top of page
Biswajit Logo

125+ Cybersecurity Interview questions

Writer's picture: Biswajit SahuBiswajit Sahu

Updated: Aug 26, 2023




  • Prepare your resume. (100%)

  • What is cybersecurity?

  • What are the three triads?

  • Can you explain the CIA concept? Provide an example.

  • What is an AV (Anti Virus)?

  • What's the distinction between a Signature and a hash value?

  • How does AV work?

  • What is an on-demand scan?

  • What is a scheduled scan? (Occurs once a month)

  • Could you explain HIPS, NIPS, and NIDS?

  • What is the purpose of a signature file?

  • What does behavior-based mean?

  • What are the different types of malware?

  • Can you explain the difference between a Virus and Malware?

  • What is a RAT (Remote Access Trojan)?

  • Define EDR and provide examples.

  • What is Gartner known for?

  • Explain the concept of sandboxing using a bomb example. What are Honeypot and Honeynet?

  • What is Global Threat Intelligence?

  • How does SPLUNK use CISCO Talos (GTI Tool)?

  • What distinguishes AV from EDR (Endpoint Detection and Response)?

  • What is NIDS (Network Intrusion Detection System)?

  • Explain the Deep Web and Dark Web. What about the Dark Net?

  • Define IPS and IDS.

  • Could you differentiate between Encryption and Cryptography?

  • What occurs during an SSL handshake?

  • Where is the TCP handshake typically used?

  • What is KERBEROS used for?

  • Can you describe the client-server model?

  • Why is a subnet mask used?

  • What is a gateway, and what role does it play in data flow?

  • Can you list commonly used ports and protocols?

  • Explain the concepts of Protocol and rules.

  • Could you describe TCP header packets and flags?

  • What is SNMP (Simple Network Management Protocol)?

  • Define Syslog.

  • Explain IAAA and CIA in the context of security.

  • What is an access control list used for?

  • Differentiate between Vulnerability, Risk, and Threat.

  • What is a ZERO DAY attack?

  • Define security and endpoint security.

  • Explain the terms Sniffing and Spoofing.

  • Contrast Denial of Service (DOS) with Distributed Denial of Service (DDOS).

  • What is a rootkit?

  • Could you provide examples of different types of attacks?

  • What do IDS, IPS, HIDS, HIPS, NIDS, and NIPS stand for?

  • What is the difference between CAT 6 and Coaxial cables?

  • How can you determine if an email is phishing or legitimate?

  • Enumerate various types of phishing.

  • What protocols are part of the OSI model?

  • What is LDAP (Lightweight Directory Access Protocol)?

  • Describe different types of storage.

  • Differentiate between threads and computer processes.

  • Why deploy a local DNS server?

  • Explain the client-server model in detail.

  • What is the boot sequence during system startup?

  • Define File Hashing.

  • What is User Access Control?

  • Compare Vulnerability Assessment (VA) and Penetration Testing (PT).

  • What are blue teams and red teams in cybersecurity?

  • Can you elaborate on various VA types (Internal, External, Active, Passive)?

  • Describe Back, Grey, and White box testing.

  • List common VA tools.

  • Explain different types of attacks.

  • Define Authentication.

  • What does AAA stand for in networking?

  • Explain SSL (Secure Sockets Layer).

  • Define TLS (Transport Layer Security).

  • What are CVSS and CVE?

  • What is NVD (National Vulnerability Database)?

  • What security practices would you advise a client to follow?

  • List some of the penetration testing tools you are familiar with.

  • Name internationally common security policies.

  • What is a Honeypot, and how is hacker activity trapped using it?

  • Explain what a Honeynet is and how it relates to honeypots.

  • Describe the purpose of a proxy server.

  • What are the Dark Web and Darknet?

  • Explain what VPN (Virtual Private Network) is.

  • Contrast VPN and VLAN.

  • How do IPS and IDS work?

  • Differentiate between Encryption and Encoding.

  • What is Data Loss Prevention (DLP)?

  • Enumerate the three modes of data loss.

  • What DLP type might your organization require?

  • List some features of DLP.

  • How can you prevent Data Loss?

  • What does OU stand for in network administration?

  • What's the difference between SOC and NOC?

  • Define false positive.

  • What steps would you take after a security breach?

  • Define and distinguish between spoofing and sniffing.

  • Explain the terms HTTP, HTTPS, and SSL.

  • Differentiate between LAN, WAN, CAN, PAN, MAN, SAN, and VLAN.

  • What networking devices are you familiar with?

  • What is TELNET used for?

  • Explain the function of a Router.

  • What is the purpose of the Ping command?

  • Describe the role of a proxy server.

  • Explain what a load balancer does.

  • Define NAT and PAT in networking.

  • What is the concept of RAID in data storage?

  • Explain RAID 0, 1, 5, 6, 10, 50, and 60.

  • Define a firewall and detail rules for a new one.

  • What is WIFI, and how does it work?

  • Define DDNS (Dynamic DNS).

  • What is cache memory?

  • List different types of cables used for data transfer.

  • Describe the CPU cooling system.

  • Explain HTTP, HTTPS, and SSL.

  • Define LAN, WAN, CAN, PAN, MAN, SAN, and VLAN.

  • What is network topology?

  • What is SSH (Secure Shell)?

  • Differentiate between FTP, SFTP, and TFTP.

  • What is a DMZ (Demilitarized Zone)?

  • Define BIOS, CMOS, and UEFI.

  • Explain SAN and NAS.

  • List different types of video cables (HDMI, VGA, DVI).

  • What is ARP (Address Resolution Protocol)?

  • Explain SMTP, POP3, and IMAP.

  • How is a Modem different from a Router?

  • Name different types of servers (Print, Mail, File, Web, etc.).

  • Differentiate between HDD and SSD.

  • What is port forwarding?

  • Define RAM (Random Access Memory).

  • Explain IPV4 and IPV6, including the ranges of A, B, C, D, and E?




Comments


bottom of page