• +91 9723535972
  • info@interviewmaterial.com

Cyber Security Interview Questions and Answers

Related Subjects

Cyber Security Interview Questions and Answers

Question - 11 : - What is port scanning?

Answer - 11 : -

It is the technique for identifying open ports and service available on a specific host. Hackers use port scanning technique to find information for malicious purposes.

Question - 12 : - Name the different layers of the OSI model.

Answer - 12 : -

Seven different layers of OSI models are as follows:

  • Physical Layer
  • Data Link Layer
  • Network Layer
  • Transport Layer
  • Session Layer
  • Presentation Layer
  • Application Layer

Question - 13 : - What is a VPN?

Answer - 13 : -

VPN stands for Virtual Private Network. It is a network connection method for creating an encrypted and safe connection. This method protects data from interference, snooping, censorship.

Question - 14 : - What are black hat hackers?

Answer - 14 : -

Black hat hackers are people who have a good knowledge of breaching network security. These hackers can generate malware for personal financial gain or other malicious reasons. They break into a secure network to modify, steal, or destroy data so that the network can not be used by authorized network users.

Question - 15 : - What are white hat hackers?

Answer - 15 : -

White hat hackers or security specialist are specialized in penetration testing. They protect the information system of an organization.

Question - 16 : - What are grey hat hackers?

Answer - 16 : -

Grey hat hackers are computer hacker who sometimes violate ethical standards, but they do not have malicious intent.

Question - 17 : - How to reset a password-protected BIOS configuration?

Answer - 17 : -

There are various ways to reset BIOS password. Some of them are as follows:

  • Remove CMOS battery.
  • By utilizing the software.
  • By utilizing a motherboard jumper.
  • By utilizing MS-DOS.

Question - 18 : - What is MITM attack?

Answer - 18 : -

A MITM or Man-in-the-Middle is a type of attack where an attacker intercepts communication between two persons. The main intention of MITM is to access confidential information.

Question - 19 : - Define ARP and its working process.

Answer - 19 : -

It is a protocol used for finding MAC address associated with IPv4 address. This protocol work as an interface between the OSI network and OSI link layer.

Question - 20 : - Explain botnet.

Answer - 20 : -

It’s a number of internet-connected devices like servers, mobile devices, IoT devices, and PCs that are infected and controlled by malware.


NCERT Solutions

 

Share your email for latest updates

Name:
Email:

Our partners