Cybersecurity Interview Questions Flashcards
(35 cards)
What is Cybersecurity?
Cybersecurity is the combination of processes, practices, and technologies designed to protect networks, computers, data, and information from attack, damage, or unauthorized access.
What do you have on your home network?
Active Directory, Domain controller, firewall, Nas
What is the difference between Symmetric and Asymmetric Encryption?

What is the CIA triad
The CIA Triad for InfoSec, provides a baseline standard for evaluating and implementing information security.

What is a:
Risk
Vulnerability
Threat
Risk refers to a potential for loss or damage when a threat exploits a vulnerability.
Vulnerability refers to the weakness of an asset (resource) that can be exploited by one or more attackers or threat actors.
Threat refers to someone with the potential to do harm to a system or an organization.
How do you report Risk?

What is the difference between an IDS and an IPS?

What are some cybersecurity frameworks?
The Framework is a volutary guidance, based on existing guildlines, and practices for organizations to better manage and reduce cybersecurity risk.
PCI DSS
ISO (international organization for standardization) 27001/27002
CIS Critical Security Controls
NIST Framework
Hitrust
What Port Do You Ping Over?
What is Weak Information Security?
Information security policy is considered to be weak if it does not meet the criteria of an effective one.
The criteria includes: Distribution, review, comprehension, compliance, and, uniformity.
The policy has not been made readily available for review by every employee.
The organization can not demonstrate that employees can review and understand the policy.

Explain SSL encryption
SSL (Secure Socket Layer) is a protocol that enables safe conversations between two or more parties.
It is designed to identify and verify that the person you are talking to on the other end is who they say they are.
What is HTTPS?
HTTPS (Hypertext Transfer Protocol Secure) is HTTP combined with SSL which provides you with a safer browsing experience with encryption.
Which is more secure SSL or TLS?
SSL is meant to verify the sender’s ID, but it doesn’t search for any more hazards.
TLS is another identification tool just like SSL, but it offers better security features. It provides additional protection to the data and hence SSL and TLS are often used together.
How can Identity theft be prevented?
- Strong and unique password
- Avoid sharing confidential information
- Two Factor
- Use the latest version of browsers
- Install advanced malware and spyware tools
- Appy updates and patches
How can you prevent Man in the middle (MITM) Attacks?
Use encryption
Avoid open Wi-Fi networks
Use VPN’s
State the difference between encoding, hashing, and encryption?
Encoding Converts the data in the desired format required for exchange between different systems.
Hashing Maintains the integrity of a message or data. Any change in any way will change the hash.
Encryption Ensures the data is secure and one needs a digital verification code or image in order to open or access it.
Application Security
Application security is the practice of improving the security of applications using software, hardware, and other procedural methods.
Countermeasures are taken to ensure application security, the most common being an application firewall (WAF) that limits the execution of files or the handling of data by specific installed programs.
Common Cyber Threats
Malware
Phishing
Password attacks
DDoS
Man in the Middle (MITM)
Drive-by Downloads
Malvertising
Rogue Software

OSI model
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer

What is Cross-Site Scripting (XSS)
XSS refers to client-side code injection attacks wherein an attacker can execute malicious code into a legitimate website or web application.
XSS is amongst the most rampant of web application vulnerabilities and occurs when a web application makes use of unvalidated or unencoded user input.
What is the difference between Cybersecurity and Network Security
Cybersecurity Describes the policies and procedures implemented by a network administrator to avoid and keep track of unauthorized access, exploitation, modification, or denial of the network and network resources.
Network Security The process and practices designed to protect networks, computers, programs and data from attack, damage, or unauthorized access.
What protocols fall under TCP/IP internet protocol layer?

Incident response Metrics
TTD
TTR
TTE
Time to Detect
Time to Respond
Time to Eradicate
What Is SSL
SSL is a standard security technology for creating an encrypted link between clients and servers.