SlideShare a Scribd company logo
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-trainingCYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What do you mean by Cybersecurity?1
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What do you mean by Cybersecurity?1
Cybersecurity is the combination of processes, practices and technologies designed to protect
networks, computers, programs, data and information from attack, damage or unauthorized
access
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What do you have on your home network?2
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What do you have on your home network?2
A Home network gives you a test environment for experimentation. Active Directory Domain
Controller, a dedicated Firewall appliance and a net-attached toaster – as long as you are
learning and fiddling with it, that’s what matters.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is Encryption? Why is it Important?3
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is Encryption? Why is it Important?3
A process of converting data into an unreadable form to prevent unauthorized access and thus
ensuring data protection
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
Tell me the difference between Symmetric and Asymmetric Encryption4
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
Tell me the difference between Symmetric and Asymmetric Encryption4
Basis of Comparison Symmetric Encryption Asymmetric Encryption
Encryption key Single key for both encryption and decryption Uses different keys for encryption and
decryption
Performance Encryption is fast but comparatively more
vulnerable
Encryption is slow due to high
computation
Algorithms DES, 3DES, AES, and RC4 Diffie-Hellman, RSA
Purpose Used for bulk data transmission
Often used for securely exchanging
secret keys
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is CIA triad?5
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is CIA triad?5
The CIA Triad for Information security, provides a baseline standard for evaluating and implementing
information security – irrespective of the system and/or organization in question
Security
Confidentiality
Integrity
Availability
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What do you understand by Risk, Vulnerability & Threat in a Network?6
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What do you understand by Risk, Vulnerability & Threat in a Network?6
Threat refers to someone with the potential to do harm to a system or an organization
Vulnerability refers to a weakness of an asset (resource) that can be exploited by one or more
attackers(threat actors). In other words, it is an issue or bug that allows an attack to be successful
Risk refers to the potential for loss or damage when a threat exploits a vulnerability
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
How do you report Risk?7
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
How do you report Risks?7
➢ Risk needs to be assessed first before it can be reported. There are two ways you can analyse risk: it
can be either Quantitative or Qualitative
➢ This approach is suitable for both technical and business guys
➢ The business guys will see the probable loss in numbers while the technical guys will monitor and
assess the impact and frequency. Depending on the audience, the risk can then be reported
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
How do you differentiate between IPS and IDS system?8
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
How do you differentiate between IPS and IDS system?8
IDS: Intrusion Detection System
IPS: Intrusion Prevention System
IDS just detect the intrusion and leaves the rest to the administrator for assessment and evaluation or
any further action.
IPS detects the intrusion and takes necessary action to further prevent intrusion.
Also, there is a difference in the positioning of devices in the network. Although they work on the
same concept, the placement is different.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What do you know about Cybersecurity Frameworks?9
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What do you know about Cybersecurity Frameworks?9
The Framework is voluntary guidance, based on existing guidelines, and practices for organizations to
better manage and reduce cybersecurity risk.
Most frequently adopted cybersecurity frameworks are: PCI DDS (Payment Card Industry Data Security
Standard), ISO 27001/27002 (International Organization for Standardization), CIS Critical Security
Controls, NIST framework
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is Weak Information Security?10
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is Weak Information Security?10
Information security policy is considered to be weak if it does not meet the criteria of an effective
one. The criteria include: distribution, review, comprehension, compliance, and uniform.
Information security is weak if:
➢ The policy has not been made readily available for review by every employee within the
organization
➢ The organization is unable to demonstrate that employees can review the policy document
➢ The organization is unable to demonstrate that employees understand the content of the policy
document.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What’s the better approach of setting up a firewall?11
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What’s the better approach of setting up a firewall?11
Following are the steps you should take to configure your firewall:
Username/password: modify the default password for your firewall device
Remote Administration: Disable the feature of remote administration from outside the network
Port Forwarding: For certain applications to work properly, such as a Web server or FTP server, you
need to configure appropriate port forwarding
DHCP server: Installing a firewall on a network with an existing DHCP server will cause conflicts
unless the firewall’s DHCP server is disabled
Logging: In order to troubleshoot firewall issues or potential attacks, you want to make sure to
enable logging and understand how to view the logs
Policies: you want to have solid security policies in place and make sure that your firewall is
configured to enforce those policies
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
Can you explain SSL encryption?12
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
Can you explain SSL encryption?12
SSL (Secure Socket Layer) is a protocol which enables safe conversation between two or more parties.
It is designed to identify and verify that the person you are talking to on the other end is who they say
they are.
HTTPS (Hypertext Transfer Protocol Secure) is HTTP combined with SSL which provides you with a
safer browsing experience with encryption. So, this is a very tricky question but SSL wins in terms of
security.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
Which one is more secure SSL or TLS?13
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
Which one is more secure SSL or TLS?13
SSL Is meant to verify the sender’s identity but it doesn’t search for any more hazards than that. SSL
can help you track the person you are talking to but that can also be tricked at times
TLS is another identification tool just like SSL, but it offers better security features. It provides
additional protection to the data and hence SSL and TLS are often used together for better protection
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What are Salted Hashes?14
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What are Salted Hashes?14
Salt is a random data. When a properly protected password system receives a new password, it
creates a hash value of that password, a random salt value, and then the combined value is stored in
its database. This helps defend against dictionary attacks and known hash attacks.
Example: If someone uses the same password on two different systems and they are being used using
the same hashing algo, the hash value would be same, however if even one of the system uses salt
with the hashes, the value will be different
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
How identity theft could be prevented?15
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
How identity theft could be prevented?15
A few steps to follow are:
➢ Ensure strong and unique password
➢ Avoid sharing confidential information online especially on social media
➢ Shop from known and trusted websites
➢ Use the latest version of the browsers
➢ Install advanced malware and spyware tools
➢ Use specialized security solutions against financial data
➢ Always update your system and the software
➢ Protect your SSN (Social Security Number)
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
How can you prevent man in the middle attack?16
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
How can you prevent Man In The Middle (MITM) attack?16
MITM attack happens when a communication between two parties (systems) is intruded or
intercepted by an outside entity.
The first method to prevent this attack would be to have encryption (preferably public key encryption)
between both the parties. This way, they both will have an idea with whom they are talking because of
the digital verification.
Second method, to prevent this, it is best to avoid open Wi-Fi networks and if it is necessary then use
plugins like HTTPS, Forced TLS etc.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
State differences between encoding, hashing and encryption17
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
State differences between encoding, hashing and encryption17
Encoding Hashing Encryption
Converts the data in a desired
format required for exchange
between different systems.
Maintains the integrity of a message
or data. Any change done any day
could be noticed.
ensures that the data is secure and
one needs a digital verification code
or image in order to open or access it
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What steps will you take to secure a server?18
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What steps will you take to secure a server?18
Secure servers use the Secure Sockets Layer (SSL) protocol for data encryption and decryption to
protect data from unauthorized interception.
Here are four simple ways to secure server:
Step 1: make sure that you have a secure password for your root and administrator users
Step 2: The next thing you need to do is make new users on your system. These will be the users you
use to manage the system
Step 3: Remove remote access from the default root/administrator accounts
Step 4: The next step is to configure your firewall rules for remote access
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is a DDoS attack? How is it Mitigated?19
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is a DDoS attack? How is it mitigated?19
DDoS stands for distributed denial of service. When a network is flooded with large number of requests
which is not recognized to handle making the server unavailable to the legitimate requests.
DDoS can be mitigated by analysing and filtering the traffic in the scrubbing centres. The scrubbing
centres are centralized data cleansing station wherein the traffic to a website is analysed and the
malicious traffic is removed.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
Why do you need DNS monitoring?20
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
Why do you need DNS monitoring?20
The Domain Name System allots your website under a certain domain that is easily recognizable and
also keeps the information about other domain names. It works like a directory for everything on the
internet. Thus, DNS monitoring is very important since you can easily visit a website without actually
having to memorise their IP address
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is a three-way handshake?21
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is a three-way handshake?21
The TCP three-way handshake is the method used by TCP set up a TCP/IP connection over an Internet
Protocol based network.
TCP's three way handshaking technique is often referred to as "SYN-SYN-ACK" (or more accurately SYN,
SYN-ACK, ACK) because there are three messages transmitted by TCP to negotiate and start a TCP
session between two computers.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What are the Black hat, white hat and grey hat hackers?22
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What are the Black hat, white hat and grey hat hackers?22
Black hat hackers are those who hack without authority.
White hat hackers are authorised to perform a hacking attempt under signed NDA
Grey hat hackers are white hat hackers which sometimes perform unauthorised activities.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
How often should you perform Patch management?23
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
How often should you perform Patch management?23
Patch manage should be done as soon as it is released. For windows, once the patch is released it
should be applied to all machines not later than one month. Same goes for network devices, patch it as
soon as it is released. Proper patch management process should be followed.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What do you know about application security?24
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What do you know about application security?24
Application security is the practice of improving the security of applications using software, hardware
and other procedural methods.
Countermeasures are taken to ensure application security, the most common being an application
firewall that limits the execution of files or the handling of data by specific installed programs.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
Differentiate between penetration testing and software testing?25
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
Differentiate between penetration testing and software testing?25
Penetration Testing Software Testing
Help identify and address the security
vulnerabilities
Focuses on the functionality of the
software and not the security aspect
A good Penetration Tester truly thinks
differently than the other two ... they
don't care about the proper behaviours of
the system/software ... they are crafty,
looking for that one small chink of
vulnerability that was not mitigated
Software Security Tester generally have a
fair amount of cross-over, as they usually
know the full details of the
system/software, they know how its
supposed to properly behave when
properly used, and they can test for a lot
of common end-user misbehaviours
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
When to use tracert/traceroute?26
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
When to use tracert/traceroute?26
Small TTL values are transmitted through packets via traceroute. This prevents the packets from getting
into loops. In case you can’t ping the final destination, tracert will help to identify where the connection
stops or gets broken, whether it is firewall, ISP, router etc.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
Tell me about some common Cyber Threats27
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
Tell me about some common Cyber Threats27
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What are different OSI layers? What is the job of Network layer?28
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What are different OSI layers? What is the job of Network layer?28
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Physical Layer
Data Link Layer
Network layer controls the
operation of the subnet. The main
job of this layer is to deliver
packets from source to destination
across multiple links.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
How would you reset a password-protected BIOS configuration?29
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
How would you reset a password-protected BIOS configuration?29
Since BIOS is a pre boot system it has its own storage mechanism for its settings and preferences. In
the classic scenario, simply popping out the CMOS (complementary metal-oxide-semiconductor)
battery will be enough to have the memory storing these settings lose its power supply, and as a result
it will lose its settings.
The simplest way by far however is this: if the BIOS has come from the factory with a default password
enabled, try ‘password’.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is Cross Site Scripting or XSS?30
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is Cross Site Scripting or XSS?30
➢ XSS refers to client-side code injection attack wherein an attacker can execute malicious into a
legitimate website or web application
➢ XSS is amongst the most rampant of web application vulnerabilities and occurs when a web
application makes use of unvalidated or unencoded user input within the output it generates
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is data protection in transit vs data protection at rest?31
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is data protection in transit vs data protection at rest?31
Data Protection in transit Data protection at rest
This when data is going from server to
client
This is when data is just sitting there in its
database or on its hard drive
Effective Data protection measures for in
transit data are critical as data is less
secure when in motion
Data at rest is sometimes considered to be
less vulnerable than data in transit,
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
Tell me the differences between Cybersecurity and Network Security?32
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
Tell me the differences between Cybersecurity and Network Security?32
Cybersecurity Network Security
describes that the policies and procedures
implemented by a network administrator to avoid
and keep track of unauthorized access,
exploitation, modification, or denial of the network
and network resources
processes and practices designed to protect
networks, computers, programs and data from
attack, damage or unauthorized access. In a
computing context, security includes both cyber
security and physical security
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
How will you prevent data leakage?33
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
How will you prevent data leakage?33
➢ Data leakage is when data gets out of the organisation in an unauthorised way
➢ Data can get leaked through various ways – emails, prints, laptops getting lost, unauthorised upload
of data to public portals, removable drives, photographs etc
➢ a few controls can be restricting upload on internet websites, following an internal encryption
solution, restricting the mails to internal network, restriction on printing confidential data etc.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is an ARP and how does it work?34
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is an ARP and how does it work?34
➢ Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP
address) to a physical machine address that is recognized in the local network.
How it works?
➢ When an incoming packet destined for a host machine on a particular local area network arrives at
a gateway, the gateway asks the ARP program to find a physical host or MAC address that matches
the IP address
➢ The ARP program looks in the ARP cache and, if it finds the address, provides it so that the packet
can be converted to the right packet length and format and sent to the machine
➢ If no entry is found for the IP address, ARP broadcasts a request packet in a special format to all the
machines on the LAN to see if one machine knows that it has that IP address associated with it.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is 2FA and how can it be implemented for the public websites?35
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is 2FA and how can it be implemented for the public websites?35
➢ An extra layer of security that is known as "multi factor authentication“
➢ Requires not only a password and username but also something that only, and only, that user has on
them, i.e. a piece of information only they should know or have immediately to hand - such as a
physical token
➢ Authenticator apps replace the need to obtain a verification code via text, voice call or email
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What techniques can be used to prevent brute force login attack?36
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What techniques can be used to prevent brute force login attack?36
➢ Here, the attacker tries to determine the password for a target (service/system/device) through a
permutation or fuzzing process
➢ As it is a lengthy task, attackers usually employ a software such as fuzzer, to automate the process of
creating numerous passwords to be tested against a target
➢ In order to avoid such attacks – password best practices should be followed, mainly on critical
resources like servers, routers, exposed services and so on
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is Cognitive Cybersecurity?37
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is Cognitive Cybersecurity?37
➢ application of AI technologies patterned on human thought processes to detect threats and protect
physical and digital systems
➢ Self-learning security systems use data mining, pattern recognition and natural language processing
to simulate the human brain, albeit in a high-powered computer model
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is port blocking within LAN?38
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is port blocking within LAN?38
➢ Restricting the users from accessing a set of services within the local area network is called port
blocking
➢ Stopping the source to not to access the destination node via ports as application works on the ports
so ports are blocked to restricts the access filling up the security holes in the network infrastructure
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is the difference between VPN and VLAN?39
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What is the difference between VPN and VLAN?39
VPN VLAN
related to remote access to the network of a
company
helps to group workstations that are not within
the same locations into the same broadcast
domain
used to connect two points in a secured and
encrypted tunnel.
basically a means to logically segregate
networks without physically segregating them
with various switches
saves the data from prying eyes while in transit
and no one on the net can capture the packets
and read the data
does not involve any encryption technique but
it is only used to slice up your logical network
into different sections for the purpose of
management and security
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What protocols falls under TCP/IP internet layer?40
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Interview Questions
What protocols falls under TCP/IP internet layer?40
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-trainingCYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions
Scenario 1You receive the following email from the Help Desk:
Dear UCSC Email User,
Beginning next week, we will be deleting all inactive email accounts in order to create space for more users. You are required to send the
following information to continue using your email account. If we do not receive this information from you by the end of the week, your
email account will be closed.
• Name (first and last):
• Email Login:
• Password:
• Date of birth:
• Alternate email:
Please contact the Webmail Team with any questions. Thank you for your immediate attention.
What do you do? Justify your actions.1
Scenario 1
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions: Answer
➢ This email is a classic example of “phishing” – trying to trick
you into “biting”. The justification is the generalised way of
addressing the receiver which is used in mass spam mails.
➢ Above that a corporate company will never ask personal
details on mail
➢ They want your information. Don't respond to email, instant
messages (IM), texts, phone calls, etc., asking you for your
password or other private information.
➢ You should never disclose your password to anyone, even if
they say they work for UCSC, ITS, or other campus
organizations.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions
Scenario 1A friend sends an electronic Hallmark greeting card (e-card) to your work email. You need to click on the
attachment to see the card.
What do you do? Justify your actions.2
Scenario 2
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions: Answer
This one has four big risks:
➢ 1. Some attachments contain viruses or other malicious
programs, so just in general, it’s risky to open unknown or
unsolicited attachments.
➢ 2. Also, in some cases just clicking on a malicious link can
infect a computer, so unless you are sure a link is safe, don’t
click on it.
➢ 3. Email addresses can be faked, so just because the email
says it is from someone you know, you can’t be certain of this
without checking with the person.
➢ 4. Finally, some websites and links look legitimate, but they’re
really hoaxes designed to steal your information.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions
Scenario 1One of the staff members in ITS subscribes to a number of free IT magazines.
Among the questions she was asked in order to activate her subscriptions, one magazine asked for her month of birth,
a second asked for her year of birth, and a third asked for her mother's maiden name.
What do you infer is going on in this situation? Justify.3
Scenario 3
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions: Answer
➢ All three newsletters probably have the same parent company
or are distributed through the same service. The parent
company or service can combine individual pieces of
seemingly-harmless information and use or sell it for identity
theft
➢ It is even possible that there is a fourth newsletter that asks
for day of birth as one of the activation questions
➢ Often questions about personal information are optional. In
addition to being suspicious about situations like the one
described here, never provide personal information when it is
not legitimately necessary, or to people or companies you
don’t personally know.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions
Scenario 1In our computing labs and departments, print billing is often tied to the user's login. People login, they print,
they (or their department) get a bill.
Sometimes people call to complain about bills for printing they never did only to find out that the bills are, indeed, correct.
What do you infer is going on in this situation? Justify.4
Scenario 4
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions: Answer
➢ Sometimes they realize they loaned their account to a friend
who couldn't remember his/her password, and the friend did
the printing. Thus the charges. It’s also possible that
somebody came in behind them and used their account
➢ This is an issue with shared or public computers in general. If
you don’t log out of the computer properly when you leave,
someone else can come in behind you and retrieve what you
were doing, use your accounts, etc. Always log out of all
accounts, quit programs, and close browser windows before
you walk away.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions
Scenario 1We saw a case a while back where someone used their yahoo account at a computer lab on campus. She made sure
her yahoo account
was no longer open in the browser window before leaving the lab. Someone came in behind her and used the same
browser to re-access her account.
They started sending emails from it and caused all sorts of mayhem.
What do you think might be going on here?5
Scenario 5
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions: Answer
➢ The first person probably didn't log out of her account, so the
new person could just go to history and access her account.
➢ Another possibility is that she did log out, but didn’t clear her
web cache. (This is done through the browser menu to clear
pages that the browser has saved for future use.)
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions
Scenario 1Two different offices on campus are working to straighten out an error in an employee’s bank account due to a
direct deposit mistake.
Office #1 emails the correct account and deposit information to office #2, which promptly fixes the problem.
The employee confirms with the bank that everything has, indeed, been straightened out.
What is wrong here?6
Scenario 6
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions: Answer
➢ Account and deposit information is sensitive data that could
be used for identity theft. Sending this or any kind of sensitive
information by email is very risky because email is typically
not private or secure. Anyone who knows how can access it
anywhere along its route.
➢ As an alternative, the two offices could have called each other
or worked with ITS to send the information a more secure
way.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions
Scenario 1The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do?
a) Call your co-workers over so they can see
b) Disconnect your computer from the network
c) Unplug your mouse
d) Tell your supervisor
e) Turn your computer off
f) Run anti-virus
g) All of the above
Select all the options that apply.7
Scenario 7
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions: Answer
Right answer is B & D.
➢ This is definitely suspicious. Immediately report the problem
to your supervisor and the ITS Support Center:
itrequest.ucsc.edu, 459-HELP (4357), help@ucsc.edu or Kerr
Hall room 54, M-F 8AM-5PM
➢ Also, since it seems possible that someone is controlling the
computer remotely, it is best if you can disconnect the
computer from the network (and turn off wireless if you have
it) until help arrives. If possible, don’t turn off the computer.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions
Scenario 1Below are a list of passwords pulled out a database.
A. @#$)*&^%
B. akHGksmLN
C. UcSc4Evr!
D. Password1
Which of the following passwords meets UCSC’s
password requirements?
8
Scenario 8
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions: Answer
Answer is UcSc4Evr!
➢ This is the only choice that meets all of the following UCSC
requirements:
➢ At least 8 characters in length
➢ Contains at least 3 of the following 4 types of characters:
lower case letters, upper case letters, numbers, special
characters
➢ Not a word preceded or followed by a digit
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions
Scenario 1You receive an email from your bank telling you there is a problem with your account. The email provides instructions
and a link so you can log in
to your account and fix the problem.
What should you do?9
Scenario 9
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions: Answer
➢ Delete the email. Better yet, use the web client (e.g. gmail,
yahoo mail, etc.) and report it as spam or phishing, then
delete it.
➢ Any unsolicited email or phone call asking you to enter your
account information, disclose your password, financial
account information, social security number, or other personal
or private information is suspicious – even if it appears to be
from a company you are familiar with. Always contact the
sender using a method you know is legitimate to verify that
the message is from them.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions
Scenario 1A while back, the IT folks got a number of complaints that one of our campus computers was sending out Viagra spam.
They checked it out, and the reports were true: a hacker had installed a program on the computer that made it automatically
send out tons of spam email without the computer owner’s knowledge.
How do you think the hacker got into the
computer to set this up?
10
Scenario 10
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Scenario Based Cybersecurity Questions: Answer
➢ This was actually the result of a hacked password. Using
passwords that can't be easily guessed, and protecting your
passwords by not sharing them or writing them down can
help to prevent this. Passwords should be at least 8 characters
in length and use a mixture of upper and lower case letters,
numbers, and symbols.
➢ Even though in this case it was a hacked password, other
things that could possibly lead to this are:
➢ Out of date patches/updates
➢ No anti-virus software or out of date anti-virus software
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training

More Related Content

What's hot

NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
Priyanka Aash
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
Sameer Paradia
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
Temok IT Services
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
DexterJanPineda
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
Security architecture
Security architectureSecurity architecture
Security architecture
Duncan Unwin
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
Priyanshu Ratnakar
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
Ahmed Ayman
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
Muhammad Sahputra
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
Harsh Bhanushali
 
Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud Computing
Keet Sugathadasa
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
Cloudflare
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
SandeepK707540
 

What's hot (20)

NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud Computing
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
 

Similar to Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips | Edureka

Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
ShivamSharma909
 
Cybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdfCybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdf
infosec train
 
craw-security-services.pdf
craw-security-services.pdfcraw-security-services.pdf
craw-security-services.pdf
RohitParashar33
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
Jennifer Mary
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
infosec train
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
CRAW CYBER SECURITY PVT LTD
 
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptxCompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
Infosectrain3
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51
martinvoelk
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
infosec train
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
Infosectrain3
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
Moshe Ferber
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3
CCG
 
Security
SecuritySecurity
Security
Zuko Lopez
 
Top cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptxTop cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptx
infosec train
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
Lucideus Tech
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
Brianna Johnson
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
Sneha .
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
Infosectrain3
 
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
United Security Providers AG
 

Similar to Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips | Edureka (20)

Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
 
Cybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdfCybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdf
 
craw-security-services.pdf
craw-security-services.pdfcraw-security-services.pdf
craw-security-services.pdf
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
 
CCSK.pptx
CCSK.pptxCCSK.pptx
CCSK.pptx
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
 
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptxCompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3
 
Security
SecuritySecurity
Security
 
Top cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptxTop cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptx
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
 

More from Edureka!

What to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | EdurekaWhat to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | Edureka
Edureka!
 
Top 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | EdurekaTop 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | Edureka
Edureka!
 
Top 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | EdurekaTop 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | Edureka
Edureka!
 
Tableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | EdurekaTableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | Edureka
Edureka!
 
Python Programming Tutorial | Edureka
Python Programming Tutorial | EdurekaPython Programming Tutorial | Edureka
Python Programming Tutorial | Edureka
Edureka!
 
Top 5 PMP Certifications | Edureka
Top 5 PMP Certifications | EdurekaTop 5 PMP Certifications | Edureka
Top 5 PMP Certifications | Edureka
Edureka!
 
Top Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | EdurekaTop Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | Edureka
Edureka!
 
Linux Mint Tutorial | Edureka
Linux Mint Tutorial | EdurekaLinux Mint Tutorial | Edureka
Linux Mint Tutorial | Edureka
Edureka!
 
How to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| EdurekaHow to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| Edureka
Edureka!
 
Importance of Digital Marketing | Edureka
Importance of Digital Marketing | EdurekaImportance of Digital Marketing | Edureka
Importance of Digital Marketing | Edureka
Edureka!
 
RPA in 2020 | Edureka
RPA in 2020 | EdurekaRPA in 2020 | Edureka
RPA in 2020 | Edureka
Edureka!
 
Email Notifications in Jenkins | Edureka
Email Notifications in Jenkins | EdurekaEmail Notifications in Jenkins | Edureka
Email Notifications in Jenkins | Edureka
Edureka!
 
EA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | EdurekaEA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | Edureka
Edureka!
 
Cognitive AI Tutorial | Edureka
Cognitive AI Tutorial | EdurekaCognitive AI Tutorial | Edureka
Cognitive AI Tutorial | Edureka
Edureka!
 
AWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | EdurekaAWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | Edureka
Edureka!
 
Blue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | EdurekaBlue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | Edureka
Edureka!
 
Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka
Edureka!
 
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaA star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
Edureka!
 
Kubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | EdurekaKubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | Edureka
Edureka!
 
Introduction to DevOps | Edureka
Introduction to DevOps | EdurekaIntroduction to DevOps | Edureka
Introduction to DevOps | Edureka
Edureka!
 

More from Edureka! (20)

What to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | EdurekaWhat to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | Edureka
 
Top 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | EdurekaTop 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | Edureka
 
Top 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | EdurekaTop 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | Edureka
 
Tableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | EdurekaTableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | Edureka
 
Python Programming Tutorial | Edureka
Python Programming Tutorial | EdurekaPython Programming Tutorial | Edureka
Python Programming Tutorial | Edureka
 
Top 5 PMP Certifications | Edureka
Top 5 PMP Certifications | EdurekaTop 5 PMP Certifications | Edureka
Top 5 PMP Certifications | Edureka
 
Top Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | EdurekaTop Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | Edureka
 
Linux Mint Tutorial | Edureka
Linux Mint Tutorial | EdurekaLinux Mint Tutorial | Edureka
Linux Mint Tutorial | Edureka
 
How to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| EdurekaHow to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| Edureka
 
Importance of Digital Marketing | Edureka
Importance of Digital Marketing | EdurekaImportance of Digital Marketing | Edureka
Importance of Digital Marketing | Edureka
 
RPA in 2020 | Edureka
RPA in 2020 | EdurekaRPA in 2020 | Edureka
RPA in 2020 | Edureka
 
Email Notifications in Jenkins | Edureka
Email Notifications in Jenkins | EdurekaEmail Notifications in Jenkins | Edureka
Email Notifications in Jenkins | Edureka
 
EA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | EdurekaEA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | Edureka
 
Cognitive AI Tutorial | Edureka
Cognitive AI Tutorial | EdurekaCognitive AI Tutorial | Edureka
Cognitive AI Tutorial | Edureka
 
AWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | EdurekaAWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | Edureka
 
Blue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | EdurekaBlue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | Edureka
 
Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka
 
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaA star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
 
Kubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | EdurekaKubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | Edureka
 
Introduction to DevOps | Edureka
Introduction to DevOps | EdurekaIntroduction to DevOps | Edureka
Introduction to DevOps | Edureka
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips | Edureka

  • 1. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
  • 2. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-trainingCYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
  • 3. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What do you mean by Cybersecurity?1
  • 4. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What do you mean by Cybersecurity?1 Cybersecurity is the combination of processes, practices and technologies designed to protect networks, computers, programs, data and information from attack, damage or unauthorized access
  • 5. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What do you have on your home network?2
  • 6. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What do you have on your home network?2 A Home network gives you a test environment for experimentation. Active Directory Domain Controller, a dedicated Firewall appliance and a net-attached toaster – as long as you are learning and fiddling with it, that’s what matters.
  • 7. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is Encryption? Why is it Important?3
  • 8. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is Encryption? Why is it Important?3 A process of converting data into an unreadable form to prevent unauthorized access and thus ensuring data protection
  • 9. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions Tell me the difference between Symmetric and Asymmetric Encryption4
  • 10. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions Tell me the difference between Symmetric and Asymmetric Encryption4 Basis of Comparison Symmetric Encryption Asymmetric Encryption Encryption key Single key for both encryption and decryption Uses different keys for encryption and decryption Performance Encryption is fast but comparatively more vulnerable Encryption is slow due to high computation Algorithms DES, 3DES, AES, and RC4 Diffie-Hellman, RSA Purpose Used for bulk data transmission Often used for securely exchanging secret keys
  • 11. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is CIA triad?5
  • 12. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is CIA triad?5 The CIA Triad for Information security, provides a baseline standard for evaluating and implementing information security – irrespective of the system and/or organization in question Security Confidentiality Integrity Availability
  • 13. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What do you understand by Risk, Vulnerability & Threat in a Network?6
  • 14. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What do you understand by Risk, Vulnerability & Threat in a Network?6 Threat refers to someone with the potential to do harm to a system or an organization Vulnerability refers to a weakness of an asset (resource) that can be exploited by one or more attackers(threat actors). In other words, it is an issue or bug that allows an attack to be successful Risk refers to the potential for loss or damage when a threat exploits a vulnerability
  • 15. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions How do you report Risk?7
  • 16. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions How do you report Risks?7 ➢ Risk needs to be assessed first before it can be reported. There are two ways you can analyse risk: it can be either Quantitative or Qualitative ➢ This approach is suitable for both technical and business guys ➢ The business guys will see the probable loss in numbers while the technical guys will monitor and assess the impact and frequency. Depending on the audience, the risk can then be reported
  • 17. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions How do you differentiate between IPS and IDS system?8
  • 18. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions How do you differentiate between IPS and IDS system?8 IDS: Intrusion Detection System IPS: Intrusion Prevention System IDS just detect the intrusion and leaves the rest to the administrator for assessment and evaluation or any further action. IPS detects the intrusion and takes necessary action to further prevent intrusion. Also, there is a difference in the positioning of devices in the network. Although they work on the same concept, the placement is different.
  • 19. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What do you know about Cybersecurity Frameworks?9
  • 20. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What do you know about Cybersecurity Frameworks?9 The Framework is voluntary guidance, based on existing guidelines, and practices for organizations to better manage and reduce cybersecurity risk. Most frequently adopted cybersecurity frameworks are: PCI DDS (Payment Card Industry Data Security Standard), ISO 27001/27002 (International Organization for Standardization), CIS Critical Security Controls, NIST framework
  • 21. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is Weak Information Security?10
  • 22. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is Weak Information Security?10 Information security policy is considered to be weak if it does not meet the criteria of an effective one. The criteria include: distribution, review, comprehension, compliance, and uniform. Information security is weak if: ➢ The policy has not been made readily available for review by every employee within the organization ➢ The organization is unable to demonstrate that employees can review the policy document ➢ The organization is unable to demonstrate that employees understand the content of the policy document.
  • 23. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What’s the better approach of setting up a firewall?11
  • 24. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What’s the better approach of setting up a firewall?11 Following are the steps you should take to configure your firewall: Username/password: modify the default password for your firewall device Remote Administration: Disable the feature of remote administration from outside the network Port Forwarding: For certain applications to work properly, such as a Web server or FTP server, you need to configure appropriate port forwarding DHCP server: Installing a firewall on a network with an existing DHCP server will cause conflicts unless the firewall’s DHCP server is disabled Logging: In order to troubleshoot firewall issues or potential attacks, you want to make sure to enable logging and understand how to view the logs Policies: you want to have solid security policies in place and make sure that your firewall is configured to enforce those policies
  • 25. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions Can you explain SSL encryption?12
  • 26. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions Can you explain SSL encryption?12 SSL (Secure Socket Layer) is a protocol which enables safe conversation between two or more parties. It is designed to identify and verify that the person you are talking to on the other end is who they say they are. HTTPS (Hypertext Transfer Protocol Secure) is HTTP combined with SSL which provides you with a safer browsing experience with encryption. So, this is a very tricky question but SSL wins in terms of security.
  • 27. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions Which one is more secure SSL or TLS?13
  • 28. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions Which one is more secure SSL or TLS?13 SSL Is meant to verify the sender’s identity but it doesn’t search for any more hazards than that. SSL can help you track the person you are talking to but that can also be tricked at times TLS is another identification tool just like SSL, but it offers better security features. It provides additional protection to the data and hence SSL and TLS are often used together for better protection
  • 29. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What are Salted Hashes?14
  • 30. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What are Salted Hashes?14 Salt is a random data. When a properly protected password system receives a new password, it creates a hash value of that password, a random salt value, and then the combined value is stored in its database. This helps defend against dictionary attacks and known hash attacks. Example: If someone uses the same password on two different systems and they are being used using the same hashing algo, the hash value would be same, however if even one of the system uses salt with the hashes, the value will be different
  • 31. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions How identity theft could be prevented?15
  • 32. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions How identity theft could be prevented?15 A few steps to follow are: ➢ Ensure strong and unique password ➢ Avoid sharing confidential information online especially on social media ➢ Shop from known and trusted websites ➢ Use the latest version of the browsers ➢ Install advanced malware and spyware tools ➢ Use specialized security solutions against financial data ➢ Always update your system and the software ➢ Protect your SSN (Social Security Number)
  • 33. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions How can you prevent man in the middle attack?16
  • 34. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions How can you prevent Man In The Middle (MITM) attack?16 MITM attack happens when a communication between two parties (systems) is intruded or intercepted by an outside entity. The first method to prevent this attack would be to have encryption (preferably public key encryption) between both the parties. This way, they both will have an idea with whom they are talking because of the digital verification. Second method, to prevent this, it is best to avoid open Wi-Fi networks and if it is necessary then use plugins like HTTPS, Forced TLS etc.
  • 35. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions State differences between encoding, hashing and encryption17
  • 36. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions State differences between encoding, hashing and encryption17 Encoding Hashing Encryption Converts the data in a desired format required for exchange between different systems. Maintains the integrity of a message or data. Any change done any day could be noticed. ensures that the data is secure and one needs a digital verification code or image in order to open or access it
  • 37. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What steps will you take to secure a server?18
  • 38. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What steps will you take to secure a server?18 Secure servers use the Secure Sockets Layer (SSL) protocol for data encryption and decryption to protect data from unauthorized interception. Here are four simple ways to secure server: Step 1: make sure that you have a secure password for your root and administrator users Step 2: The next thing you need to do is make new users on your system. These will be the users you use to manage the system Step 3: Remove remote access from the default root/administrator accounts Step 4: The next step is to configure your firewall rules for remote access
  • 39. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is a DDoS attack? How is it Mitigated?19
  • 40. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is a DDoS attack? How is it mitigated?19 DDoS stands for distributed denial of service. When a network is flooded with large number of requests which is not recognized to handle making the server unavailable to the legitimate requests. DDoS can be mitigated by analysing and filtering the traffic in the scrubbing centres. The scrubbing centres are centralized data cleansing station wherein the traffic to a website is analysed and the malicious traffic is removed.
  • 41. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions Why do you need DNS monitoring?20
  • 42. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions Why do you need DNS monitoring?20 The Domain Name System allots your website under a certain domain that is easily recognizable and also keeps the information about other domain names. It works like a directory for everything on the internet. Thus, DNS monitoring is very important since you can easily visit a website without actually having to memorise their IP address
  • 43. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is a three-way handshake?21
  • 44. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is a three-way handshake?21 The TCP three-way handshake is the method used by TCP set up a TCP/IP connection over an Internet Protocol based network. TCP's three way handshaking technique is often referred to as "SYN-SYN-ACK" (or more accurately SYN, SYN-ACK, ACK) because there are three messages transmitted by TCP to negotiate and start a TCP session between two computers.
  • 45. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What are the Black hat, white hat and grey hat hackers?22
  • 46. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What are the Black hat, white hat and grey hat hackers?22 Black hat hackers are those who hack without authority. White hat hackers are authorised to perform a hacking attempt under signed NDA Grey hat hackers are white hat hackers which sometimes perform unauthorised activities.
  • 47. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions How often should you perform Patch management?23
  • 48. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions How often should you perform Patch management?23 Patch manage should be done as soon as it is released. For windows, once the patch is released it should be applied to all machines not later than one month. Same goes for network devices, patch it as soon as it is released. Proper patch management process should be followed.
  • 49. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What do you know about application security?24
  • 50. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What do you know about application security?24 Application security is the practice of improving the security of applications using software, hardware and other procedural methods. Countermeasures are taken to ensure application security, the most common being an application firewall that limits the execution of files or the handling of data by specific installed programs.
  • 51. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions Differentiate between penetration testing and software testing?25
  • 52. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions Differentiate between penetration testing and software testing?25 Penetration Testing Software Testing Help identify and address the security vulnerabilities Focuses on the functionality of the software and not the security aspect A good Penetration Tester truly thinks differently than the other two ... they don't care about the proper behaviours of the system/software ... they are crafty, looking for that one small chink of vulnerability that was not mitigated Software Security Tester generally have a fair amount of cross-over, as they usually know the full details of the system/software, they know how its supposed to properly behave when properly used, and they can test for a lot of common end-user misbehaviours
  • 53. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions When to use tracert/traceroute?26
  • 54. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions When to use tracert/traceroute?26 Small TTL values are transmitted through packets via traceroute. This prevents the packets from getting into loops. In case you can’t ping the final destination, tracert will help to identify where the connection stops or gets broken, whether it is firewall, ISP, router etc.
  • 55. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions Tell me about some common Cyber Threats27
  • 56. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions Tell me about some common Cyber Threats27
  • 57. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What are different OSI layers? What is the job of Network layer?28
  • 58. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What are different OSI layers? What is the job of Network layer?28 Application Layer Presentation Layer Session Layer Transport Layer Network Layer Physical Layer Data Link Layer Network layer controls the operation of the subnet. The main job of this layer is to deliver packets from source to destination across multiple links.
  • 59. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions How would you reset a password-protected BIOS configuration?29
  • 60. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions How would you reset a password-protected BIOS configuration?29 Since BIOS is a pre boot system it has its own storage mechanism for its settings and preferences. In the classic scenario, simply popping out the CMOS (complementary metal-oxide-semiconductor) battery will be enough to have the memory storing these settings lose its power supply, and as a result it will lose its settings. The simplest way by far however is this: if the BIOS has come from the factory with a default password enabled, try ‘password’.
  • 61. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is Cross Site Scripting or XSS?30
  • 62. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is Cross Site Scripting or XSS?30 ➢ XSS refers to client-side code injection attack wherein an attacker can execute malicious into a legitimate website or web application ➢ XSS is amongst the most rampant of web application vulnerabilities and occurs when a web application makes use of unvalidated or unencoded user input within the output it generates
  • 63. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is data protection in transit vs data protection at rest?31
  • 64. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is data protection in transit vs data protection at rest?31 Data Protection in transit Data protection at rest This when data is going from server to client This is when data is just sitting there in its database or on its hard drive Effective Data protection measures for in transit data are critical as data is less secure when in motion Data at rest is sometimes considered to be less vulnerable than data in transit,
  • 65. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions Tell me the differences between Cybersecurity and Network Security?32
  • 66. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions Tell me the differences between Cybersecurity and Network Security?32 Cybersecurity Network Security describes that the policies and procedures implemented by a network administrator to avoid and keep track of unauthorized access, exploitation, modification, or denial of the network and network resources processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cyber security and physical security
  • 67. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions How will you prevent data leakage?33
  • 68. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions How will you prevent data leakage?33 ➢ Data leakage is when data gets out of the organisation in an unauthorised way ➢ Data can get leaked through various ways – emails, prints, laptops getting lost, unauthorised upload of data to public portals, removable drives, photographs etc ➢ a few controls can be restricting upload on internet websites, following an internal encryption solution, restricting the mails to internal network, restriction on printing confidential data etc.
  • 69. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is an ARP and how does it work?34
  • 70. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is an ARP and how does it work?34 ➢ Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network. How it works? ➢ When an incoming packet destined for a host machine on a particular local area network arrives at a gateway, the gateway asks the ARP program to find a physical host or MAC address that matches the IP address ➢ The ARP program looks in the ARP cache and, if it finds the address, provides it so that the packet can be converted to the right packet length and format and sent to the machine ➢ If no entry is found for the IP address, ARP broadcasts a request packet in a special format to all the machines on the LAN to see if one machine knows that it has that IP address associated with it.
  • 71. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is 2FA and how can it be implemented for the public websites?35
  • 72. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is 2FA and how can it be implemented for the public websites?35 ➢ An extra layer of security that is known as "multi factor authentication“ ➢ Requires not only a password and username but also something that only, and only, that user has on them, i.e. a piece of information only they should know or have immediately to hand - such as a physical token ➢ Authenticator apps replace the need to obtain a verification code via text, voice call or email
  • 73. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What techniques can be used to prevent brute force login attack?36
  • 74. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What techniques can be used to prevent brute force login attack?36 ➢ Here, the attacker tries to determine the password for a target (service/system/device) through a permutation or fuzzing process ➢ As it is a lengthy task, attackers usually employ a software such as fuzzer, to automate the process of creating numerous passwords to be tested against a target ➢ In order to avoid such attacks – password best practices should be followed, mainly on critical resources like servers, routers, exposed services and so on
  • 75. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is Cognitive Cybersecurity?37
  • 76. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is Cognitive Cybersecurity?37 ➢ application of AI technologies patterned on human thought processes to detect threats and protect physical and digital systems ➢ Self-learning security systems use data mining, pattern recognition and natural language processing to simulate the human brain, albeit in a high-powered computer model
  • 77. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is port blocking within LAN?38
  • 78. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is port blocking within LAN?38 ➢ Restricting the users from accessing a set of services within the local area network is called port blocking ➢ Stopping the source to not to access the destination node via ports as application works on the ports so ports are blocked to restricts the access filling up the security holes in the network infrastructure
  • 79. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is the difference between VPN and VLAN?39
  • 80. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What is the difference between VPN and VLAN?39 VPN VLAN related to remote access to the network of a company helps to group workstations that are not within the same locations into the same broadcast domain used to connect two points in a secured and encrypted tunnel. basically a means to logically segregate networks without physically segregating them with various switches saves the data from prying eyes while in transit and no one on the net can capture the packets and read the data does not involve any encryption technique but it is only used to slice up your logical network into different sections for the purpose of management and security
  • 81. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What protocols falls under TCP/IP internet layer?40
  • 82. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Interview Questions What protocols falls under TCP/IP internet layer?40
  • 83. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-trainingCYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
  • 84. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions Scenario 1You receive the following email from the Help Desk: Dear UCSC Email User, Beginning next week, we will be deleting all inactive email accounts in order to create space for more users. You are required to send the following information to continue using your email account. If we do not receive this information from you by the end of the week, your email account will be closed. • Name (first and last): • Email Login: • Password: • Date of birth: • Alternate email: Please contact the Webmail Team with any questions. Thank you for your immediate attention. What do you do? Justify your actions.1 Scenario 1
  • 85. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions: Answer ➢ This email is a classic example of “phishing” – trying to trick you into “biting”. The justification is the generalised way of addressing the receiver which is used in mass spam mails. ➢ Above that a corporate company will never ask personal details on mail ➢ They want your information. Don't respond to email, instant messages (IM), texts, phone calls, etc., asking you for your password or other private information. ➢ You should never disclose your password to anyone, even if they say they work for UCSC, ITS, or other campus organizations.
  • 86. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions Scenario 1A friend sends an electronic Hallmark greeting card (e-card) to your work email. You need to click on the attachment to see the card. What do you do? Justify your actions.2 Scenario 2
  • 87. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions: Answer This one has four big risks: ➢ 1. Some attachments contain viruses or other malicious programs, so just in general, it’s risky to open unknown or unsolicited attachments. ➢ 2. Also, in some cases just clicking on a malicious link can infect a computer, so unless you are sure a link is safe, don’t click on it. ➢ 3. Email addresses can be faked, so just because the email says it is from someone you know, you can’t be certain of this without checking with the person. ➢ 4. Finally, some websites and links look legitimate, but they’re really hoaxes designed to steal your information.
  • 88. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions Scenario 1One of the staff members in ITS subscribes to a number of free IT magazines. Among the questions she was asked in order to activate her subscriptions, one magazine asked for her month of birth, a second asked for her year of birth, and a third asked for her mother's maiden name. What do you infer is going on in this situation? Justify.3 Scenario 3
  • 89. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions: Answer ➢ All three newsletters probably have the same parent company or are distributed through the same service. The parent company or service can combine individual pieces of seemingly-harmless information and use or sell it for identity theft ➢ It is even possible that there is a fourth newsletter that asks for day of birth as one of the activation questions ➢ Often questions about personal information are optional. In addition to being suspicious about situations like the one described here, never provide personal information when it is not legitimately necessary, or to people or companies you don’t personally know.
  • 90. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions Scenario 1In our computing labs and departments, print billing is often tied to the user's login. People login, they print, they (or their department) get a bill. Sometimes people call to complain about bills for printing they never did only to find out that the bills are, indeed, correct. What do you infer is going on in this situation? Justify.4 Scenario 4
  • 91. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions: Answer ➢ Sometimes they realize they loaned their account to a friend who couldn't remember his/her password, and the friend did the printing. Thus the charges. It’s also possible that somebody came in behind them and used their account ➢ This is an issue with shared or public computers in general. If you don’t log out of the computer properly when you leave, someone else can come in behind you and retrieve what you were doing, use your accounts, etc. Always log out of all accounts, quit programs, and close browser windows before you walk away.
  • 92. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions Scenario 1We saw a case a while back where someone used their yahoo account at a computer lab on campus. She made sure her yahoo account was no longer open in the browser window before leaving the lab. Someone came in behind her and used the same browser to re-access her account. They started sending emails from it and caused all sorts of mayhem. What do you think might be going on here?5 Scenario 5
  • 93. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions: Answer ➢ The first person probably didn't log out of her account, so the new person could just go to history and access her account. ➢ Another possibility is that she did log out, but didn’t clear her web cache. (This is done through the browser menu to clear pages that the browser has saved for future use.)
  • 94. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions Scenario 1Two different offices on campus are working to straighten out an error in an employee’s bank account due to a direct deposit mistake. Office #1 emails the correct account and deposit information to office #2, which promptly fixes the problem. The employee confirms with the bank that everything has, indeed, been straightened out. What is wrong here?6 Scenario 6
  • 95. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions: Answer ➢ Account and deposit information is sensitive data that could be used for identity theft. Sending this or any kind of sensitive information by email is very risky because email is typically not private or secure. Anyone who knows how can access it anywhere along its route. ➢ As an alternative, the two offices could have called each other or worked with ITS to send the information a more secure way.
  • 96. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions Scenario 1The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do? a) Call your co-workers over so they can see b) Disconnect your computer from the network c) Unplug your mouse d) Tell your supervisor e) Turn your computer off f) Run anti-virus g) All of the above Select all the options that apply.7 Scenario 7
  • 97. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions: Answer Right answer is B & D. ➢ This is definitely suspicious. Immediately report the problem to your supervisor and the ITS Support Center: itrequest.ucsc.edu, 459-HELP (4357), help@ucsc.edu or Kerr Hall room 54, M-F 8AM-5PM ➢ Also, since it seems possible that someone is controlling the computer remotely, it is best if you can disconnect the computer from the network (and turn off wireless if you have it) until help arrives. If possible, don’t turn off the computer.
  • 98. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions Scenario 1Below are a list of passwords pulled out a database. A. @#$)*&^% B. akHGksmLN C. UcSc4Evr! D. Password1 Which of the following passwords meets UCSC’s password requirements? 8 Scenario 8
  • 99. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions: Answer Answer is UcSc4Evr! ➢ This is the only choice that meets all of the following UCSC requirements: ➢ At least 8 characters in length ➢ Contains at least 3 of the following 4 types of characters: lower case letters, upper case letters, numbers, special characters ➢ Not a word preceded or followed by a digit
  • 100. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions Scenario 1You receive an email from your bank telling you there is a problem with your account. The email provides instructions and a link so you can log in to your account and fix the problem. What should you do?9 Scenario 9
  • 101. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions: Answer ➢ Delete the email. Better yet, use the web client (e.g. gmail, yahoo mail, etc.) and report it as spam or phishing, then delete it. ➢ Any unsolicited email or phone call asking you to enter your account information, disclose your password, financial account information, social security number, or other personal or private information is suspicious – even if it appears to be from a company you are familiar with. Always contact the sender using a method you know is legitimate to verify that the message is from them.
  • 102. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions Scenario 1A while back, the IT folks got a number of complaints that one of our campus computers was sending out Viagra spam. They checked it out, and the reports were true: a hacker had installed a program on the computer that made it automatically send out tons of spam email without the computer owner’s knowledge. How do you think the hacker got into the computer to set this up? 10 Scenario 10
  • 103. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Scenario Based Cybersecurity Questions: Answer ➢ This was actually the result of a hacked password. Using passwords that can't be easily guessed, and protecting your passwords by not sharing them or writing them down can help to prevent this. Passwords should be at least 8 characters in length and use a mixture of upper and lower case letters, numbers, and symbols. ➢ Even though in this case it was a hacked password, other things that could possibly lead to this are: ➢ Out of date patches/updates ➢ No anti-virus software or out of date anti-virus software
  • 104. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training