Cyber Security Interview Questions and Answers
Question - 11 : - What is port scanning?
Answer - 11 : -
It is the technique for identifying open ports and service available on a specific host. Hackers use port scanning technique to find information for malicious purposes.
Question - 12 : - Name the different layers of the OSI model.
Answer - 12 : -
Seven different layers of OSI models are as follows:
- Physical Layer
- Data Link Layer
- Network Layer
- Transport Layer
- Session Layer
- Presentation Layer
- Application Layer
Question - 13 : - What is a VPN?
Answer - 13 : -
VPN stands for Virtual Private Network. It is a network connection method for creating an encrypted and safe connection. This method protects data from interference, snooping, censorship.
Question - 14 : - What are black hat hackers?
Answer - 14 : -
Black hat hackers are people who have a good knowledge of breaching network security. These hackers can generate malware for personal financial gain or other malicious reasons. They break into a secure network to modify, steal, or destroy data so that the network can not be used by authorized network users.
Question - 15 : - What are white hat hackers?
Answer - 15 : -
White hat hackers or security specialist are specialized in penetration testing. They protect the information system of an organization.
Question - 16 : - What are grey hat hackers?
Answer - 16 : -
Grey hat hackers are computer hacker who sometimes violate ethical standards, but they do not have malicious intent.
Question - 17 : - How to reset a password-protected BIOS configuration?
Answer - 17 : -
There are various ways to reset BIOS password. Some of them are as follows:
- Remove CMOS battery.
- By utilizing the software.
- By utilizing a motherboard jumper.
- By utilizing MS-DOS.
Question - 18 : - What is MITM attack?
Answer - 18 : -
A MITM or Man-in-the-Middle is a type of attack where an attacker intercepts communication between two persons. The main intention of MITM is to access confidential information.
Question - 19 : - Define ARP and its working process.
Answer - 19 : -
It is a protocol used for finding MAC address associated with IPv4 address. This protocol work as an interface between the OSI network and OSI link layer.
Question - 20 : - Explain botnet.
Answer - 20 : -
It’s a number of internet-connected devices like servers, mobile devices, IoT devices, and PCs that are infected and controlled by malware.