Cyber Security Interview Questions For Freshers: 1. What Is The Main Objective of Cyber Security?
Cyber Security Interview Questions For Freshers: 1. What Is The Main Objective of Cyber Security?
The primary goal of cyber security is to protect data. To safeguard data from cyber-
attacks, the security sector offers a triangle of three connected principles. The CIA trio
is the name for this principle. The CIA model is intended to help organizations develop
policies for their information security architecture. One or more of these principles has
been broken when a security breach is discovered. Confidentiality, Integrity, and
Availability are the three components of the CIA model. It's a security paradigm that
guides individuals through many aspects of IT security. Let's take a closer look at each
section.
Threat: A threat is any form of hazard that has the potential to destroy or steal data,
disrupt operations, or cause harm in general. Malware, phishing, data breaches, and
even unethical employees are all examples of threats.
Threat actors, who might be individuals or groups with a variety of backgrounds and
motives, express threats. Understanding threats is essential for developing effective
mitigations and making informed cybersecurity decisions. Threat intelligence is
information regarding threats and threat actors.
Risk: The probability of a threat and the consequence of a vulnerability are combined
to form risk. To put it another way, the risk is the likelihood of a threat agent
successfully exploiting a vulnerability, which may be calculated using the formula:
Risk management is the process of identifying all potential hazards, analyzing their
impact, and determining the best course of action. It's a never-ending procedure that
examines new threats and vulnerabilities on a regular basis. Risks can be avoided,
minimized, accepted, or passed to a third party depending on the response chosen.
3. What does XSS stand for? How can it be prevented?
XSS stands for Cross-site scripting. It is a web security flaw that allows an attacker to
manipulate how users interact with a susceptible application. It allows an attacker to
get around the same-origin policy, which is meant to keep websites separate from one
another. Cross-site scripting flaws allow an attacker to impersonate a victim user and
execute any actions that the user is capable of, as well as access any of the user's data.
If the victim user has privileged access to the application, the attacker may be able to
take complete control of the app's functionality and data.
4. What is a Firewall?
A firewall serves as a barrier between a LAN and the Internet. It allows private
resources to remain private while reducing security threats. It manages both inbound
and outbound network traffic.
A sample firewall between a LAN and the internet is shown in the diagram below. The
point of vulnerability is the connection between the two. At this point, network traffic
can be filtered using both hardware and software.
There are two types of firewall systems: one that uses network layer filters and the
other that uses user, application, or network layer proxy servers.
5. Define VPN.
The term VPN refers to a virtual private network. It enables you to connect your
computer to a private network, establishing an encrypted connection that hides your
IP address, allowing you to safely share data and access the web while safeguarding
your online identity.
A virtual private network, or VPN, is an encrypted link between a device and a network
via the Internet. The encrypted connection aids in the secure transmission of sensitive
data. It protects against illegal eavesdropping on the traffic and allows the user to
work remotely. In corporate settings, VPN technology is commonly used.
6. Who are Black Hat, White Hat and Grey Hat Hackers?
Because of its malicious aim, black hat hacking is always illegal, including stealing
company data, violating the privacy, causing system damage, and blocking network
connection, among other things.
Ethical hackers are also referred to as White hat hackers. As part of penetration
testing and vulnerability assessments, they never intend to harm a system; rather, they
strive to uncover holes in a computer or network system.
Ethical hacking is not a crime and is one of the most difficult professions in the IT
business. Many businesses hire ethical hackers to do penetration tests and
vulnerability assessments.
Grey hat hackers combine elements of both black and white hat hacking. They act
without malice, but for the sake of amusement, they exploit a security flaw in a
computer system or network without the permission or knowledge of the owner.
Their goal is to draw the owners' attention to the flaw in the hope of receiving
gratitude or a small reward.
The assets of every company are made up of a variety of various systems. These
systems have a strong cybersecurity posture, which necessitates coordinated actions
across the board. As a result, cybersecurity can be divided into the following sub-
domains:
The following are some of the advantages of putting cybersecurity in place and
keeping it up to date:
Honeypots are attack targets that are set up to see how different attackers attempt
exploits. Private firms and governments can utilize the same concept to evaluate their
vulnerabilities, which is widely used in academic settings.
11. Differentiate between Vulnerability Assessment and Penetration
Testing.
Vulnerability assessment and penetration testing are two different phrases that both
serve the same purpose: to secure the network environment.
Vulnerability Assessment is a process for defining, detecting, and prioritizing
vulnerabilities in computer systems, network infrastructure, applications, and other
systems, as well as providing the necessary information to the organization to correct
the flaws.
Penetration Testing is also known as ethical hacking or pen-testing. It's a method of
identifying vulnerabilities in a network, system, application, or other systems in order
to prevent attackers from exploiting them. It is most commonly used to supplement a
web application firewall in the context of web application security (WAF).
A vulnerability scan is similar to approaching a door and checking to see if it is
unlocked before stopping. A penetration test goes a step further, not only checking to
see if the door is unlocked but also opening the door and walking right in.
A null session occurs when a user is not authorized using either a username or a
password. It can provide a security concern for apps because it implies that the person
making the request is unknown.
• Malware
• Cross-Site Scripting (XSS)
• Denial-of-Service (DoS)
• Domain Name System Attack
• Man-in-the-Middle Attacks
• SQL Injection Attack
• Phishing
• Session Hijacking
• Brute Force
14. What do you mean by brute force in the context of Cyber Security?
Shoulder surfing is a form of physical assault that entails physically peering at people's
screens while they type information in a semi-public space.
You can protect yourself from phishing attacks by following these guidelines:
Hashing Encryption
It's the technique of securely encoding
It is a method of converting data to a data such that only the authorized user
smaller fixed value known as the key, which with the key or password can get the
is then used to represent the original data. original data; for everyone else, it seems to
be rubbish.
Hashing Encryption
By whatever method, the hash code or key
cannot be reverted to the original
information. It can only be mapped, and If we know the encryption key and
the hash code is compared; if the hash technique used for encryption, we can
code is the same, the information is easily extract the original data.
identical; otherwise, it is not. It is not
possible to get the original data.
In comparison to encryption, it is more
In comparison to hashing, it is less secure.
secure.
The goal of hashing is to index and retrieve
Encryption transforms data in order to
data from a database. The procedure is
keep it hidden from others.
really quick.
The hashed data is usually short and The length of the encrypted data is not
constant in length. It does not increase in defined. It expands as the amount of data
size as the length of information increases. grows longer.
Eg:- SHA256 algorithm Eg:- RSA, AES algorithm
18. What do you mean by two-factor authentication?
There are a variety of techniques for stopping or preventing brute force attacks.
A robust password policy is the most evident. Strong passwords should be enforced by
every web application or public server. Standard user accounts, for example, must
contain at least eight characters, a number, uppercase and lowercase letters, and a
special character. Furthermore, servers should mandate password updates on a regular
basis.
Brute Force attack can also be avoided by the following methods:-
Secure Socket Layer is a security protocol that is used for the purpose of encryption.
It ensures privacy, data integrity, and authentication in the network like online
transactions.
• Physical layer: This layer allows the transmission of raw data bits over a
physical medium.
• Datalink layer: This layer determines the format of the data in the
network.
• Network layer: It tells which path the data will take.
• Transport layer: This layer allows the transmission of data using
TCP/UDP protocols.
• Session layer: It controls sessions and ports to maintain the connections
in the network.
• Presentation layer: Data encryptions happen in this layer, and it
ensures that the data is in a usable/presentable format.
• Application layer: This is where the user interacts with the application.
HTTP response codes indicate a server’s response when a client makes a request to the server. It
shows whether an HTTP request is completed or not.
1xx: Informational
The request is received, and the process is continuing. Some example codes are:
100 (continue)
102 (processing)
2xx: Success
The action is received, understood, and accepted successfully. A few example codes for this are:
200 (OK)
202 (accepted)
3xx: Redirection
To complete the request, further action is required to take place. Example codes:
302 (found)
The request has incorrect syntax, or it is not fulfilled. Here are the example codes for this:
403 (forbidden)
The server fails to complete a valid request. Example codes for this are:
Man in the Middle attack: The attacker puts himself in the communication between the sender and
the receiver. This is done to eavesdrop and impersonate to steal data.
Phishing: Here, the attacker will act as a trusted entity to perform malicious activities such as getting
usernames, passwords, and credit card numbers.
Rogue Software: It is a fraudulent attack where the attacker fakes a virus on the target device and
offers an anti-virus tool to remove the malware. This is done to install malicious software into the
system.
Malware: Malware is software that is designed to attack the target system. The software can be a
virus, worm, ransomware, spyware, and so on.
Drive-by Downloads: The hacker takes advantage of the lack of updates on the OS, app, or browser,
which automatically downloads malicious code to the system.
DDoS: This is done to overwhelm the target network with massive traffic, making it impossible for
the website or the service to be operable.
Password Attacks: As the name suggests, here, the cyber hacker cracks credentials like passwords.
https://www.interviewbit.com/cyber-security-interview-questions/
https://intellipaat.com/blog/interview-question/cyber-security-interview-questions/