
Prepare your resume. (100%)
What is cybersecurity?
What are the three triads?
Can you explain the CIA concept? Provide an example.
What is an AV (Anti Virus)?
What's the distinction between a Signature and a hash value?
How does AV work?
What is an on-demand scan?
What is a scheduled scan? (Occurs once a month)
Could you explain HIPS, NIPS, and NIDS?
What is the purpose of a signature file?
What does behavior-based mean?
What are the different types of malware?
Can you explain the difference between a Virus and Malware?
What is a RAT (Remote Access Trojan)?
Define EDR and provide examples.
What is Gartner known for?
Explain the concept of sandboxing using a bomb example. What are Honeypot and Honeynet?
What is Global Threat Intelligence?
How does SPLUNK use CISCO Talos (GTI Tool)?
What distinguishes AV from EDR (Endpoint Detection and Response)?
What is NIDS (Network Intrusion Detection System)?
Explain the Deep Web and Dark Web. What about the Dark Net?
Define IPS and IDS.
Could you differentiate between Encryption and Cryptography?
What occurs during an SSL handshake?
Where is the TCP handshake typically used?
What is KERBEROS used for?
Can you describe the client-server model?
Why is a subnet mask used?
What is a gateway, and what role does it play in data flow?
Can you list commonly used ports and protocols?
Explain the concepts of Protocol and rules.
Could you describe TCP header packets and flags?
What is SNMP (Simple Network Management Protocol)?
Define Syslog.
Explain IAAA and CIA in the context of security.
What is an access control list used for?
Differentiate between Vulnerability, Risk, and Threat.
What is a ZERO DAY attack?
Define security and endpoint security.
Explain the terms Sniffing and Spoofing.
Contrast Denial of Service (DOS) with Distributed Denial of Service (DDOS).
What is a rootkit?
Could you provide examples of different types of attacks?
What do IDS, IPS, HIDS, HIPS, NIDS, and NIPS stand for?
What is the difference between CAT 6 and Coaxial cables?
How can you determine if an email is phishing or legitimate?
Enumerate various types of phishing.
What protocols are part of the OSI model?
What is LDAP (Lightweight Directory Access Protocol)?
Describe different types of storage.
Differentiate between threads and computer processes.
Why deploy a local DNS server?
Explain the client-server model in detail.
What is the boot sequence during system startup?
Define File Hashing.
What is User Access Control?
Compare Vulnerability Assessment (VA) and Penetration Testing (PT).
What are blue teams and red teams in cybersecurity?
Can you elaborate on various VA types (Internal, External, Active, Passive)?
Describe Back, Grey, and White box testing.
List common VA tools.
Explain different types of attacks.
Define Authentication.
What does AAA stand for in networking?
Explain SSL (Secure Sockets Layer).
Define TLS (Transport Layer Security).
What are CVSS and CVE?
What is NVD (National Vulnerability Database)?
What security practices would you advise a client to follow?
List some of the penetration testing tools you are familiar with.
Name internationally common security policies.
What is a Honeypot, and how is hacker activity trapped using it?
Explain what a Honeynet is and how it relates to honeypots.
Describe the purpose of a proxy server.
What are the Dark Web and Darknet?
Explain what VPN (Virtual Private Network) is.
Contrast VPN and VLAN.
How do IPS and IDS work?
Differentiate between Encryption and Encoding.
What is Data Loss Prevention (DLP)?
Enumerate the three modes of data loss.
What DLP type might your organization require?
List some features of DLP.
How can you prevent Data Loss?
What does OU stand for in network administration?
What's the difference between SOC and NOC?
Define false positive.
What steps would you take after a security breach?
Define and distinguish between spoofing and sniffing.
Explain the terms HTTP, HTTPS, and SSL.
Differentiate between LAN, WAN, CAN, PAN, MAN, SAN, and VLAN.
What networking devices are you familiar with?
What is TELNET used for?
Explain the function of a Router.
What is the purpose of the Ping command?
Describe the role of a proxy server.
Explain what a load balancer does.
Define NAT and PAT in networking.
What is the concept of RAID in data storage?
Explain RAID 0, 1, 5, 6, 10, 50, and 60.
Define a firewall and detail rules for a new one.
What is WIFI, and how does it work?
Define DDNS (Dynamic DNS).
What is cache memory?
List different types of cables used for data transfer.
Describe the CPU cooling system.
Explain HTTP, HTTPS, and SSL.
Define LAN, WAN, CAN, PAN, MAN, SAN, and VLAN.
What is network topology?
What is SSH (Secure Shell)?
Differentiate between FTP, SFTP, and TFTP.
What is a DMZ (Demilitarized Zone)?
Define BIOS, CMOS, and UEFI.
Explain SAN and NAS.
List different types of video cables (HDMI, VGA, DVI).
What is ARP (Address Resolution Protocol)?
Explain SMTP, POP3, and IMAP.
How is a Modem different from a Router?
Name different types of servers (Print, Mail, File, Web, etc.).
Differentiate between HDD and SSD.
What is port forwarding?
Define RAM (Random Access Memory).
Explain IPV4 and IPV6, including the ranges of A, B, C, D, and E?

Comments