www.infosectrain.com | sales@infosectrain.com
CYBERSECURITY
interview questions for freshers
www.infosectrain.com | sales@infosectrain.com
Aspiring to start your career in Cybersecurity? Here we bring the top
Cybersecurity interview questions for freshers that will help you get your
Ѓ˥˦˧˝ˢ˕ʡ
ˊ˘˟˜˩˘˜ˡ˦˨˖˛˔ˡ˘˥˔˪˛˘˥˘˘˩˘˥ˬ˧˛˜ˡ˚˜˦˗˜˚˜˧˔˟˜˭˘˗ʡʹ˥ˢˠ˥˘˦˧˔˨˥˔ˡ˧
ˢ˥˗˘˥˦˧ˢ˧˛˘ˣ˨˕˟˜˖˛˘˔˟˧˛˖˔˥˘˦ˬ˦˧˘ˠ˔ˡ˗˘˩˘ˡ˖˥˜˧˜˖˔˟˜ˡ˙ˢ˥ˠ˔˧˜ˢˡˢ˙˔
ˡ˔˧˜ˢˡϠ˦˗˘˙˘ˡ˦˘˦ˬ˦˧˘ˠ˜˦˗˜˚˜˧˔˟˜˭˘˗ʡˊ˜˧˛˨˦˘˥˦˦˧ˢ˥˜ˡ˚ˠ˔˦˦˜˩˘˔ˠˢ˨ˡ˧˦
of data online, it is no doubt that the data is vulnerable to fraudulent
˛˔˖˞˘˥˦ʡ
ʼˇʶˢˠˣ˔ˡ˜˘˦˔˥˘ˡˢ˧˜˖˜ˡ˚˧˛˘˖˥˜˧˜˖˔˟˜˧ˬˢ˙˧˛˘˦˜˧˨˔˧˜ˢˡʟ˔ˡ˗˛˘ˡ˖˘ʟ˧˛˘
˗˘ˠ˔ˡ˗˙ˢ˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬˢ˙Ѓ˖˘˥˦˜˦˥˔ˣ˜˗˟ˬ˜ˡ˖˥˘˔˦˜ˡ˚ʡʷ˨˘˧ˢ˧˛˘
˜ˡ˖˥˘˔˦˘˜ˡ˗˘ˠ˔ˡ˗ʟ˧˛˘˥˘˜˦˔˟ˢ˧ˢ˙˖ˢˠˣ˘˧˜˧˜ˢˡ˔ˠˢˡ˚˧˛˘˗ˢˠ˔˜ˡʡ
www.infosectrain.com | sales@infosectrain.com
ʻ˘ˡ˖˘ʟ˜˙ˬˢ˨˪˔ˡ˧˔˝ˢ˕˜ˡʶˬ˕˘˥˦˘˖˨˥˜˧ˬʟˬˢ˨˛˔˩˘˧ˢ˕˘ˢˡ˘ˢ˙˧˛˘˕˘˦˧ʡ
ʹ˥˘˦˛˘˥˦˧˛˔˧˚˜˩˘ˤ˨˜˖˞˔ˡ˦˪˘˥˦˧ˢ˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥
˙˥˘˦˛˘˥˦˚˘˧˔˚ˢˢ˗˛˘˔˗˦˧˔˥˧˙ˢ˥˦˧˔˥˧˜ˡ˚˧˛˘˜˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˖˔˥˘˘˥ʡʼ˧˜˦
˛˜˚˛˟ˬ˔˗˩˜˦˘˗˧˛˔˧ˬˢ˨ˣ˥˘ˣ˔˥˘˙˥ˢˠ˦˔ˠˣ˟˘˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪
ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥˙˥˘˦˛˘˥˦˧ˢ˜ˠˣ˥ˢ˩˘ˬˢ˨˥˚˥˔˦ˣˢ˩˘˥˧˛˘˖ˢ˥˘˖ˢˡ˖˘ˣ˧˦ˢ˙
ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ
Top Cybersecurity Interview Questions
Cybersecurity is the protection given to internet-connected
˦ˬ˦˧˘ˠ˦˟˜˞˘˦ˢ˙˧˪˔˥˘ʟ˛˔˥˗˪˔˥˘ʟ˔ˡ˗˘˟˘˖˧˥ˢˡ˜˖˗˔˧˔ʟ˙˥ˢˠ
˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˖˘˦˦˔ˡ˗˖ˬ˕˘˥ʠ˔˧˧˔˖˞˦ʡ
ʷ˘Ѓˡ˘ʶˬ˕˘˥˦˘˖˨˥˜˧ˬ
1
To prevent Cross-Site Scripting, we can follow a few practices such
˔˦ˈ˦˜ˡ˚˔ˡˋˆˆʻˇˀʿʹ˜˟˧˘˥ʟʸˡ˖ˢ˗˜ˡ˚˦ˣ˘˖˜˔˟˖˛˔˥˔˖˧˘˥˦ʟˈ˦˜ˡ˚
ʴˡ˧˜ʠˋˆˆ˦˘˥˩˜˖˘˦ʢ˧ˢˢ˟˦ʟ˔ˡ˗ˉ˔˟˜˗˔˧˜ˡ˚˨˦˘˥˜ˡˣ˨˧˦ʡ
What can you do to prevent Cross-Site
Scripting
2
Cybersecurity interview questions for freshers like these checks
ˬˢ˨˥˘˫ˣ˘˥˧˜˦˘˜ˡ˔˟˟˧˛˘˖ˢ˥˘˖ˢˡ˖˘ˣ˧˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡʴ˧˛˥˘˔˧˜˦
˪˛˘ˡ˦ˢˠ˘ˢˡ˘˛˔˦˧˛˘ˣˢ˧˘ˡ˧˜˔˟˧ˢ˛˔˥ˠ˧˛˘ˢ˙Ѓ˖˜˔˟˗˔˧˔˧ˢ˔
˦ˬ˦˧˘ˠ˕ˬ˗˔ˠ˔˚˜ˡ˚ˢ˥˗˘˦˧˥ˢˬ˜ˡ˚˜˧ʟ˟˜˞˘˔˃˛˜˦˛˜ˡ˚˔˧˧˔˖˞
Mention the difference between Threat
Vulnerability, and Risk
3
www.infosectrain.com | sales@infosectrain.com
A Botnet basically refers to a group of devices that are internet
˖ˢˡˡ˘˖˧˘˗ʟ˦˨˖˛˔˦˦˘˥˩˘˥˦ʟ˃ʶ˦ʟ˔ˡ˗ˠˢ˕˜˟˘˗˘˩˜˖˘˦˧˛˔˧˖˔ˡ˕˘
˔˙˙˘˖˧˘˗˔ˡ˗˖ˢˡ˧˥ˢ˟˟˘˗˕ˬ˦ˢˠ˘˞˜ˡ˗ˢ˙ˠ˔˟˪˔˥˘ʡˇ˛˘˔˕ˢ˩˘
cybersecurity interview questions for freshers will be asked when
the interviewers want to know about your understanding of the
˕˔˦˜˖˖ˢˡ˖˘ˣ˧˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ
ˉ˨˟ˡ˘˥˔˕˜˟˜˧ˬ˜˦˥˘˙˘˥˥˘˗˧ˢ˔˦˧˛˘˪˘˔˞ˡ˘˦˦˘˦˙ˢ˨ˡ˗˜ˡ˔˦ˬ˦˧˘ˠ
˧˛˔˧˖˔ˡ˖˔˨˦˘ˣˢ˧˘ˡ˧˜˔˟˧˛˥˘˔˧ˢ˨˧˖ˢˠ˘˦ʟ˟˜˞˘ˆ˄ʿ˜ˡ˝˘˖˧˜ˢˡ˦˔ˡ˗
˖˥ˢ˦˦ʠ˦˜˧˘˦˖˥˜ˣ˧˜ˡ˚ʡ˅˜˦˞˥˘˙˘˥˦˧ˢ˧˛˘˗˔ˠ˔˚˘˧˛˔˧˖˔ˡ˕˘˗ˢˡ˘˧ˢ
the data if or when a threat exploits the vulnerability that was
˔˟˥˘˔˗ˬˣ˥˘˦˘ˡ˧ʡ
What is a Botnet
4
ʼˡ˧˥˨˦˜ˢˡʷ˘˧˘˖˧˜ˢˡˆˬ˦˧˘ˠ˦ʛʼʷˆʜ˜˦˔˦˜ˠˣ˟˘ˠˢˡ˜˧ˢ˥˜ˡ˚˦ˬ˦˧˘ˠ
˧˛˔˧˗˘˧˘˖˧˦˜ˡ˧˥˨˦˜ˢˡ˕˨˧˖˔ˡˡˢ˧ˣ˥˘˩˘ˡ˧˜˧ʡʼˡ˧˥˨˦˜ˢˡ˃˥˘˩˘ˡ˧˜ˢˡ
ˆˬ˦˧˘ˠ˦ʛʼ˃ˆʜ˜˦˔˖ˢˡ˧˥ˢ˟˦ˬ˦˧˘ˠ˧˛˔˧˗˘˧˘˖˧˦˔˦˪˘˟˟˔˦ˣ˥˘˩˘ˡ˧˦
˜ˡ˧˥˨˦˜ˢˡʡ
State the difference between IDS and IPS
5
ˌ˘˦ʡʼˡ˙ˢ˥ˠ˔˧˜ˢˡˣ˥ˢ˧˘˖˧˜ˢˡ˨˦˘˦˦˘˖˨˥˜˧ˬ˦ˢ˙˧˪˔˥˘˔ˡ˗˘ˡ˖˥ˬˣ˧˜ˢˡ
˧ˢˣ˥ˢ˧˘˖˧˧˛˘˗˔˧˔˙˥ˢˠ˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˖˘˦˦ʡˊ˛˜˟˘˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ
˔˦˦˨˥˔ˡ˖˘˘ˡ˦˨˥˘˦˔˨˧˛˘ˡ˧˜˖˔˧˜ˢˡʟ˔˩˔˜˟˔˕˜˟˜˧ˬʟ˔ˡ˗˖ˢˡЃ˗˘ˡ˧˜˔˟˜˧ˬ
ˢ˙˗˔˧˔˔ˡ˗˞˘˘ˣ˦˜˧˥˘˟˜˔˕˟˘ʡ
Is there any difference between information
protection and information assurance
6
www.infosectrain.com | sales@infosectrain.com
Cybersecurity interview questions for freshers like these test your
˞ˡˢ˪˟˘˗˚˘ˢˡ˩˔˥˜ˢ˨˦˧˘˖˛ˡ˜˖˔˟˜˧˜˘˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ
˅ʷ˃ˢ˥˅˘ˠˢ˧˘ʷ˘˦˞˧ˢˣ˃˥ˢ˧ˢ˖ˢ˟˜˦˔ˀ˜˖˥ˢ˦ˢ˙˧ˣ˥ˢ˧ˢ˖ˢ˟˧˛˔˧˜˦
˗˘˦˜˚ˡ˘˗˙ˢ˥˧˥˔ˡ˦˙˘˥˦˘˖˨˥˜˧ˬ˔ˡ˗˘ˡ˖˥ˬˣ˧˜ˢˡˢ˙˗˔˧˔ʡˇ˛˜˦˜˦
˜ˠˣ˟˘ˠ˘ˡ˧˘˗˕˘˧˪˘˘ˡ˨˦˘˥˦ʟ˖˟˜˘ˡ˧˗˘˩˜˖˘˦ʟ˔ˡ˗˔˩˜˥˧˨˔˟ˡ˘˧˪ˢ˥˞
˦˘˥˩˘˥ʡ
7
ˇ˛˘˗˘˧˘˖˧˜ˢˡˢ˙˩˨˟ˡ˘˥˔˕˟˘˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˔˦˦˘˧˦˟˜˞˘˖˨˦˧ˢˠ˘˥˗˔˧˔
and hardware, that are prone to cyber-attacks is called cybersecu-
˥˜˧ˬ˥˜˦˞˔˦˦˘˦˦ˠ˘ˡ˧ʡʼ˧˜˦ˣ˥˔˖˧˜˖˘˗˧ˢЃ˚˨˥˘ˢ˨˧˔ˡ˗ˣ˥˜ˢ˥˜˧˜˭˘˥˜˦˞˦
˔˖˥ˢ˦˦˖ˢˠˣ˔ˡ˜˘˦ʡ
What is cybersecurity risk assessment
8
ʴ˙˔˟˦˘ˣˢ˦˜˧˜˩˘˜ˡʼʷˆ˜˦˖ˢˡ˦˜˗˘˥˘˗˔˙˔˟˦˘˔˟˔˥ˠ˧˛˔˧˜˦Ѓ˥˘˗˙ˢ˥
˟˘˚˜˧˜ˠ˔˧˘ˡ˘˧˪ˢ˥˞˔˖˧˜˩˜˧ˬʡ
ʴ˙˔˟˦˘ˡ˘˚˔˧˜˩˘˜˦˖ˢˡ˦˜˗˘˥˘˗˧ˢ˕˘˧˛˘ˠˢ˦˧˖ˢˠˣ˟˜˖˔˧˘˗˦˧˔˧˘
˔ˡ˗ˢ˖˖˨˥˦˪˛˘ˡ˧˛˘ʼʷˆ˙˔˜˟˦˧ˢ˜˗˘ˡ˧˜˙ˬ˔ˡ˗˔˟˘˥˧ˠ˔˟˜˖˜ˢ˨˦
ˡ˘˧˪ˢ˥˞˧˥˔˙Ѓ˖ʡ
What is a false positive and false negative
in IDS
9
ʶˢ˚ˡ˜˧˜˩˘˦˘˖˨˥˜˧ˬ˜˦ˣ˥˜ˠ˔˥˜˟ˬ˔ˡ˔ˣˣ˟˜˖˔˧˜ˢˡˢ˙ʴʼ˧˘˖˛ˡˢ˟ˢ˚ˬ˧˛˔˧
˜˗˘ˡ˧˜Ѓ˘˦˧˛˥˘˔˧˦˔ˡ˗ˣ˥ˢ˧˘˖˧˦˧˛˘ˣ˛ˬ˦˜˖˔˟˔ˡ˗˗˜˚˜˧˔˟˦ˬ˦˧˘ˠ˦ʡʼ˧˜˦
˕˔˦˘˗ˢˡ˛˨ˠ˔ˡ˨ˡ˗˘˥˦˧˔ˡ˗˜ˡ˚ˣ˥ˢ˖˘˦˦˘˦ʡ
What is cognitive security
10
www.infosectrain.com | sales@infosectrain.com
ʷˁˆˢ˥ʷˢˠ˔˜ˡˁ˔ˠ˘ˆˬ˦˧˘ˠˀˢˡ˜˧ˢ˥˜ˡ˚˛˘˟ˣ˦˘ˡ˦˨˥˘˧˛˘
˖ˢˡ˧˜ˡ˨˜˧ˬˢ˙ˣ˥ˢˣ˘˥˧˥˔˙Ѓ˖˥ˢ˨˧˜ˡ˚˧ˢ˦˘˥˩˜˖˘˦ʟ˪˘˕˦˜˧˘˦ʟ˔ˡ˗
˘˟˘˖˧˥ˢˡ˜˖˖ˢˠˠ˨ˡ˜˖˔˧˜ˢˡ˦ʡ
What is the importance of DNS
monitoring
11
ʼʺˀ˃ˢ˥ʼˡ˧˘˥ˡ˘˧ʺ˥ˢ˨ˣˀ˔ˡ˔˚˘ˠ˘ˡ˧˃˥ˢ˧ˢ˖ˢ˟˜˦˔
˖ˢˠˠ˨ˡ˜˖˔˧˜ˢˡˣ˥ˢ˧ˢ˖ˢ˟˨˦˘˗˕ˬ˩˜˗˘ˢˢ˥˚˔ˠ˘˦˧˥˘˔ˠ˜ˡ˚ʡ
What is IGMP
12
These cybersecurity interview questions for freshers target the
˖˔ˡ˗˜˗˔˧˘Ϡ˦˚˥˔˦ˣˢˡ˧˛˘ˡˢ˧˜ˢˡ˦ˢ˙˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˘˖ˢ˦ˬ˦˧˘ˠʡ
ˆˬˠˠ˘˧˥˜˖˘ˡ˖˥ˬˣ˧˜ˢˡ˘ˡ˖˥ˬˣ˧˦˔ˡ˗˗˘˖˥ˬˣ˧˦˨˦˜ˡ˚˧˛˘˦˔ˠ˘˞˘ˬʡ
ʼ˧Ϡ˦ˠ˨˖˛˙˔˦˧˘˥˗˨˘˧ˢ˧˛˘˦˜ˠˣ˟˘˥ˠ˔˧˛˦˜ˡ˩ˢ˟˩˘˗ʡʴ˦ˬˠˠ˘˧˥˜˖
˘ˡ˖˥ˬˣ˧˜ˢˡ˘ˡ˖˥ˬˣ˧˦˔ˡ˗˗˘˖˥ˬˣ˧˦˨˦˜ˡ˚˗˜˙˙˘˥˘ˡ˧˞˘˧˦ʡ
Mention a difference between symmetric
and asymmetric encryption
13
ʶˆ˅ʹˢ˥ʶ˥ˢ˦˦ʠˆ˜˧˘˅˘ˤ˨˘˦˧ʹˢ˥˚˘˥ˬ˜˦˔˩˨˟ˡ˘˥˔˕˜˟˜˧ˬˢ˙˪˘˕
applications where the server goes straight to processing before
˖˛˘˖˞˜ˡ˚˪˛˘˧˛˘˥˔˥˘ˤ˨˘˦˧˛˔˦˖ˢˠ˘˙˥ˢˠ˔˧˥˨˦˧˘˗˖˟˜˘ˡ˧ˢ˥ˡˢ˧ʡ
What is CSRF
14
www.infosectrain.com | sales@infosectrain.com
This cybersecurity interview questions for freshers is asked to
˨˦˨˔˟˟ˬ˖ˢˡ˙˨˦˘˧˛˘˜ˡ˧˘˥˩˜˘˪˘˘ʡʴ˧˜ˣ˙ˢ˥˔ˡ˦˪˘˥˜ˡ˚˜˧˜˦˧ˢ˞˘˘ˣ
˧˛˘˔ˡ˦˪˘˥˩˘˥ˬ˦˜ˠˣ˟˘ʡʴʵ˟˔˖˞˛˔˧˛˔˖˞˘˥˛˔˖˞˦˪˜˧˛ˢ˨˧
˔˨˧˛ˢ˥˜˧ˬʡʴˊ˛˜˧˘˛˔˧˛˔˖˞˘˥ˣ˘˥˙ˢ˥ˠ˦˔ˡ˔˨˧˛ˢ˥˜˭˘˗˛˔˖˞˜ˡ˚
˔˧˧˘ˠˣ˧˨ˡ˗˘˥˦˜˚ˡ˘˗ˁʷʴʡʴʺ˥˘ˬ˛˔˧˛˔˖˞˘˥˜˦˜ˡ˜˧˜˔˟˟ˬ˔˪˛˜˧˘
˛˔˧˛˔˖˞˘˥˪˛ˢˣ˘˥˙ˢ˥ˠ˦˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˧˜˩˜˧˜˘˦˦ˢˠ˘˧˜ˠ˘˦ʡ
What is a Black hat, White hat, and
Grey hat hacker
15
ʴʶʼʴ˧˥˜˔ˡ˚˟˘˥˘˙˘˥˦˧ˢʶˢˡЃ˗˘ˡ˧˜˔˟˜˧ˬʟʼˡ˧˘˚˥˜˧ˬʟ˔ˡ˗ʴ˩˔˜˟˔˕˜˟˜˧ˬʡʼ˧
˜˦˞˘˘ˣ˜ˡ˚˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˦˘˖˥˘˧ʟ˨ˡ˔˟˧˘˥˘˗ʟ˔ˡ˗˔˩˔˜˟˔˕˟˘˔˧˔˟˟
˧˜ˠ˘˦ʡ
What is a CIA triangle
16
ʶˢˠˣ˟˜˔ˡ˖˘˜˦˥˘˙˘˥˥˘˗˧ˢ˧˛˘˙ˢ˟˟ˢ˪˜ˡ˚˔˖˘˥˧˔˜ˡ˦˘˧ˢ˙
˦˧˔ˡ˗˔˥˗˦˔ˡ˗˥˨˟˘˦˧˛˔˧˜˦˦˘˧˕ˬ˔˚ˢ˩˘˥ˡˠ˘ˡ˧ʢʼˡ˗˘ˣ˘ˡ˗˘ˡ˧
ˣ˔˥˧ˬʢˢ˥˚˔ˡ˜˭˔˧˜ˢˡʡ
What is compliance
17
ʹˢ˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥˙˥˘˦˛˘˥˦˟˜˞˘˧˛˘˦˘ʟ˜˧˜˦
best to stay generic as different architecture contains different
ˢ˕˝˘˖˧˦ʡʵ˔˦˜˖˪˘˕˔˥˖˛˜˧˘˖˧˨˥˘˦˛ˢ˨˟˗˖ˢˡ˧˔˜ˡˢ˕˝˘˖˧˦ʟ˜ˡ˖˟˨˗˜ˡ˚
a database server, front-ending server, and a web application
˦˘˥˩˘˥ʡ
Explain the objects of Basic web
architecture
18
www.infosectrain.com | sales@infosectrain.com
ʼ˧˜˦˧˛˘ˣ˥ˢ˖˘˦˦ˢ˙˚˔˧˛˘˥˜ˡ˚˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˔˕ˢ˨˧ˡ˘˧˪ˢ˥˞ʟ˦ˬ˦˧˘ˠʟ
˘˧˖ʡ˕ˬ˦˘ˡ˗˜ˡ˚ˠ˘˦˦˔˚˘˦˔ˡ˗˧˛˘ˡ˔ˡ˔˟ˬ˭˜ˡ˚˧˛˘˥˘˦ˣˢˡ˦˘˦ʡ
ˊ˛˔˧˜˦˗˔˧˔˘˫Ѓ˟˧˥˔˧˜ˢˡ
19
ʻʼʷˆ˜˦˔˛ˢ˦˧˜ˡ˧˥˨˦˜ˢˡ˗˘˧˘˖˧˜ˢˡ˦ˬ˦˧˘ˠ˧˛˔˧˜˦ˣ˟˔˖˘˗ˢˡ˘˔˖˛
˛ˢ˦˧ʡˁʼʷˆ˜˦˔ˡ˘˧˪ˢ˥˞˜ˡ˧˥˨˦˜ˢˡ˗˘˧˘˖˧˜ˢˡ˦ˬ˦˧˘ˠ˧˛˔˧˜˦ˣ˟˔˖˘˗
˜ˡ˧˛˘ˡ˘˧˪ˢ˥˞ʡ
What is HIDS and NIDS
20

CYBERSECURITY Interview Questions for Freshers.pdf

  • 1.
  • 2.
    www.infosectrain.com | sales@infosectrain.com Aspiringto start your career in Cybersecurity? Here we bring the top Cybersecurity interview questions for freshers that will help you get your Ѓ˥˦˧˝ˢ˕ʡ ˊ˘˟˜˩˘˜ˡ˦˨˖˛˔ˡ˘˥˔˪˛˘˥˘˘˩˘˥ˬ˧˛˜ˡ˚˜˦˗˜˚˜˧˔˟˜˭˘˗ʡʹ˥ˢˠ˥˘˦˧˔˨˥˔ˡ˧ ˢ˥˗˘˥˦˧ˢ˧˛˘ˣ˨˕˟˜˖˛˘˔˟˧˛˖˔˥˘˦ˬ˦˧˘ˠ˔ˡ˗˘˩˘ˡ˖˥˜˧˜˖˔˟˜ˡ˙ˢ˥ˠ˔˧˜ˢˡˢ˙˔ ˡ˔˧˜ˢˡϠ˦˗˘˙˘ˡ˦˘˦ˬ˦˧˘ˠ˜˦˗˜˚˜˧˔˟˜˭˘˗ʡˊ˜˧˛˨˦˘˥˦˦˧ˢ˥˜ˡ˚ˠ˔˦˦˜˩˘˔ˠˢ˨ˡ˧˦ of data online, it is no doubt that the data is vulnerable to fraudulent ˛˔˖˞˘˥˦ʡ ʼˇʶˢˠˣ˔ˡ˜˘˦˔˥˘ˡˢ˧˜˖˜ˡ˚˧˛˘˖˥˜˧˜˖˔˟˜˧ˬˢ˙˧˛˘˦˜˧˨˔˧˜ˢˡʟ˔ˡ˗˛˘ˡ˖˘ʟ˧˛˘ ˗˘ˠ˔ˡ˗˙ˢ˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬˢ˙Ѓ˖˘˥˦˜˦˥˔ˣ˜˗˟ˬ˜ˡ˖˥˘˔˦˜ˡ˚ʡʷ˨˘˧ˢ˧˛˘ ˜ˡ˖˥˘˔˦˘˜ˡ˗˘ˠ˔ˡ˗ʟ˧˛˘˥˘˜˦˔˟ˢ˧ˢ˙˖ˢˠˣ˘˧˜˧˜ˢˡ˔ˠˢˡ˚˧˛˘˗ˢˠ˔˜ˡʡ
  • 3.
    www.infosectrain.com | sales@infosectrain.com ʻ˘ˡ˖˘ʟ˜˙ˬˢ˨˪˔ˡ˧˔˝ˢ˕˜ˡʶˬ˕˘˥˦˘˖˨˥˜˧ˬʟˬˢ˨˛˔˩˘˧ˢ˕˘ˢˡ˘ˢ˙˧˛˘˕˘˦˧ʡ ʹ˥˘˦˛˘˥˦˧˛˔˧˚˜˩˘ˤ˨˜˖˞˔ˡ˦˪˘˥˦˧ˢ˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥ ˙˥˘˦˛˘˥˦˚˘˧˔˚ˢˢ˗˛˘˔˗˦˧˔˥˧˙ˢ˥˦˧˔˥˧˜ˡ˚˧˛˘˜˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˖˔˥˘˘˥ʡʼ˧˜˦ ˛˜˚˛˟ˬ˔˗˩˜˦˘˗˧˛˔˧ˬˢ˨ˣ˥˘ˣ˔˥˘˙˥ˢˠ˦˔ˠˣ˟˘˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪ ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥˙˥˘˦˛˘˥˦˧ˢ˜ˠˣ˥ˢ˩˘ˬˢ˨˥˚˥˔˦ˣˢ˩˘˥˧˛˘˖ˢ˥˘˖ˢˡ˖˘ˣ˧˦ˢ˙ ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ TopCybersecurity Interview Questions Cybersecurity is the protection given to internet-connected ˦ˬ˦˧˘ˠ˦˟˜˞˘˦ˢ˙˧˪˔˥˘ʟ˛˔˥˗˪˔˥˘ʟ˔ˡ˗˘˟˘˖˧˥ˢˡ˜˖˗˔˧˔ʟ˙˥ˢˠ ˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˖˘˦˦˔ˡ˗˖ˬ˕˘˥ʠ˔˧˧˔˖˞˦ʡ ʷ˘Ѓˡ˘ʶˬ˕˘˥˦˘˖˨˥˜˧ˬ 1 To prevent Cross-Site Scripting, we can follow a few practices such ˔˦ˈ˦˜ˡ˚˔ˡˋˆˆʻˇˀʿʹ˜˟˧˘˥ʟʸˡ˖ˢ˗˜ˡ˚˦ˣ˘˖˜˔˟˖˛˔˥˔˖˧˘˥˦ʟˈ˦˜ˡ˚ ʴˡ˧˜ʠˋˆˆ˦˘˥˩˜˖˘˦ʢ˧ˢˢ˟˦ʟ˔ˡ˗ˉ˔˟˜˗˔˧˜ˡ˚˨˦˘˥˜ˡˣ˨˧˦ʡ What can you do to prevent Cross-Site Scripting 2 Cybersecurity interview questions for freshers like these checks ˬˢ˨˥˘˫ˣ˘˥˧˜˦˘˜ˡ˔˟˟˧˛˘˖ˢ˥˘˖ˢˡ˖˘ˣ˧˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡʴ˧˛˥˘˔˧˜˦ ˪˛˘ˡ˦ˢˠ˘ˢˡ˘˛˔˦˧˛˘ˣˢ˧˘ˡ˧˜˔˟˧ˢ˛˔˥ˠ˧˛˘ˢ˙Ѓ˖˜˔˟˗˔˧˔˧ˢ˔ ˦ˬ˦˧˘ˠ˕ˬ˗˔ˠ˔˚˜ˡ˚ˢ˥˗˘˦˧˥ˢˬ˜ˡ˚˜˧ʟ˟˜˞˘˔˃˛˜˦˛˜ˡ˚˔˧˧˔˖˞ Mention the difference between Threat Vulnerability, and Risk 3
  • 4.
    www.infosectrain.com | sales@infosectrain.com ABotnet basically refers to a group of devices that are internet ˖ˢˡˡ˘˖˧˘˗ʟ˦˨˖˛˔˦˦˘˥˩˘˥˦ʟ˃ʶ˦ʟ˔ˡ˗ˠˢ˕˜˟˘˗˘˩˜˖˘˦˧˛˔˧˖˔ˡ˕˘ ˔˙˙˘˖˧˘˗˔ˡ˗˖ˢˡ˧˥ˢ˟˟˘˗˕ˬ˦ˢˠ˘˞˜ˡ˗ˢ˙ˠ˔˟˪˔˥˘ʡˇ˛˘˔˕ˢ˩˘ cybersecurity interview questions for freshers will be asked when the interviewers want to know about your understanding of the ˕˔˦˜˖˖ˢˡ˖˘ˣ˧˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ ˉ˨˟ˡ˘˥˔˕˜˟˜˧ˬ˜˦˥˘˙˘˥˥˘˗˧ˢ˔˦˧˛˘˪˘˔˞ˡ˘˦˦˘˦˙ˢ˨ˡ˗˜ˡ˔˦ˬ˦˧˘ˠ ˧˛˔˧˖˔ˡ˖˔˨˦˘ˣˢ˧˘ˡ˧˜˔˟˧˛˥˘˔˧ˢ˨˧˖ˢˠ˘˦ʟ˟˜˞˘ˆ˄ʿ˜ˡ˝˘˖˧˜ˢˡ˦˔ˡ˗ ˖˥ˢ˦˦ʠ˦˜˧˘˦˖˥˜ˣ˧˜ˡ˚ʡ˅˜˦˞˥˘˙˘˥˦˧ˢ˧˛˘˗˔ˠ˔˚˘˧˛˔˧˖˔ˡ˕˘˗ˢˡ˘˧ˢ the data if or when a threat exploits the vulnerability that was ˔˟˥˘˔˗ˬˣ˥˘˦˘ˡ˧ʡ What is a Botnet 4 ʼˡ˧˥˨˦˜ˢˡʷ˘˧˘˖˧˜ˢˡˆˬ˦˧˘ˠ˦ʛʼʷˆʜ˜˦˔˦˜ˠˣ˟˘ˠˢˡ˜˧ˢ˥˜ˡ˚˦ˬ˦˧˘ˠ ˧˛˔˧˗˘˧˘˖˧˦˜ˡ˧˥˨˦˜ˢˡ˕˨˧˖˔ˡˡˢ˧ˣ˥˘˩˘ˡ˧˜˧ʡʼˡ˧˥˨˦˜ˢˡ˃˥˘˩˘ˡ˧˜ˢˡ ˆˬ˦˧˘ˠ˦ʛʼ˃ˆʜ˜˦˔˖ˢˡ˧˥ˢ˟˦ˬ˦˧˘ˠ˧˛˔˧˗˘˧˘˖˧˦˔˦˪˘˟˟˔˦ˣ˥˘˩˘ˡ˧˦ ˜ˡ˧˥˨˦˜ˢˡʡ State the difference between IDS and IPS 5 ˌ˘˦ʡʼˡ˙ˢ˥ˠ˔˧˜ˢˡˣ˥ˢ˧˘˖˧˜ˢˡ˨˦˘˦˦˘˖˨˥˜˧ˬ˦ˢ˙˧˪˔˥˘˔ˡ˗˘ˡ˖˥ˬˣ˧˜ˢˡ ˧ˢˣ˥ˢ˧˘˖˧˧˛˘˗˔˧˔˙˥ˢˠ˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˖˘˦˦ʡˊ˛˜˟˘˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ ˔˦˦˨˥˔ˡ˖˘˘ˡ˦˨˥˘˦˔˨˧˛˘ˡ˧˜˖˔˧˜ˢˡʟ˔˩˔˜˟˔˕˜˟˜˧ˬʟ˔ˡ˗˖ˢˡЃ˗˘ˡ˧˜˔˟˜˧ˬ ˢ˙˗˔˧˔˔ˡ˗˞˘˘ˣ˦˜˧˥˘˟˜˔˕˟˘ʡ Is there any difference between information protection and information assurance 6
  • 5.
    www.infosectrain.com | sales@infosectrain.com Cybersecurityinterview questions for freshers like these test your ˞ˡˢ˪˟˘˗˚˘ˢˡ˩˔˥˜ˢ˨˦˧˘˖˛ˡ˜˖˔˟˜˧˜˘˦ˢ˙ʶˬ˕˘˥˦˘˖˨˥˜˧ˬʡ ˅ʷ˃ˢ˥˅˘ˠˢ˧˘ʷ˘˦˞˧ˢˣ˃˥ˢ˧ˢ˖ˢ˟˜˦˔ˀ˜˖˥ˢ˦ˢ˙˧ˣ˥ˢ˧ˢ˖ˢ˟˧˛˔˧˜˦ ˗˘˦˜˚ˡ˘˗˙ˢ˥˧˥˔ˡ˦˙˘˥˦˘˖˨˥˜˧ˬ˔ˡ˗˘ˡ˖˥ˬˣ˧˜ˢˡˢ˙˗˔˧˔ʡˇ˛˜˦˜˦ ˜ˠˣ˟˘ˠ˘ˡ˧˘˗˕˘˧˪˘˘ˡ˨˦˘˥˦ʟ˖˟˜˘ˡ˧˗˘˩˜˖˘˦ʟ˔ˡ˗˔˩˜˥˧˨˔˟ˡ˘˧˪ˢ˥˞ ˦˘˥˩˘˥ʡ 7 ˇ˛˘˗˘˧˘˖˧˜ˢˡˢ˙˩˨˟ˡ˘˥˔˕˟˘˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˔˦˦˘˧˦˟˜˞˘˖˨˦˧ˢˠ˘˥˗˔˧˔ and hardware, that are prone to cyber-attacks is called cybersecu- ˥˜˧ˬ˥˜˦˞˔˦˦˘˦˦ˠ˘ˡ˧ʡʼ˧˜˦ˣ˥˔˖˧˜˖˘˗˧ˢЃ˚˨˥˘ˢ˨˧˔ˡ˗ˣ˥˜ˢ˥˜˧˜˭˘˥˜˦˞˦ ˔˖˥ˢ˦˦˖ˢˠˣ˔ˡ˜˘˦ʡ What is cybersecurity risk assessment 8 ʴ˙˔˟˦˘ˣˢ˦˜˧˜˩˘˜ˡʼʷˆ˜˦˖ˢˡ˦˜˗˘˥˘˗˔˙˔˟˦˘˔˟˔˥ˠ˧˛˔˧˜˦Ѓ˥˘˗˙ˢ˥ ˟˘˚˜˧˜ˠ˔˧˘ˡ˘˧˪ˢ˥˞˔˖˧˜˩˜˧ˬʡ ʴ˙˔˟˦˘ˡ˘˚˔˧˜˩˘˜˦˖ˢˡ˦˜˗˘˥˘˗˧ˢ˕˘˧˛˘ˠˢ˦˧˖ˢˠˣ˟˜˖˔˧˘˗˦˧˔˧˘ ˔ˡ˗ˢ˖˖˨˥˦˪˛˘ˡ˧˛˘ʼʷˆ˙˔˜˟˦˧ˢ˜˗˘ˡ˧˜˙ˬ˔ˡ˗˔˟˘˥˧ˠ˔˟˜˖˜ˢ˨˦ ˡ˘˧˪ˢ˥˞˧˥˔˙Ѓ˖ʡ What is a false positive and false negative in IDS 9 ʶˢ˚ˡ˜˧˜˩˘˦˘˖˨˥˜˧ˬ˜˦ˣ˥˜ˠ˔˥˜˟ˬ˔ˡ˔ˣˣ˟˜˖˔˧˜ˢˡˢ˙ʴʼ˧˘˖˛ˡˢ˟ˢ˚ˬ˧˛˔˧ ˜˗˘ˡ˧˜Ѓ˘˦˧˛˥˘˔˧˦˔ˡ˗ˣ˥ˢ˧˘˖˧˦˧˛˘ˣ˛ˬ˦˜˖˔˟˔ˡ˗˗˜˚˜˧˔˟˦ˬ˦˧˘ˠ˦ʡʼ˧˜˦ ˕˔˦˘˗ˢˡ˛˨ˠ˔ˡ˨ˡ˗˘˥˦˧˔ˡ˗˜ˡ˚ˣ˥ˢ˖˘˦˦˘˦ʡ What is cognitive security 10
  • 6.
    www.infosectrain.com | sales@infosectrain.com ʷˁˆˢ˥ʷˢˠ˔˜ˡˁ˔ˠ˘ˆˬ˦˧˘ˠˀˢˡ˜˧ˢ˥˜ˡ˚˛˘˟ˣ˦˘ˡ˦˨˥˘˧˛˘ ˖ˢˡ˧˜ˡ˨˜˧ˬˢ˙ˣ˥ˢˣ˘˥˧˥˔˙Ѓ˖˥ˢ˨˧˜ˡ˚˧ˢ˦˘˥˩˜˖˘˦ʟ˪˘˕˦˜˧˘˦ʟ˔ˡ˗ ˘˟˘˖˧˥ˢˡ˜˖˖ˢˠˠ˨ˡ˜˖˔˧˜ˢˡ˦ʡ Whatis the importance of DNS monitoring 11 ʼʺˀ˃ˢ˥ʼˡ˧˘˥ˡ˘˧ʺ˥ˢ˨ˣˀ˔ˡ˔˚˘ˠ˘ˡ˧˃˥ˢ˧ˢ˖ˢ˟˜˦˔ ˖ˢˠˠ˨ˡ˜˖˔˧˜ˢˡˣ˥ˢ˧ˢ˖ˢ˟˨˦˘˗˕ˬ˩˜˗˘ˢˢ˥˚˔ˠ˘˦˧˥˘˔ˠ˜ˡ˚ʡ What is IGMP 12 These cybersecurity interview questions for freshers target the ˖˔ˡ˗˜˗˔˧˘Ϡ˦˚˥˔˦ˣˢˡ˧˛˘ˡˢ˧˜ˢˡ˦ˢ˙˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˘˖ˢ˦ˬ˦˧˘ˠʡ ˆˬˠˠ˘˧˥˜˖˘ˡ˖˥ˬˣ˧˜ˢˡ˘ˡ˖˥ˬˣ˧˦˔ˡ˗˗˘˖˥ˬˣ˧˦˨˦˜ˡ˚˧˛˘˦˔ˠ˘˞˘ˬʡ ʼ˧Ϡ˦ˠ˨˖˛˙˔˦˧˘˥˗˨˘˧ˢ˧˛˘˦˜ˠˣ˟˘˥ˠ˔˧˛˦˜ˡ˩ˢ˟˩˘˗ʡʴ˦ˬˠˠ˘˧˥˜˖ ˘ˡ˖˥ˬˣ˧˜ˢˡ˘ˡ˖˥ˬˣ˧˦˔ˡ˗˗˘˖˥ˬˣ˧˦˨˦˜ˡ˚˗˜˙˙˘˥˘ˡ˧˞˘˧˦ʡ Mention a difference between symmetric and asymmetric encryption 13 ʶˆ˅ʹˢ˥ʶ˥ˢ˦˦ʠˆ˜˧˘˅˘ˤ˨˘˦˧ʹˢ˥˚˘˥ˬ˜˦˔˩˨˟ˡ˘˥˔˕˜˟˜˧ˬˢ˙˪˘˕ applications where the server goes straight to processing before ˖˛˘˖˞˜ˡ˚˪˛˘˧˛˘˥˔˥˘ˤ˨˘˦˧˛˔˦˖ˢˠ˘˙˥ˢˠ˔˧˥˨˦˧˘˗˖˟˜˘ˡ˧ˢ˥ˡˢ˧ʡ What is CSRF 14
  • 7.
    www.infosectrain.com | sales@infosectrain.com Thiscybersecurity interview questions for freshers is asked to ˨˦˨˔˟˟ˬ˖ˢˡ˙˨˦˘˧˛˘˜ˡ˧˘˥˩˜˘˪˘˘ʡʴ˧˜ˣ˙ˢ˥˔ˡ˦˪˘˥˜ˡ˚˜˧˜˦˧ˢ˞˘˘ˣ ˧˛˘˔ˡ˦˪˘˥˩˘˥ˬ˦˜ˠˣ˟˘ʡʴʵ˟˔˖˞˛˔˧˛˔˖˞˘˥˛˔˖˞˦˪˜˧˛ˢ˨˧ ˔˨˧˛ˢ˥˜˧ˬʡʴˊ˛˜˧˘˛˔˧˛˔˖˞˘˥ˣ˘˥˙ˢ˥ˠ˦˔ˡ˔˨˧˛ˢ˥˜˭˘˗˛˔˖˞˜ˡ˚ ˔˧˧˘ˠˣ˧˨ˡ˗˘˥˦˜˚ˡ˘˗ˁʷʴʡʴʺ˥˘ˬ˛˔˧˛˔˖˞˘˥˜˦˜ˡ˜˧˜˔˟˟ˬ˔˪˛˜˧˘ ˛˔˧˛˔˖˞˘˥˪˛ˢˣ˘˥˙ˢ˥ˠ˦˨ˡ˔˨˧˛ˢ˥˜˭˘˗˔˖˧˜˩˜˧˜˘˦˦ˢˠ˘˧˜ˠ˘˦ʡ What is a Black hat, White hat, and Grey hat hacker 15 ʴʶʼʴ˧˥˜˔ˡ˚˟˘˥˘˙˘˥˦˧ˢʶˢˡЃ˗˘ˡ˧˜˔˟˜˧ˬʟʼˡ˧˘˚˥˜˧ˬʟ˔ˡ˗ʴ˩˔˜˟˔˕˜˟˜˧ˬʡʼ˧ ˜˦˞˘˘ˣ˜ˡ˚˜ˡ˙ˢ˥ˠ˔˧˜ˢˡ˦˘˖˥˘˧ʟ˨ˡ˔˟˧˘˥˘˗ʟ˔ˡ˗˔˩˔˜˟˔˕˟˘˔˧˔˟˟ ˧˜ˠ˘˦ʡ What is a CIA triangle 16 ʶˢˠˣ˟˜˔ˡ˖˘˜˦˥˘˙˘˥˥˘˗˧ˢ˧˛˘˙ˢ˟˟ˢ˪˜ˡ˚˔˖˘˥˧˔˜ˡ˦˘˧ˢ˙ ˦˧˔ˡ˗˔˥˗˦˔ˡ˗˥˨˟˘˦˧˛˔˧˜˦˦˘˧˕ˬ˔˚ˢ˩˘˥ˡˠ˘ˡ˧ʢʼˡ˗˘ˣ˘ˡ˗˘ˡ˧ ˣ˔˥˧ˬʢˢ˥˚˔ˡ˜˭˔˧˜ˢˡʡ What is compliance 17 ʹˢ˥˖ˬ˕˘˥˦˘˖˨˥˜˧ˬ˜ˡ˧˘˥˩˜˘˪ˤ˨˘˦˧˜ˢˡ˦˙ˢ˥˙˥˘˦˛˘˥˦˟˜˞˘˧˛˘˦˘ʟ˜˧˜˦ best to stay generic as different architecture contains different ˢ˕˝˘˖˧˦ʡʵ˔˦˜˖˪˘˕˔˥˖˛˜˧˘˖˧˨˥˘˦˛ˢ˨˟˗˖ˢˡ˧˔˜ˡˢ˕˝˘˖˧˦ʟ˜ˡ˖˟˨˗˜ˡ˚ a database server, front-ending server, and a web application ˦˘˥˩˘˥ʡ Explain the objects of Basic web architecture 18
  • 8.