Cybersecurity Interview Questions Flashcards

1
Q

What is Cybersecurity?

A

Cybersecurity is the combination of processes, practices, and technologies designed to protect networks, computers, data, and information from attack, damage, or unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do you have on your home network?

A

Active Directory, Domain controller, firewall, Nas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between Symmetric and Asymmetric Encryption?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the CIA triad

A

The CIA Triad for InfoSec, provides a baseline standard for evaluating and implementing information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a:

Risk

Vulnerability

Threat

A

Risk refers to a potential for loss or damage when a threat exploits a vulnerability.

Vulnerability refers to the weakness of an asset (resource) that can be exploited by one or more attackers or threat actors.

Threat refers to someone with the potential to do harm to a system or an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you report Risk?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between an IDS and an IPS?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some cybersecurity frameworks?

A

The Framework is a volutary guidance, based on existing guildlines, and practices for organizations to better manage and reduce cybersecurity risk.

PCI DSS

ISO (international organization for standardization) 27001/27002

CIS Critical Security Controls

NIST Framework

Hitrust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What Port Do You Ping Over?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Weak Information Security?

A

Information security policy is considered to be weak if it does not meet the criteria of an effective one.

The criteria includes: Distribution, review, comprehension, compliance, and, uniformity.

The policy has not been made readily available for review by every employee.

The organization can not demonstrate that employees can review and understand the policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain SSL encryption

A

SSL (Secure Socket Layer) is a protocol that enables safe conversations between two or more parties.

It is designed to identify and verify that the person you are talking to on the other end is who they say they are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is HTTPS?

A

HTTPS (Hypertext Transfer Protocol Secure) is HTTP combined with SSL which provides you with a safer browsing experience with encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which is more secure SSL or TLS?

A

SSL is meant to verify the sender’s ID, but it doesn’t search for any more hazards.

TLS is another identification tool just like SSL, but it offers better security features. It provides additional protection to the data and hence SSL and TLS are often used together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can Identity theft be prevented?

A
  • Strong and unique password
  • Avoid sharing confidential information
  • Two Factor
  • Use the latest version of browsers
  • Install advanced malware and spyware tools
  • Appy updates and patches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you prevent Man in the middle (MITM) Attacks?

A

Use encryption

Avoid open Wi-Fi networks

Use VPN’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

State the difference between encoding, hashing, and encryption?

A

Encoding Converts the data in the desired format required for exchange between different systems.

Hashing Maintains the integrity of a message or data. Any change in any way will change the hash.

Encryption Ensures the data is secure and one needs a digital verification code or image in order to open or access it.

17
Q

Application Security

A

Application security is the practice of improving the security of applications using software, hardware, and other procedural methods.

Countermeasures are taken to ensure application security, the most common being an application firewall (WAF) that limits the execution of files or the handling of data by specific installed programs.

18
Q

Common Cyber Threats

A

Malware

Phishing

Password attacks

DDoS

Man in the Middle (MITM)

Drive-by Downloads

Malvertising

Rogue Software

19
Q

OSI model

A

Application Layer

Presentation Layer

Session Layer

Transport Layer

Network Layer

Data Link Layer

Physical Layer

20
Q

What is Cross-Site Scripting (XSS)

A

XSS refers to client-side code injection attacks wherein an attacker can execute malicious code into a legitimate website or web application.

XSS is amongst the most rampant of web application vulnerabilities and occurs when a web application makes use of unvalidated or unencoded user input.

21
Q

What is the difference between Cybersecurity and Network Security

A

Cybersecurity Describes the policies and procedures implemented by a network administrator to avoid and keep track of unauthorized access, exploitation, modification, or denial of the network and network resources.

Network Security The process and practices designed to protect networks, computers, programs and data from attack, damage, or unauthorized access.

22
Q

What protocols fall under TCP/IP internet protocol layer?

A
23
Q

Incident response Metrics

TTD

TTR

TTE

A

Time to Detect

Time to Respond

Time to Eradicate

24
Q

What Is SSL

A

SSL is a standard security technology for creating an encrypted link between clients and servers.

25
Q

Is Cloud Computing a Security Risk?

A

Even in 2018 and 2019, cloud computing is still a risk. While there are many potential dangers involved with cloud computing, it is really up to the cloud computing customer to ensure information security. These considerations really depend upon the nature of the business as well the data being stored, so a good CISO would have to make these decisions on a case-by-case basis.

26
Q

Have You Ever Been Faced With a Situation Where You Had To Modify a Security Policy and Why?

A
27
Q

Can You Describe an Example of a Security Issue at a Previous Position and How You Managed It?

A
28
Q

Tell Me About a Time When You Had to Collaborate With Stakeholders to Establish an Information Security Risk Management Program.

A

Risk Management process

29
Q

How Important Is Security Awareness Training for Your Management Style?

A

Extremely Important…

Culture is Key

30
Q

What Challenges Do You Foresee in This Position?

A
31
Q

Does Just-In-Time Training Have a Place at an Organization You Work For?

A
32
Q

Give Me an Example of a New Technology You Want to Implement for Information Security.

A
33
Q

How Would You Describe a Strong Organization Information Security Program?

A
34
Q

What KPIs or Metrics Do You Use to Measure the Effectiveness of an Information Security Program?

A

When you are presented with a question like this, it’s really trying to get to the heart of the skills that you are bringing to the job. The best way to go with this question is to use a two-factor approach – productivity and recovery.

A good information security program will improve productivity as security improves. On the same note, a well-rounded information security program will allow for a quick recovery without hindering productivity or shareholder interests.

35
Q

If You Were Going to Encrypt and Compress Data for a Transmission, Which Would You Do First?

A

Questions regarding the technical aspect of information security are definitely fair game. This is especially the case, as the CISO is the brain of the information security operation of an organization. You would, of course, want to compress data before encryption because encrypting data first would reduce the effectiveness of the encryption.