˔˗˦˧˔˥˧˙ˢ˥˦˧˔˥˧˜ˡ˚˧˛˘˜˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˖˔˥˘˘˥ʡʼ˧˜˦ ˛˜˚˛˟ˬ˔˗˩˜˦˘˗˧˛˔˧ˬˢ˨ˣ˥˘ˣ˔˥˘˙˥ˢˠ˦˔ˠˣ˟˘˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪ ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥˙˥˘˦˛˘˥˦˧ˢ˜ˠˣ˥ˢ˩˘ˬˢ˨˥˚˥˔˦ˣˢ˩˘˥˧˛˘˖ˢ˥˘˖ˢˡ˖˘ˣ˧˦ˢ˙ ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ Top Cybersecurity Interview Questions Cybersecurity is the protection given to internet-connected ˦ˬ˦˧˘ˠ˦˟˜˞˘˦ˢ˙˧˪˔˥˘ʟ˛˔˥˗˪˔˥˘ʟ˔ˡ˗˘˟˘˖˧˥ˢˡ˜˖˗˔˧˔ʟ˙˥ˢˠ ˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˖˘˦˦˔ˡ˗˖ˬ˕˘˥ʠ˔˧˧˔˖˞˦ʡ ʷ˘Ѓˡ˘ʶˬ˕˘˥˦˘˖˨˥˜˧ˬ 1 To prevent Cross-Site Scripting, we can follow a few practices such ˔˦ˈ˦˜ˡ˚˔ˡˋˆˆʻˇˀʿʹ˜˟˧˘˥ʟʸˡ˖ˢ˗˜ˡ˚˦ˣ˘˖˜˔˟˖˛˔˥˔˖˧˘˥˦ʟˈ˦˜ˡ˚ ʴˡ˧˜ʠˋˆˆ˦˘˥˩˜˖˘˦ʢ˧ˢˢ˟˦ʟ˔ˡ˗ˉ˔˟˜˗˔˧˜ˡ˚˨˦˘˥˜ˡˣ˨˧˦ʡ What can you do to prevent Cross-Site Scripting 2 Cybersecurity interview questions for freshers like these checks ˬˢ˨˥˘˫ˣ˘˥˧˜˦˘˜ˡ˔˟˟˧˛˘˖ˢ˥˘˖ˢˡ˖˘ˣ˧˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡʴ˧˛˥˘˔˧˜˦ ˪˛˘ˡ˦ˢˠ˘ˢˡ˘˛˔˦˧˛˘ˣˢ˧˘ˡ˧˜˔˟˧ˢ˛˔˥ˠ˧˛˘ˢ˙Ѓ˖˜˔˟˗˔˧˔˧ˢ˔ ˦ˬ˦˧˘ˠ˕ˬ˗˔ˠ˔˚˜ˡ˚ˢ˥˗˘˦˧˥ˢˬ˜ˡ˚˜˧ʟ˟˜˞˘˔˃˛˜˦˛˜ˡ˚˔˧˧˔˖˞ Mention the difference between Threat Vulnerability, and Risk 3
  • 4. www.infosectrain.com | sales@infosectrain.com A Botnet basically refers to a group of devices that are internet ˖ˢˡˡ˘˖˧˘˗ʟ˦˨˖˛˔˦˦˘˥˩˘˥˦ʟ˃ʶ˦ʟ˔ˡ˗ˠˢ˕˜˟˘˗˘˩˜˖˘˦˧˛˔˧˖˔ˡ˕˘ ˔˙˙˘˖˧˘˗˔ˡ˗˖ˢˡ˧˥ˢ˟˟˘˗˕ˬ˦ˢˠ˘˞˜ˡ˗ˢ˙ˠ˔˟˪˔˥˘ʡˇ˛˘˔˕ˢ˩˘ cybersecurity interview questions for freshers will be asked when the interviewers want to know about your understanding of the ˕˔˦˜˖˖ˢˡ˖˘ˣ˧˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ ˉ˨˟ˡ˘˥˔˕˜˟˜˧ˬ˜˦˥˘˙˘˥˥˘˗˧ˢ˔˦˧˛˘˪˘˔˞ˡ˘˦˦˘˦˙ˢ˨ˡ˗˜ˡ˔˦ˬ˦˧˘ˠ ˧˛˔˧˖˔ˡ˖˔˨˦˘ˣˢ˧˘ˡ˧˜˔˟˧˛˥˘˔˧ˢ˨˧˖ˢˠ˘˦ʟ˟˜˞˘ˆ˄ʿ˜ˡ˝˘˖˧˜ˢˡ˦˔ˡ˗ ˖˥ˢ˦˦ʠ˦˜˧˘˦˖˥˜ˣ˧˜ˡ˚ʡ˅˜˦˞˥˘˙˘˥˦˧ˢ˧˛˘˗˔ˠ˔˚˘˧˛˔˧˖˔ˡ˕˘˗ˢˡ˘˧ˢ the data if or when a threat exploits the vulnerability that was ˔˟˥˘˔˗ˬˣ˥˘˦˘ˡ˧ʡ What is a Botnet 4 ʼˡ˧˥˨˦˜ˢˡʷ˘˧˘˖˧˜ˢˡˆˬ˦˧˘ˠ˦ʛʼʷˆʜ˜˦˔˦˜ˠˣ˟˘ˠˢˡ˜˧ˢ˥˜ˡ˚˦ˬ˦˧˘ˠ ˧˛˔˧˗˘˧˘˖˧˦˜ˡ˧˥˨˦˜ˢˡ˕˨˧˖˔ˡˡˢ˧ˣ˥˘˩˘ˡ˧˜˧ʡʼˡ˧˥˨˦˜ˢˡ˃˥˘˩˘ˡ˧˜ˢˡ ˆˬ˦˧˘ˠ˦ʛʼ˃ˆʜ˜˦˔˖ˢˡ˧˥ˢ˟˦ˬ˦˧˘ˠ˧˛˔˧˗˘˧˘˖˧˦˔˦˪˘˟˟˔˦ˣ˥˘˩˘ˡ˧˦ ˜ˡ˧˥˨˦˜ˢˡʡ State the difference between IDS and IPS 5 ˌ˘˦ʡʼˡ˙ˢ˥ˠ˔˧˜ˢˡˣ˥ˢ˧˘˖˧˜ˢˡ˨˦˘˦˦˘˖˨˥˜˧ˬ˦ˢ˙˧˪˔˥˘˔ˡ˗˘ˡ˖˥ˬˣ˧˜ˢˡ ˧ˢˣ˥ˢ˧˘˖˧˧˛˘˗˔˧˔˙˥ˢˠ˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˖˘˦˦ʡˊ˛˜˟˘˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ ˔˦˦˨˥˔ˡ˖˘˘ˡ˦˨˥˘˦˔˨˧˛˘ˡ˧˜˖˔˧˜ˢˡʟ˔˩˔˜˟˔˕˜˟˜˧ˬʟ˔ˡ˗˖ˢˡЃ˗˘ˡ˧˜˔˟˜˧ˬ ˢ˙˗˔˧˔˔ˡ˗˞˘˘ˣ˦˜˧˥˘˟˜˔˕˟˘ʡ Is there any difference between information protection and information assurance 6
  • 5. www.infosectrain.com | sales@infosectrain.com Cybersecurity interview questions for freshers like these test your ˞ˡˢ˪˟˘˗˚˘ˢˡ˩˔˥˜ˢ˨˦˧˘˖˛ˡ˜˖˔˟˜˧˜˘˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ ˅ʷ˃ˢ˥˅˘ˠˢ˧˘ʷ˘˦˞˧ˢˣ˃˥ˢ˧ˢ˖ˢ˟˜˦˔ˀ˜˖˥ˢ˦ˢ˙˧ˣ˥ˢ˧ˢ˖ˢ˟˧˛˔˧˜˦ ˗˘˦˜˚ˡ˘˗˙ˢ˥˧˥˔ˡ˦˙˘˥˦˘˖˨˥˜˧ˬ˔ˡ˗˘ˡ˖˥ˬˣ˧˜ˢˡˢ˙˗˔˧˔ʡˇ˛˜˦˜˦ ˜ˠˣ˟˘ˠ˘ˡ˧˘˗˕˘˧˪˘˘ˡ˨˦˘˥˦ʟ˖˟˜˘ˡ˧˗˘˩˜˖˘˦ʟ˔ˡ˗˔˩˜˥˧˨˔˟ˡ˘˧˪ˢ˥˞ ˦˘˥˩˘˥ʡ 7 ˇ˛˘˗˘˧˘˖˧˜ˢˡˢ˙˩˨˟ˡ˘˥˔˕˟˘˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˔˦˦˘˧˦˟˜˞˘˖˨˦˧ˢˠ˘˥˗˔˧˔ and hardware, that are prone to cyber-attacks is called cybersecu- ˥˜˧ˬ˥˜˦˞˔˦˦˘˦˦ˠ˘ˡ˧ʡʼ˧˜˦ˣ˥˔˖˧˜˖˘˗˧ˢЃ˚˨˥˘ˢ˨˧˔ˡ˗ˣ˥˜ˢ˥˜˧˜˭˘˥˜˦˞˦ ˔˖˥ˢ˦˦˖ˢˠˣ˔ˡ˜˘˦ʡ What is cybersecurity risk assessment 8 ʴ˙˔˟˦˘ˣˢ˦˜˧˜˩˘˜ˡʼʷˆ˜˦˖ˢˡ˦˜˗˘˥˘˗˔˙˔˟˦˘˔˟˔˥ˠ˧˛˔˧˜˦Ѓ˥˘˗˙ˢ˥ ˟˘˚˜˧˜ˠ˔˧˘ˡ˘˧˪ˢ˥˞˔˖˧˜˩˜˧ˬʡ ʴ˙˔˟˦˘ˡ˘˚˔˧˜˩˘˜˦˖ˢˡ˦˜˗˘˥˘˗˧ˢ˕˘˧˛˘ˠˢ˦˧˖ˢˠˣ˟˜˖˔˧˘˗˦˧˔˧˘ ˔ˡ˗ˢ˖˖˨˥˦˪˛˘ˡ˧˛˘ʼʷˆ˙˔˜˟˦˧ˢ˜˗˘ˡ˧˜˙ˬ˔ˡ˗˔˟˘˥˧ˠ˔˟˜˖˜ˢ˨˦ ˡ˘˧˪ˢ˥˞˧˥˔˙Ѓ˖ʡ What is a false positive and false negative in IDS 9 ʶˢ˚ˡ˜˧˜˩˘˦˘˖˨˥˜˧ˬ˜˦ˣ˥˜ˠ˔˥˜˟ˬ˔ˡ˔ˣˣ˟˜˖˔˧˜ˢˡˢ˙ʴʼ˧˘˖˛ˡˢ˟ˢ˚ˬ˧˛˔˧ ˜˗˘ˡ˧˜Ѓ˘˦˧˛˥˘˔˧˦˔ˡ˗ˣ˥ˢ˧˘˖˧˦˧˛˘ˣ˛ˬ˦˜˖˔˟˔ˡ˗˗˜˚˜˧˔˟˦ˬ˦˧˘ˠ˦ʡʼ˧˜˦ ˕˔˦˘˗ˢˡ˛˨ˠ˔ˡ˨ˡ˗˘˥˦˧˔ˡ˗˜ˡ˚ˣ˥ˢ˖˘˦˦˘˦ʡ What is cognitive security 10
  • 6. www.infosectrain.com | sales@infosectrain.com ʷˁˆˢ˥ʷˢˠ˔˜ˡˁ˔ˠ˘ˆˬ˦˧˘ˠˀˢˡ˜˧ˢ˥˜ˡ˚˛˘˟ˣ˦˘ˡ˦˨˥˘˧˛˘ ˖ˢˡ˧˜ˡ˨˜˧ˬˢ˙ˣ˥ˢˣ˘˥˧˥˔˙Ѓ˖˥ˢ˨˧˜ˡ˚˧ˢ˦˘˥˩˜˖˘˦ʟ˪˘˕˦˜˧˘˦ʟ˔ˡ˗ ˘˟˘˖˧˥ˢˡ˜˖˖ˢˠˠ˨ˡ˜˖˔˧˜ˢˡ˦ʡ What is the importance of DNS monitoring 11 ʼʺˀ˃ˢ˥ʼˡ˧˘˥ˡ˘˧ʺ˥ˢ˨ˣˀ˔ˡ˔˚˘ˠ˘ˡ˧˃˥ˢ˧ˢ˖ˢ˟˜˦˔ ˖ˢˠˠ˨ˡ˜˖˔˧˜ˢˡˣ˥ˢ˧ˢ˖ˢ˟˨˦˘˗˕ˬ˩˜˗˘ˢˢ˥˚˔ˠ˘˦˧˥˘˔ˠ˜ˡ˚ʡ What is IGMP 12 These cybersecurity interview questions for freshers target the ˖˔ˡ˗˜˗˔˧˘Ϡ˦˚˥˔˦ˣˢˡ˧˛˘ˡˢ˧˜ˢˡ˦ˢ˙˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˘˖ˢ˦ˬ˦˧˘ˠʡ ˆˬˠˠ˘˧˥˜˖˘ˡ˖˥ˬˣ˧˜ˢˡ˘ˡ˖˥ˬˣ˧˦˔ˡ˗˗˘˖˥ˬˣ˧˦˨˦˜ˡ˚˧˛˘˦˔ˠ˘˞˘ˬʡ ʼ˧Ϡ˦ˠ˨˖˛˙˔˦˧˘˥˗˨˘˧ˢ˧˛˘˦˜ˠˣ˟˘˥ˠ˔˧˛˦˜ˡ˩ˢ˟˩˘˗ʡʴ˦ˬˠˠ˘˧˥˜˖ ˘ˡ˖˥ˬˣ˧˜ˢˡ˘ˡ˖˥ˬˣ˧˦˔ˡ˗˗˘˖˥ˬˣ˧˦˨˦˜ˡ˚˗˜˙˙˘˥˘ˡ˧˞˘˧˦ʡ Mention a difference between symmetric and asymmetric encryption 13 ʶˆ˅ʹˢ˥ʶ˥ˢ˦˦ʠˆ˜˧˘˅˘ˤ˨˘˦˧ʹˢ˥˚˘˥ˬ˜˦˔˩˨˟ˡ˘˥˔˕˜˟˜˧ˬˢ˙˪˘˕ applications where the server goes straight to processing before ˖˛˘˖˞˜ˡ˚˪˛˘˧˛˘˥˔˥˘ˤ˨˘˦˧˛˔˦˖ˢˠ˘˙˥ˢˠ˔˧˥˨˦˧˘˗˖˟˜˘ˡ˧ˢ˥ˡˢ˧ʡ What is CSRF 14
  • 7. www.infosectrain.com | sales@infosectrain.com This cybersecurity interview questions for freshers is asked to ˨˦˨˔˟˟ˬ˖ˢˡ˙˨˦˘˧˛˘˜ˡ˧˘˥˩˜˘˪˘˘ʡʴ˧˜ˣ˙ˢ˥˔ˡ˦˪˘˥˜ˡ˚˜˧˜˦˧ˢ˞˘˘ˣ ˧˛˘˔ˡ˦˪˘˥˩˘˥ˬ˦˜ˠˣ˟˘ʡʴʵ˟˔˖˞˛˔˧˛˔˖˞˘˥˛˔˖˞˦˪˜˧˛ˢ˨˧ ˔˨˧˛ˢ˥˜˧ˬʡʴˊ˛˜˧˘˛˔˧˛˔˖˞˘˥ˣ˘˥˙ˢ˥ˠ˦˔ˡ˔˨˧˛ˢ˥˜˭˘˗˛˔˖˞˜ˡ˚ ˔˧˧˘ˠˣ˧˨ˡ˗˘˥˦˜˚ˡ˘˗ˁʷʴʡʴʺ˥˘ˬ˛˔˧˛˔˖˞˘˥˜˦˜ˡ˜˧˜˔˟˟ˬ˔˪˛˜˧˘ ˛˔˧˛˔˖˞˘˥˪˛ˢˣ˘˥˙ˢ˥ˠ˦˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˧˜˩˜˧˜˘˦˦ˢˠ˘˧˜ˠ˘˦ʡ What is a Black hat, White hat, and Grey hat hacker 15 ʴʶʼʴ˧˥˜˔ˡ˚˟˘˥˘˙˘˥˦˧ˢʶˢˡЃ˗˘ˡ˧˜˔˟˜˧ˬʟʼˡ˧˘˚˥˜˧ˬʟ˔ˡ˗ʴ˩˔˜˟˔˕˜˟˜˧ˬʡʼ˧ ˜˦˞˘˘ˣ˜ˡ˚˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˦˘˖˥˘˧ʟ˨ˡ˔˟˧˘˥˘˗ʟ˔ˡ˗˔˩˔˜˟˔˕˟˘˔˧˔˟˟ ˧˜ˠ˘˦ʡ What is a CIA triangle 16 ʶˢˠˣ˟˜˔ˡ˖˘˜˦˥˘˙˘˥˥˘˗˧ˢ˧˛˘˙ˢ˟˟ˢ˪˜ˡ˚˔˖˘˥˧˔˜ˡ˦˘˧ˢ˙ ˦˧˔ˡ˗˔˥˗˦˔ˡ˗˥˨˟˘˦˧˛˔˧˜˦˦˘˧˕ˬ˔˚ˢ˩˘˥ˡˠ˘ˡ˧ʢʼˡ˗˘ˣ˘ˡ˗˘ˡ˧ ˣ˔˥˧ˬʢˢ˥˚˔ˡ˜˭˔˧˜ˢˡʡ What is compliance 17 ʹˢ˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥˙˥˘˦˛˘˥˦˟˜˞˘˧˛˘˦˘ʟ˜˧˜˦ best to stay generic as different architecture contains different ˢ˕˝˘˖˧˦ʡʵ˔˦˜˖˪˘˕˔˥˖˛˜˧˘˖˧˨˥˘˦˛ˢ˨˟˗˖ˢˡ˧˔˜ˡˢ˕˝˘˖˧˦ʟ˜ˡ˖˟˨˗˜ˡ˚ a database server, front-ending server, and a web application ˦˘˥˩˘˥ʡ Explain the objects of Basic web architecture 18