1 / 9

15 Most Asked Cybersecurity Interview Questions and its Answers

Top 15 must-know cyber security questions and answers in 2018 have been discussed here that would help you clear the interview at the first attempt and fetch you a rewarding job.

seema1
Télécharger la présentation

15 Most Asked Cybersecurity Interview Questions and its Answers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. www.mercurysolutions.co 15 Must-Know Cyber Security Interview Questions and Answers Cybersecurity is the one word that is failing to go unnoticed. It is indeed creating noise in the news or media or the office next door every other day or the moment. And it is expected for, in this digital era. At this crossroad, it is becoming an unwritten command that one has to be aware of certain basic things/issues of cyber security though might not be directly engaged with. Accordingly, top 15 must-know Cyber Security Questions and Answers in 2018 have been discussed here that would help you clear the interview at the first attempt and fetch you a rewarding job. The discipline cybersecurity is evolving at a faster pace and connected people are getting more concerned. Every day, we witness a major headline regarding

  2. www.mercurysolutions.co cybersecurity. Evidently, the field is becoming difficult to understand or navigate. All things considered, before moving to a complete sustainable solution, the need of the hour is an increased awareness. The pathetic situation is that cybersecurity is more of personal and business concern, rather than just a technology concern. Accordingly, the most commonly asked inquiries and answers related to cybersecurity have been briefed here. 1. What should I do to encrypt my email transmissions 1. What should I do to encrypt my email transmissions? ? Pretty Good Privacy [PGP] is a software that could be used to encrypt email transmissions. It is used to sign, encrypt, decrypt the emails, files, texts, directories, data, and the whole disk partition. Most of the companies today choose PGP to encrypt their communication. The PGP uses a secret private key and a public key that is shared by the sender and the receiver. The receiver is able to verify the identity of the sender and the content integrity. The receiver would know if the mail has tampered en route. Schematic representation of the PGP principle: 2. How can I securely access my computer desktop from a remote 2. How can I securely access my computer desktop from a remote device device? ? You may connect with your desktop through any device connected to the Internet. A few of the popular software and web service option that facilitate the connection includes TeamViewer, LogMeIn, GoToMyPC, and, etc. This software facilitates easy transfer of file[s], make a video chat and mobile apps. It is useful to access your PC while on move.

  3. www.mercurysolutions.co 3. What is the protocol that bro 3. What is the protocol that broadcast the messages across all the adcast the messages across all the devices devices? ? Internet Group Management Protocol [IGMP] is the communication protocol which is used in video or game streaming. This communication protocol facilitates the communication devices and the adjacent routers to send packets across the network. 4. What is used to hide the message in cryptography 4. What is used to hide the message in cryptography? ? The cipher, an algorithm is used to perform the encryption or the decryption. It is used to protect the e-mail messages, corporate data, and the credit card information. Only, the sender and the receiver are able to read the message. 5. What is social engineering attack 5. What is social engineering attack? ? With reference to Information security, it is an act of psychological manipulation of the human to divulge for confidential data. Social engineering mainly relies on the 6 principles of influence that includes Authority, Commitment and consistency, Liking, Reciprocity, Scarcity and Social Proof.  Authority: People tend to obey their authority figures even if they may not be willing for objectionable acts.  Commitment and Consistency: People are likely to honor their commitment even if the original motivation has been removed as a matter of self-image.  Liking: People get persuaded to get into act easily if they like the person and is asked by the person to do so.  Reciprocity: People are generally reciprocal. They tend to return the favor they had received prior and indulge as directed.

  4. www.mercurysolutions.co Scarcity: The scarcity generates demand even though it may be real or perceived. It kindles the person to perform as directed.   Social Proof: It is generally agreed that people tend to perform things if others are also doing. It is matching of the attitudes, behavior as per the group norms. 6. What are the risks if I use public Wi 6. What are the risks if I use public Wi- -Fi Fi? ? It is the general tendency of the public to prefer Wi-Fi in spite of having independent data plans as it is faster and free. However, Wi-Fi comes with certain security issues. A few of the public Wi-Fi attack includes brute-force attacks, war-driving, sniffing, karma attack, and, etc. it would definitely obstruct the data that is conveyed through the router like the passwords, emails, addresses, credit card data, browsing history, and, etc. This could be minimized by using routers that are encrypted with WPA2 alone. And, when connected to public Wi-Fi it is suggested to take the following steps. Turn-off the public networking sharing of the data.   Enable the firewall at all times  Use only the secure websites for sensitive operations.  Encrypt the IP address by using the Virtual Private Network [VPN].  Do not forget to turn-off the Wi-Fi once work is done.  Keep your system always updated to latest version and patch-up.  Keep your system free of malware by using the latest and reliable antivirus.  Browse the sites only with a good anti-spyware solution[s].  Avoid any kind of financial transactions on public Wi-Fi unprotected.  Ensure you have the latest browser with the security patches.  Use the two-factor authentication factor as an extra security measure.

  5. www.mercurysolutions.co 7. I am using an unsecured Wi 7. I am using an unsecured Wi- -Fi from my neighbor. Is it possible Fi from my neighbor. Is it possible for them to get access to my login ID and password for them to get access to my login ID and password? ? Yes, it is possible to access your IP address, passwords, GPS tracking, and so forth. It could be a trap like the Honeypot, set up to detect the data or neutralize the attempts of using the neighbor’s network unrightfully. In case the neighbor is tech-savvy, there is every chance that the connection could be used to hack the device, gain access to the system, or attribute the unwanted browsing history to you. 8. Why Mac OS is reliable 8. Why Mac OS is reliable? ? Till date, there are no cybersecurity solutions that would claim 100% safe. Still as compared to Windows, the prevalence of cyber-attack may be lesser in Mac OS. The Macs run on Apple computers and thus are less prone to hardware/software crashing. 9. What is a Firewall 9. What is a Firewall? ? A firewall is a device placed on the boundary of the trusted and untrusted networks. One can set or define the rules that allow or blocks the traffic accordingly. 10. How to pr 10. How to prevent identity thefts event identity thefts? ? Identity theft refers to the acquisition of personal data of the victim and uses it for illegal purposes. It is the most common type of fraud that may lead to financial losses and at times may be held responsible for criminal actions as the victim might be personified. A few of steps to follow in order to prevent identity thefts include: Ensure the strong and unique password   Avoid postings of confidential information online

  6. www.mercurysolutions.co  Do not post personal information on social media  Shop from known and trusted websites  Use the latest version of the browsers  Install advanced malware and spyware tools  Use specialized security solutions against financial data  Always update your system and the software  Protect the social security number  Download only the well-known apps and share limited details  11. Is social media secure 11. Is social media secure? ? The online social sites like the Facebook, Twitter, LinkedIn, Instagram, and so forth are becoming more agreeable for networking, business communications, and professional benefits creating a major and direct impact of our life activities. Though the extent of networking is favorable and appreciated, it is creating space for intruders too. As we find headlines about data breach through social media, the use of social networking is getting reconsidered. However, there are measures to stay safe on social media. The possible risks are hacking, identity theft, bullying, standing, damage reputation, impersonators, and, etc. A few of the measures to follow includes: Avoidance of sharing personal things   Limiting the details about work in LinkedIn  Screening of images or any personal news before posting  Educating oneself about the rules followed in social postings  Connect with only trusted people  Have stronger and unique passwords for different social channels

  7. www.mercurysolutions.co It is recommended to be generic on social media   And more 12. What is data leakage 12. What is data leakage? ? The movement of data out of the organization in an unauthorized way is data leakage. The information could be from a computer or the data center itself. The leakage is generally accomplished by physical removal of disks, reports, tapes, paper works, data hiding, and, etc. A few of the measures to prevent data leakage are briefed below. Schedule fire drill at regular intervals in order to restore the data   Placing the computers in a safe and conditioned environment to avoid any damage  Backup the data regularly to avoid the loss for any reasons  Possession of a battery or generator back up  Protect the assets from static electricity that may erase data or damage the physical components  Restricted use of Internet uploads and websites  Have an internal encryption solution  Restriction of mail to internal networks alone  Restriction of having hardcopy or printouts of the confidential data 13. What are a risk, vulnerability, and threat 13. What are a risk, vulnerability, and threat? ? Vulnerability means weakness. It refers to the gap between the protection efforts of a system and the attacker who can exploit the weak points. A risk is nothing but a measure that determines the potential loss that would occur if the vulnerability gets exploited.

  8. www.mercurysolutions.co Threat refers to something that has all the potential to deliver serious damage to the computer systems, networks, and, etc. some of the threats include spyware, key logger, backdoor, and, etc. 14. How can I keep myself updated with news on Information 14. How can I keep myself updated with news on Information Security Security? ? It is recommended to surf the Internet and follow a few numbers of security forums. Have regular reading from sites like the hacker news, Pentest mag, and, etc. It will keep you updated with the latest trends and incidents happening in the market. 15. What are the ways to gain personal achievement 15. What are the ways to gain personal achievement? ? Certain basic courses related to cybersecurity are best recommended for any professional irrespective of the job role. A person need not be a cybersecurity specialist to hold the certification. Certain certifications are generic and deal with common and best practices one has to follow so as to keep safe from the cyber threats. To be simple and relevant, earning a security certification could be one of personal achievement. It validates your knowledge, skills and helps to be aware of your own surroundings and measures to protect from it.

  9. www.mercurysolutions.co Though there are several other in-depth questions related to cybersecurity, these are some of the basic cybersecurity interview questions one has to know irrespective of work profile. You may get in touch with us for any other specified queries regarding cybersecurity and its related training. Mercury Solutions Limited provides world-class IT training programs and certifications like- VMware PMP CISSP CEH Oracle Microsoft

More Related