Cybersecurity Interview Questions and Answers
1. Symmetric vs. Asymmetric Encryption
Symmetric: Uses one key for both encryption and decryption.
Asymmetric: Uses a public key to encrypt and a private key to decrypt.
2. How Firewalls Work
Firewalls monitor and control incoming/outgoing network traffic based on security rules.
3. CIA Triad
Confidentiality: Protecting data from unauthorized access.
Integrity: Ensuring data isn't altered.
Availability: Ensuring access to data/services when needed.
4. Man-in-the-Middle Attack (MitM)
An attacker intercepts communication between two parties.
Prevention: Encryption (HTTPS), VPNs, strong authentication.
5. IDS vs. IPS
IDS (Intrusion Detection System): Monitors and alerts.
IPS (Intrusion Prevention System): Monitors, alerts, and blocks.
6. Common Cyberattacks
Phishing: Deceptive emails to steal credentials.
DDoS: Overwhelms a service to make it unavailable.
SQL Injection: Injects malicious SQL queries to access databases.
7. Securing a Network
Use firewalls, antivirus, strong passwords, patch systems, segment the network.
8. Honeypots
Decoy systems used to detect or study attackers without risking real systems.
9. Handling Ransomware
Isolate infected systems, report the incident, assess backups, don't pay ransom, begin recovery.
10. Suspicious Network Traffic
Check logs, identify source/destination, use tools (e.g., Wireshark), and block malicious IPs.
11. User Reports Phishing
Verify email, report to IT/security team, alert other users, and train the user.
12. Dealing with a Security Incident
Describe the incident, your role, how you contained it, and lessons learned.
13. Staying Updated
Follow cybersecurity blogs (e.g., Krebs, Threatpost), take courses, join forums (e.g., Reddit,
LinkedIn groups).
14. Team Collaboration
Talk about communication, division of roles, and resolution process during a past incident or project.
15. Password Policy & MFA
Strong passwords reduce risk; MFA adds an extra layer of security by requiring a second form of
verification.
16. Creating a Security Policy
Define roles/responsibilities, acceptable use, access controls, incident response, and training.
17. User Training Role
Human error is a major risk; educating users helps prevent phishing, weak passwords, and unsafe
browsing.