Interview Questions Part 1
Interview Questions Part 1
2. What does the CIA triad stand for, and why is it important?
The CIA triad consists of three key components: Confidentiality, Integrity, and
Availability. These principles guide cybersecurity practices by ensuring that sensitive
data remains private, unaltered, and accessible to authorized users when needed.
3. Can you explain the difference between a vulnerability, a threat, and a risk?
The main security layers include network security, application security, data security,
endpoint protection, and physical security. These layers work together to establish a
robust defence strategy.
TOP 100 INTERVIEW QUESTIONS PART 1
MFA is a security measure that requires users to verify their identity through two or
more factors, such as a password (something you know), a physical token (something
you have), or biometrics (something you are). It reduces the risk of unauthorized
access by adding multiple layers of security.
The principle of least privilege dictates that users should only have the minimum level
of access required to perform their tasks. This minimizes the potential for accidental
or malicious misuse of privileges.
TOP 100 INTERVIEW QUESTIONS PART 1
A firewall acts as a security barrier that monitors and controls network traffic based on
predefined rules. Its primary role is to protect systems from unauthorized access by
filtering incoming and outgoing data.
The Domain Name System (DNS) converts human-readable domain names (e.g.,
www.example.com) into IP addresses, enabling devices to locate and communicate
with websites and services.
The TCP three-way handshake establishes a reliable connection between a client and
a server through three steps:
A Demilitarized Zone (DMZ) is a buffer network that separates internal systems from
untrusted external networks (e.g., the internet). It provides an additional layer of
security by isolating critical resources.
NAT masks internal IP addresses by translating them into a single public IP address,
reducing the exposure of internal systems to external threats.
ARP poisoning involves manipulating the ARP cache to intercept or redirect traffic.
Preventive measures include using static ARP entries, enabling encrypted traffic, and
deploying dynamic ARP inspection.
19. What is MAC flooding, and what impact does it have on network switches?
MAC flooding overwhelms a switch's MAC address table, causing it to broadcast all
traffic to every port, which can be mitigated by enabling port security to limit the
number of MAC addresses per port.
• Stateful firewalls: Track the state of active connections and allow or block traffic
based on connection context.
• Stateless firewalls: Filter traffic solely based on predefined rules, without considering
the connection state.
TOP 100 INTERVIEW QUESTIONS PART 1
Hashing is a one-way process that converts data into a fixed-length string, primarily
used for verification. Encryption, on the other hand, is a reversible process that
secures data by transforming it into an unreadable format, which can be decrypted
with the correct key.
A digital signature is a cryptographic tool that verifies the authenticity and integrity of
a message or document. It works by using the sender’s private key to create the
signature, which can be validated with their public key.
PKI is a framework that manages public-key encryption through the use of digital
certificates, certificate authorities, and secure key management to ensure secure
communication.
Protocols like Diffie-Hellman and RSA facilitate secure key exchanges by enabling
parties to share public keys while keeping private keys confidential.
TOP 100 INTERVIEW QUESTIONS PART 1
27. What are rainbow tables, and how can they be countered?
Steganography conceals information within other files or media, making its presence
undetectable, while cryptography secures information by converting it into an
unreadable format.
By validating the certificate’s signature using the issuing certificate authority’s public
key and ensuring it hasn’t expired or been revoked.
PFS ensures that even if a private key is compromised, past communications remain
secure by generating unique session keys for each connection.
31. What is the distinction between a public key and a private key in asymmetric
encryption?
A public key is used to encrypt data and can be shared freely, while a private key
decrypts the data and must remain confidential to ensure secure communication.
TOP 100 INTERVIEW QUESTIONS PART 1
A buffer overflow occurs when more data is written to a buffer than it can hold,
potentially overwriting adjacent memory and allowing attackers to execute malicious
code or crash the system.
SQL Injection is a type of attack where malicious SQL code is inserted into input fields
or queries, enabling attackers to manipulate the database, extract sensitive
information, or execute unauthorized commands.
DNS Spoofing, also known as DNS cache poisoning, involves altering DNS records to
redirect users to fraudulent websites, often used in phishing or malware distribution.
While the former highlights security risks, the latter provides a detailed map of
network components.
• Virus: Attaches itself to a host file or program and requires user action to spread.
• Worm: A standalone malware that replicates itself across networks without needing a
host, spreading autonomously.
41. What is phishing, and how can organizations protect against it?
Phishing is a social engineering attack where victims are tricked into providing
sensitive information, such as login credentials or financial details. Organizations can
combat phishing through employee training, email filtering, multi-factor
authentication (MFA), and regular phishing simulations.
TOP 100 INTERVIEW QUESTIONS PART 1
43. What is a Distributed Denial of Service (DDoS) attack, and how is it mitigated?
A DDoS attack overwhelms a target system or network with excessive traffic from
multiple sources, causing it to become inaccessible. Mitigation techniques include
traffic filtering, rate limiting, using content delivery networks (CDNs), and deploying
specialized anti-DDoS solutions.
Privilege escalation occurs when an attacker gains higher access levels than initially
authorized. It can be:
46. What are zero-day vulnerabilities, and how can they be mitigated?
Zero-day vulnerabilities are software flaws unknown to the vendor, with no available
patches. They are exploited by attackers before discovery or remediation. Mitigation
strategies include using intrusion detection systems, threat intelligence, and
promptly patching software as updates become available.
While both are forms of malware, a worm operates independently, spreading across
networks without requiring a host program. In contrast, a virus attaches to a
legitimate file or program and requires user action to propagate.
TOP 100 INTERVIEW QUESTIONS PART 1