Tech Mock Interview Questions Flashcards

1
Q

Question #1: What is the Active Directory (AD)?

A

Answer: The Active Directory is a management tool that controls users and groups within the Windows operating system. It also enables the setting of permissions. It allows the server to function as a Domain Controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s the difference between a Domain and a Workgroup?

A

Answer: A Domain is a type of dedicated server that stores and manages all the devices within a network while a Workgroup is a standalone device located inside the network. Devices inside the network are assigned to the Workgroup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question #3: What is a Group Policy Object (GPO)?

A

Answer: A Group Policy Object (GPO) is a set of rules that’s built-in to the Windows operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question #4: What does the Event Viewer do?

A

Answer: The Event Viewer provides detailed information about events within a group policy. It can be accessed to inspect changes to the Group Policy Object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question #5: What’s the purpose of the Server Message Block (SMB)?

A

Answer:The purpose of the Server Message Block (SMB) is to allow network devices to share resources over the network. It’s a protocol that requires and uses two forms of authentication: Technical Interview Questions: Entry level Kerberos & NTLM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question #6: What kind of firewall does Windows use?

A

Answer: Windows uses a built-in firewall that is host-based and stateful, meaning it inspects and analyzes each packet as it arrives and leaves the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question #7: What is RAID?

A

Answer: RAID (Redundant Array of Independent Disks) is a helpful tool that allows the setup of hard drives that provide redundancy in case of a drive failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question #1: What’s the difference between a LAN and a WAN?

A

Answer: A LAN (Local Area Network) is a network that’s built around a group of devices within a small geographical area such as homes, small businesses, or buildings. On the other hand, a WAN (Wide Area Network) is a network that’s composed of several LANs connected to one another and is not bound by a geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question #2: What is the OSI (Open System Interconnection) model?

A

Answer: The OSI (Open System Interconnection) model is a conceptual model that defines the architecture of a network into a progressive seven-layer framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question #3: What’s a MAC (Media Access Control) address?

A

Answer: A MAC (Media Access Control) address is a unique identifier that belongs to the network card of a specific device. It serves as that device’s hardware ID on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question #4: What’s the difference between a router and a switch?

A

Answer: A switch is a device that allows multiple end devices to connect to the network and communicate with each other while a router allows communication of end devices between different Networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question #5: What is a VLAN (Virtual Local Area Network)?

A

Answer: A VLAN (Virtual Local Area Network) is a virtual subnetwork that’s used to group end devices that communicate frequently in the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question #6: What is an ACL (Access Control List)?

A

Answer: An ACL (Access Control List) is a set of rules to filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question #7: What is NAT (Network Address Translation)?

A

Answer: NAT (Network Address Translation) is a protocol that converts private addresses to public and vice versa. This allows communication between end devices and the Internet and it’s carried out by the router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question #1: What does cloud computing mean?

A

Answer: Cloud Computing refers to a service that’s carried out by a host over the Internet or off premises, therefore being in the “Cloud”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question #2: What is IaaS (Infrastructure as a Service)?

A

Answer: IaaS (Infrastructure as a Service) is a type of cloud service that provides access to resources over the Internet such as hardware, virtualization, and networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Question #3: What are the three types of Cloud Deployment Models?

A

Answer: The three types of Cloud Deployment Models are Public, Private, and Hybrid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Question #4: What is virtualization and how does it affect Cloud services?

A

Answer: Virtualization is the process of creating virtual or logical resources from physical resources. It sets the groundwork for cloud computing as it allows for the creation of a pool of resources that can be shared among devices and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Question #5: What’s a container?

A

Answer: A container is a unit of software that packages up all the code and resources that an application needs to run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Question #6: Name ways to secure the Cloud on the network.

A

Answer: Some of the different ways to secure the Cloud service on the network are by isolating the different types of zones, by applying end-to-end encryption, or to use encapsulation protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Question #7: What is the Internet of Things (IoT)?

A

Answer: The Internet of Things (IoT) refers to the technology that allows devices to connect, communicate, and be operated from the Internet utilizing the cloud computing infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Question #1: What is the kernel?

A

Answer: The kernel establishes the communication between the software and hardware and serves as the core of an operating System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Question #2: Where are system logs stored in Linux?

A

Answer: System logs are stored in the /var folder within the operating system directories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Question #3: Which user has the highest privileges in Linux?

A

Answer: Root users or system users have the highest privileges within the Linux operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Question #4: What does the “sudo” command do?

A

Answer: The sudo command grants root privileges/ permissions to non root users.

26
Q

Question #5: What is SCP (Secure Copy Protocol)?

A

Answer: The SCP (Secure Copy Protocol) is a security protocol that allows for the secure transferring of files between remote or local hosts and is installed on Linux distributions by default; it’s based on the SSH protocol.

27
Q

Question #6: What is Bash Scripting?

A

Answer: Bash Scripting refers to utilizing a series of commands stored in a bash text file to run a particular command or action.

28
Q

Question #7: Why is Grub important in Linux?

A

Answer: Grub is important in Linux because it’s the bootloader that allows for the operating system to run. Without it the Linux kernel cannot communicate properly and start the system.

29
Q

Question #1: What is the difference between ping and traceroute?

A

Answer: The ping command tests network communication by sending packets to a host while the traceroute command counts and displays the hops from the host to each of its destinations.

30
Q

Question #2: What’s the difference between a Virtual IP and a regular IP address?

A

Answer: A Virtual IP is an IP address that’s not associated with a particular end device and is assigned by a user/administrator while a regular IP address is assigned to a specific device in the network by the router.

31
Q

Question #3: What’s the purpose of the DMZ (Demilitarized Zone)?

A

Answer: The purpose of the DMZ (Demilitarized Zone) is to protect the internal network by forming a physical or logical layer that includes only specific externally dependent services.

32
Q

Question #4: What’s the difference between an IDS and an IPS?

A

Answer: An IDS (Intrusion Detection System) is a system that is commonly passive and alerts of malicious network traffic while an IPS (Intrusion Prevention System) is a system that constantly monitors and blocks malicious network traffic.

33
Q

Question #5: What are the components of AAA in Networking?

A

Answer: The components of AAA stand for Authentication which verifies a user’s identity, Authorization which enforces a user’s permissions, and Accounting which tracks a user’s activity.

34
Q

Question #6: What is ARP (Address Resolution Protocol)?

A

Answer: ARP (Address Resolution Protocol) is a protocol that translates IP addresses into MAC addresses.

35
Q

Question #7: What’s the difference between stateful and stateless?

A

Answer: Stateful requires a server to store state and session information while stateless permits or denies packets based on their source or destination IP.

36
Q

Question #1: What is an Endpoint Security Solution?

A

Answer: An Endpoint Security Solution is a suite of tools that helps protect endpoint devices such as computers, network devices, or workstations.

37
Q

Question #2: What’s the difference between a false positive and a false negative result?

A

Answer: A false positive means that the result indicates a false outcome that’s not true while a false negative means that the result was calculated incorrectly and it’s actually true.

38
Q

Question #3: What does “Zero-Day” stand for?

A

Answer: “Zero-Day” stands for a vulnerability or flaw that a system or application has that can be exploited before a vendor can patch it.

39
Q

Question #4: What’s a Honeypot?

A

Answer: A Honeypot is a device that’s used as a decoy in an accessible running network system in order to lure attackers or outside threats.

40
Q

Question #5: What’s the difference between whitelisting and blacklisting?

A

Answer: Whitelisting means that there are no restrictions to the data or access; the resource is trusted while blacklisting establishes restrictions on the access and data; it’s not fully trusted.

41
Q

Question #6: What is steganography?

A

Answer: Steganography is the art or practice of hiding information within files such as files within files.

42
Q

Question #7: What’s the difference between a SIEM and a SOAR?

A

Answer: A SIEM is a product or service that can be used to analyze logs or events and collects security incidents such as breaches, data theft, and suspicious behavior. SOAR is a category of products or services designed to minimize the need for human presence during incident response cases.

43
Q

Question #1: What is source code?

A

Answer: Source Code is the text that’s contained within a program. It’s a collection of instructions written in a particular programming language.

44
Q

Question #2: How’s Python different from other programming languages?

A

Answer: Python is a very adaptable programming language because it’s supported in many operating systems, it’s the easiest to learn, and it’s supported by a vast collection of libraries.

45
Q

Question #3: What are Loops?

A

Answer: Loops are sequences of instructions that are placed in statements within code blocks to enable the repetition of those Statements.

46
Q

Question #4: What’s the difference between a Compiler and an Interpreter Language?

A

Answer: A Compiler takes an entire program and translates all of it into object code while an interpreter executes instructions without converting them to object code.

47
Q

Question #5: What are functions?

A

Answer: Functions are instructions that are used to define a block of code that’s reusable without the need to rewrite it each time.

48
Q

Question #6: What’s the difference between a class and an object?

A

Answer: A Class is a code template that serves as the blueprint for an object; it defines its properties. An Object is an abstract data type/ variable that can contain attributes and methods.

49
Q

Question #7: What’s a socket and how does it apply to Python?

A

Answer: A socket is the endpoint of communication between a client and a server and they are relevant to Python because they can be imported and modified within the code to allow communication between clients and servers.

50
Q

Question #1: What’s the CIA Triangle?

A

Answer: The CIA Triangle are three principles that form the cornerstone of any organization’s security infrastructure. These are: Confidentiality, Integrity, and Availability.

51
Q

Question #2: What’s malware?

A

Answer: Malware is a term that refers to various types of malicious software designed to cause damage.

52
Q

Question #3: What’s Nmap?

A

Answer: Nmap is a free open-source network mapper tool that’s used for network discovery and security auditing.

53
Q

Question #4: What’s a Man-in-the-Middle-Attack?

A

Answer: A Man-in-the-Middle-Attack is a type of attack that’s used to eavesdrop on private communication and is carried out secretly in the background. It also allows for control over the network traffic.

54
Q

Question #5: What’s ARP Poisoning?

A

Answer: ARP Poisoning is when an attacker sends falsified ARP messages over the network to link the attacker’s MAC address with the IP address of a legitimate computer or server on the network.

55
Q

Question #6: What’s Social Engineering?

A

Answer: Social Engineering is a type of psychological manipulation that’s used to extract information or convince people to perform actions that break an organization’s security practices.

56
Q

Question #7: What’s Metasploit?

A

Answer: Metasplopit is a tool that’s used to scan for weaknesses in a system. It can be used by ethical hackers as well as malicious Actors.

57
Q

Question #1: What’s the difference between Digital Forensics & Incident Response?

A

Answer: Digital Forensics involves examining and analyzing clues after a cyber attack while preserving the evidence. On the other hand, Incident Response carries out actions to deal with the damage during and after a security breach or attack in an effort to reduce damage and recovery costs.

58
Q

Question #2: What’s Wireshark?

A

Answer: Wireshark is a network tool that operates on data that’s already captured. It analyzes network traffic and can be used for carrying out network forensics.

59
Q

Question #3: What’s Live Forensics?

A

Answer: Live Forensics is an analysis of system data while the device is powered on. It’s done to acquire volatile data that would be lost if the device was powered off.

60
Q

Question #4: What’s the difference between Static and Live Malware Analysis?

A

Answer: Static Malware Analysis is an analysis that’s carried out to identify whether the evidence is actually malware or a false positive. Live Malware Analysis is an analysis that’s done to monitor the behavior and impact of a malware on the system; it’s carried out by executing the malware