Interview Questions Flashcards

1
Q

What is the difference between encryption and hashing?

A

Main idea of encryption is to protect the confidentiality of data.
- Only person with the encryption key can access.
- Good for web traffic, email, data storage

Main idea of hashing is to protect the integrity of data
- Good for passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between home network and home lab?

A

Home Network - daily use, plug and play devices
Home Lab - learning, testing, and experimenting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the OSI model?

A
  1. Physical Layer - Transmits raw bit stream over the physical medium
  2. Data Link Layer - Defines the format of data on the network
  3. Network Layer - Physical path the data will take
  4. Transport Layer - TCP and UDP
  5. Session Layer - maintaining connections
  6. Presentation Layer - Ensure that data is in usable format and where encryption is
  7. Human computer interaction

Provides a method of computing and networking communication. Used to help identify and deal with issues regarding out devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which is more secure, open or closed source?

A

It depends
- Open source maybe if your network is on the public and you want everyone helping you fix it
- Closed source maybe if you are a nation state and want to protect your zero-day attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the best security framework?

A

It Depends:
NIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary goal of IT security?

A

Protect business assets which include:
- Customers and their data
- Company secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Where do you get your IT/Cyber news?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a risk? what is a threat? what is a vulnerability?

A

Risk:
- Potential loss of damages

Threat:
- Anything that can explot a vulnerability to cause harm, hackers, insiders, malware

Vulnerability:
- a weakness in your system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Should you compress or encrypt first?

A

Compress then encrypt
- Compression looks at repeating patterns to reduce size, encrypting data is random
- Compression reduces the size and making it faster to encrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between TCP and UDP?

A

TCP tries to establish a connection first, typically used in messaging apps

UDP is a connectionless, you would typically use this for videos, streaming,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between symmetric and asymmetric encryption?

A

Symmetric: One key for both encryption/decryption (faster).

Asymmetric: Public key encrypts, private key decrypts (used in SSL, email).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does hashing differ from encryption?

A

Hashing: One-way, fixed output (e.g., SHA-256), used for integrity.

Encryption: Two-way, reversible if you have the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is MFA? and why is it important?

A

Requires two or more types of authentication:

Something you know (password)

Something you have (phone)

Something you are (fingerprint)

Adds an extra layer of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are common types of malware and how do they differ?

A

Virus: Needs a host file.

Worm: Spreads without help.

Trojan: Disguised as legit software.

Ransomware: Locks data until paid.

Spyware: Secretly monitors activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a port number? Give examples of common ones.

A

Port = logical endpoint for communication.

Ex: 80 (HTTP), 443 (HTTPS), 22 (SSH), 53 (DNS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s the purpose of ARP?

A

ARP maps IP addresses to MAC addresses on a local network.

17
Q
  1. What is the OSI Model?
A

7-layer model to explain network communication.

Layers: Please Do Not Throw Sausage Pizza Away
Physical, Data Link, Network, Transport, Session, Presentation, Application.

18
Q

What is a VLAN and why is it used?

A

VLAN = Virtual LAN. Separates networks logically on the same physical switch.

Improves security and traffic management.

19
Q

If a user reports slow network performance, how would you investigate?

A

Check system performance (CPU, RAM).

Use tools like ping or traceroute.

Look at firewall/router logs.

Rule out malware or unusual traffic.

20
Q

How would you secure a public Wi-Fi network in a small office?

A

Use WPA3 encryption.

Disable SSID broadcast.

Isolate guest and internal networks.

Use a firewall and VLANs.

Enable client isolation.

21
Q

What is Wireshark and what can it be used for?

A

A network protocol analyzer.

It captures and inspects packet-level data to diagnose issues or investigate traffic.

22
Q

Have you used any vulnerability scanning tools (e.g., Nessus)?

A

(If no): I’ve reviewed how scanners like Nessus and OpenVAS work and can identify unpatched systems.

23
Q

What is ARP Poisoning?

A

ARP Poisoning (also called ARP Spoofing) is an attack where the attacker sends fake ARP messages to a network, tricking devices into thinking the attacker’s machine is the default gateway or another trusted device.

24
Q

What is SQL Injection?

A

SQL Injection is a web application attack where the attacker inserts malicious SQL commands into an input field to manipulate or access a database.