Cyber Security Interview Questions and Answers Part – I
Question#1 Which of the following can also consider as the instances of Open Design?
i) CSS
ii) DVD Player
iii) Only A
iv) Both A and B
Ans : Both A and B
Question#2 Which of the following is the least strong security encryption standard?
i) WPA3
ii) WPA2
iii) WPA
iv) WEP
Ans : WEP
Question#3 Which one of the following principles states that sometimes it is become more desirable to rescored the details of intrusion that to adopt more efficient measure to avoid it?
i) Least common mechanism
ii) Compromise recording
iii) Psychological acceptability
iv) Work factor
Ans : Compromise recording
Question#4 Which of the following is a Stuxnet?
i) Trojan
ii) Antivirus
iii) Worm
iv) Virus
Ans : Worm
Question#5 The web application like banking websites should ask its users to log-in again after some specific period of time, let say 30 min. It can be considered as an example of which cybersecurity principle?
i) Compromise recording
ii) Psychological acceptability
iii) Complete mediation
iv) None of the above
Ans : Complete mediation
Question#6 Which of the following ethical hacking technique is used for determining which operating system (OS) is running on a remote computer?
i) Operating System fingerprinting
ii) Operating System penetration testing
iii) Digital-printing
iv) Machine printing
Ans : Operating System fingerprinting
Question#7 Which one of the following statements is correct about Email security in the network security methods?
i) One has to deploy hardware, software, and security procedures to lock those apps down
ii) One should know about what the normal behavior of a network look likes so that he/she can spot any changes, breaches in the behavior of the network
iii) Phishing is one of the most commonly used methods that are used by hackers to gain access to the network
iv) All of the above
Ans : Phishing is one of the most commonly used methods that are used by hackers to gain access to the network
Question#8 Which of the following can diminish the chance of data leakage?
i) Steganography
ii) Chorography
iii) Cryptography
iv) Authentication
Ans : Steganography
Question#9 Which of the following statements is true about the VPN in Network security?
i) It is usually based on the IPsec( IP Security) or SSL (Secure Sockets Layer)
ii) It is a type of device that helps to ensure that communication between a device and a network is secure
iii) It typically creates a secure, encrypted virtual “tunnel” over the open internet
iv) All of the above
Ans : All of the above
Question#10 Which of the following type of text is transformed with the help of a cipher algorithm?
i) Plain text
ii) Scalar text
iii) Transformed text
iv) Complex text
Ans : Plain text
Question#11 Which type of the following malware does not replicate or clone them self’s through infection?
i) Worms
ii) Viruses
iii) Rootkits
iv) Trojans
Ans : Trojans
Question#12 “CHAP” stands for __________.
i) Circuit Hardware Authentication Protocols
ii) Challenge Hardware Authentication Protocols
iii) Challenge Handshake Authentication Protocols
iv) Circuit Handshake Authentication Protocols
Ans : Challenge Handshake Authentication Protocols
Question#13 Which of the following malware’s type allows the attacker to access the administrative controls and enables his/or her to do almost anything he wants to do with the infected computers.
i) Worms
ii) RATs
iii) Rootkits
iv) Botnets
Ans : RATs
Question#14 Which of the following statements is true about the Trojans?
i) Trojans perform tasks for which they are designed or programmed
ii) Trojans replicates them self’s or clone them self’s through an infections
iii) Trojans do nothing harmful to the user’s computer systems
iv) None of the above
Ans : Trojans perform tasks for which they are designed or programmed
Question#15 Which of the following is just opposite to the Open Design principle?
i) Security through obscurity
ii) Least common mechanism
iii) Least privileges
iv) Work factor
Ans : Security through obscurity
Question#16 Which of the following is a type of independent malicious program that never required any host program?
i) Trap Door
ii) Trojan Horse
iii) Worm
iv) Virus
Ans : Worm
Question#17 Which of the following usually considered as the default port number of apache and several other web servers?
i) 20
ii) 87
iii) 80
iv) 40
Ans : 80
Question#18 DNS translates a Domain name into _________.
i) Binary
ii) IP
iii) URL
iv) Hex
Ans : URL
Question#19 In the CIA Triad, which one of the following is not involved?
i) Availability
ii) Confidentiality
iii) Integrity
iv) Authenticity
Ans : Authenticity
Question#20 Which one of the following systems cannot be considered as an example of the operating systems?
i) Microsoft Office
ii) Windows 8
iii) Red Hat Linux
iv) BSD Linux
Ans : Microsoft Office
Question#21 In an any organization, company or firm the policies of information security come under__________.
i) Confidentiality
ii) Authenticity
iii) CIA Triad
iv) None of the above
Ans : CIA Triad
Question#22 In order to ensure the security of the data/ information, we need to ____________ the data:
i) Decrypt
ii) Delete
iii) Encrypt
iv) None of the above
Ans : Encrypt
Question#23 Why are the factors like Confidentiality, Integrity, Availability, and Authenticity considered as the fundamentals?
i) They help in understanding the hacking process
ii) These are the main elements for any security breach
iii) They help to understand the security and its components in a better manner
iv) All of the above
Ans : They help to understand the security and its components in a better manner
Question#24 Which one of the following is considered as the most secure Linux operating system that also provides anonymity and the incognito option for securing the user’s information?
i) Ubuntu
ii) Fedora
iii) Tails
iv) All of the above
Ans : Tails
Question#25 Which type following UNIX account provides all types of privileges and rights which one can perform administrative functions?
i) Client
ii) Root
iii) Administrative
iv) Guest
Ans : Administrative
Question#26 Which of the following is considered as the first hacker’s conference?
i) DEVON
ii) OSCON
iii) SECTION
iv) DEFCON
Ans : DEFCON
Question#27 Which of the following known as the oldest phone hacking techniques used by hackers to make free calls?
i) Phishing
ii) Cracking
iii) Phreaking
iv) Spraining
Ans : Phreaking
Question#28 Name of the Hacker who breaks the SIPRNET system?
i) Kevin Mitnick
ii) John von Neumann
iii) Kevin Poulsen
iv) John Draper
Ans : Kevin Poulsen
Cyber Security Interview Questions and Answers Part – II
Question#1 Which of the following can be considered as the elements of cyber security?
i) Application Security
ii) Operational Security
iii) Network Security
iv) All of the above
Ans : All of the above
Question#2 Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic?
i) Pharming
ii) Website-Duplication
iii) Mimicking
iv) Spamming
Ans : Pharming
Question#3 Which of the following are famous and common cyber-attacks used by hackers to infiltrate the user’s system?
i) DDos and Derive-by Downloads
ii) Malware & Malvertising
iii) Phishing and Password attacks
iv) All of the above
Ans : All of the above
Question#4 Which of the following is not a type of peer-to-peer cyber-crime?
i) MiTM
ii) Injecting Trojans to a target victim
iii) Credit card details leak in the deep web
iv) Phishing
Ans : Credit card details leak in the deep web
Question#5 Which one of the following is also referred to as malicious software?
i) Maliciousware
ii) Badware
iii) Ilegalware
iv) Malware
Ans : Malware
Question#6 A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?
i) Clickjacking
ii) Buffer-overflow
iii) Phishing
iv) MiTM
Ans : Buffer-overflow
Question#7 Hackers usually used the computer virus for ______ purpose.
i) To log, monitor each and every user’s stroke
ii) To gain access the sensitive information like user’s Id and Passwords
iii) To corrupt the user’s data stored in the computer system
iv) All of the above
Ans : All of the above
Question#8 Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?
i) ip tracker
ii) emails
iii) websites
iv) web pages
Ans : websites
Question#9 In Wi-Fi Security, which of the following protocol is more used?
i) ABCD
ii) WPA2
iii) WPS
iv) Both A and C
Ans : WPA2
Question#10 Which of the following is defined as an attempt to harm, damage or cause threat to a system or network?
i) Digital crime
ii) Threats
iii) System hijacking
iv) Cyber Attack
Ans : Cyber Attack
Question#11 The term “TCP/IP” stands for_____.
i) Transmission Contribution protocol/ internet protocol
ii) Transmission Control Protocol/ internet protocol
iii) Transaction Control protocol/ internet protocol
iv) Transmission Control Protocol/ internet protocol
Ans : Transmission Control Protocol/ internet protocol
Question#12 The response time and transit time is used to measure the ____________ of a network.
i) Longevity
ii) Performance
iii) Security
iv) Reliability
Ans : Performance
Question#13 They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?
i) White Hat Hackers
ii) Black Hat Hackers
iii) Hactivists
iv) Gray Hat Hackers
Ans : Black Hat Hackers
Question#14 IT security in any firm or organization is maintained and handled by _________.
i) IT Security Engineer
ii) Software Security Specialist
iii) Security Auditor
iv) CEO of the organization
Ans : IT Security Engineer
Question#15 Which of the following factor of the network gets hugely impacted when the number of users exceeds the network’s limit?
i) Performance
ii) Longevity
iii) Security
iv) Reliability
Ans : Longevity
Question#16 Where did the term “hacker” originate?
i) MIT
ii) New York University
iii) Bell’s Lab
iv) Harvard University
Ans : MIT
Question#17 In the computer networks, the encryption techniques are primarily used for improving the ________.
i) Security
ii) Reliability
iii) Longevity
iv) Performance
Ans : Security
Question#18 What is the existence of weakness in a system or network is known as?
i) Vulnerability
ii) Exploit
iii) Attack
iv) Threat
Ans : Vulnerability
Question#19 Which of the following is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.
i) MiTM attack
ii) Phishing attack
iii) Website attack
iv) DoS attack
Ans : Phishing attack
Question#20 Which of the following statements is correct about the firewall?
i) It is a device installed at the boundary of a company to prevent unauthorized physical access.
ii) It is a device installed at the boundary of an incorporate to protect it against the unauthorized access
iii) It is a kind of wall built to prevent files form damaging the corporate.
iv) None of the above
Ans : It is a device installed at the boundary of an incorporate to protect it against the unauthorized access
Question#21 When was the first computer virus created?
i) 1970
ii) 1971
iii) 1972
iv) 1969
Ans : 1971
Question#22 Which of the following is not a step followed by cyber-criminals in data breaching?
i) Exfiltration
ii) Research and info-gathering
iii) Fixing the bugs
iv) Attack the system
Ans : Fixing the bugs
Question#23 Which of the following is considered as the world’s first antivirus program?
i) Creeper
ii) Reaper
iii) Tinkered
iv) Ray Tomlinson
Ans : Reaper
Question#24 Which of the following online service’s privacy cannot be protected using Tor?
i) Browsing data
ii) Instant messaging
iii) Login using ID
iv) Relay chats
Ans : Login using ID
Question#25 Which one of the following principles of cyber security refers that the security mechanism must be as small and simple as possible?
i) Open-Design
ii) Economy of the Mechanism
iii) Least privilege
iv) Fail-safe Defaults
Ans : Economy of the Mechanism
Question#26 Which of the following term refers to a group of hackers who are both white and black hat?
i) Yellow Hat hackers
ii) Grey Hat hackers
iii) Red Hat Hackers
iv) White-Black Hat Hackers
Ans : Grey Hat hackers
Question#27 Which of the following principle of cyber security restricts how privileges are initiated whenever any object or subject is created?
i) Fail-safe Defaults
ii) Open-Design
iii) None of the above
iv) Least privilege
Ans : Fail-safe Defaults
Question#28 Which of the following is not an email-related hacking tool?
i) Mail Password
ii) Email Finder Pro
iii) Mail PassView
iv) Sendinc
Ans : Sendinc
Question#29 Suppose an employee demands the root access to a UNIX system, where you are the administrator; that right or access should not be given to the employee unless that employee has work that requires certain rights, privileges. It can be considered as a perfect example of which principle of cyber security?
i) Least privileges
ii) Open Design
iii) Separation of Privileges
iv) Both A & C
Ans : Least privileges
Question#30 Which of the following DDoS in mobile systems wait for the owner to trigger the cyber
i) programs
ii) virus
iii) botnets
iv) worms
Ans : botnets
Cybersecurity Prologue Interview Questions and Answers
Question#1 Which of the following refers to stealing one’s idea or invention of others and use it for their own benefits?
i) Piracy
ii) Plagiarism
iii) Intellectual property rights
iv) All of the above
Ans : All of the above
Question#2 Read the following statement carefully and find out whether it is correct about the hacking or not?
It can be possible that in some cases, hacking a computer or network can be legal.
i) No, in any situation, hacking cannot be legal
ii) It may be possible that in some cases, it can be referred to as a legal task
Ans : It may be possible that in some cases, it can be referred to as a legal task
Question#3 Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?
i) Cyber low
ii) Cyberethics
iii) Cybersecurity
iv) Cybersafety
Ans : Cyberethics
Question#4 What is Cyber Security?
i) Cyber Security provides security against malware
ii) Cyber Security provides security against cyber-terrorists
iii) Cyber Security protects a system from cyber attacks
iv) All of the mentioned
Ans : All of the mentioned
Question#5 What does cyber security protect?
i) Cyber security protects criminals
ii) Cyber security protects internet-connected systems
iii) Cyber security protects hackers
iv) None of the mentioned
Ans : Cyber security protects criminals
Question#6 Who is the father of computer security?
i) August Kerckhoffs
ii) Bob Thomas
iii) Robert
iv) Charles
Ans : August Kerckhoffs
Question#7 Which of the following refers to the violation of the principle if a computer is no more accessible?
i) Access control
ii) Confidentiality
iii) Availability
iv) All of the above
Ans : Availability
Question#8 Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
i) Cyber attack
ii) Computer security
iii) Cryptography
iv) Digital hacking
Ans : Cyber attack
Question#9 Which one of the following refers to the technique used for verifying the integrity of the message?
i) Digital signature
ii) Decryption algorithm
iii) Protocol
iv) Message Digest
Ans : Message Digest
Question#10 Which of the following is a type of cyber security?
i) Cloud Security
ii) Network Security
iii) Application Security
iv) All of the above
Ans : All of the above
Question#11 Which one of the following usually used in the process of Wi-Fi-hacking?
i) Aircrack-ng
ii) Wireshark
iii) Norton
iv) All of the above
Ans : Aircrack-ng
Question#12 What are the features of cyber security?
i) Compliance
ii) Defense against internal threats
iii) Threat Prevention
iv) All of the above
Ans : All of the above
Question#13 Which of the following port and IP address scanner famous among the users?
i) Cain and Abel
ii) Angry IP Scanner
iii) Snort
iv) Ettercap
Ans : Angry IP Scanner
Question#14 Which of the following is an objective of network security?
i) Confidentiality
ii) Integrity
iii) Availability
iv) All of the above
Ans : All of the above
Question#15 In ethical hacking and cyber security, there are _______ types of scanning:
i) 1
ii) 2
iii) 3
iv) 4
Ans : 3
Question#16 Which of the following is not a cybercrime?
i) Denial of Service
ii) Man in the Middle
iii) Malware
iv) AES
Ans : AES
Question#17 Which of the following is not a type of scanning?
i) Xmas Tree Scan
ii) Cloud scan
iii) Null Scan
iv) SYN Stealth
Ans : Cloud scan
Question#18 Which of the following is a component of cyber security?
i) Internet Of Things
ii) AI
iii) Database
iv) Attacks
Ans : Internet Of Things
Question#19 Which of the following is a type of cyber attack?
i) Phishing
ii) SQL Injections
iii) Password Attack
iv) All of the above
Ans : All of the above
Question#20 In system hacking, which of the following is the most crucial activity?
i) Information gathering
ii) Covering tracks
iii) Cracking passwords
iv) None of the above
Ans : Cracking passwords
Question#21 Which of the following is not an advantage of cyber security?
i) Makes the system slower
ii) Minimizes computer freezing and crashes
iii) Gives privacy to users
iv) Protects system against viruses
Ans : Makes the system slower
Question#22 Which of the following are the types of scanning?
i) Network, vulnerability, and port scanning
ii) Port, network, and services
iii) Client, Server, and network
iv) None of the above
Ans : Network, vulnerability, and port scanning
Question#23 “Cyberspace” was coined by _________.
i) Richard Stallman
ii) William Gibson
iii) Andrew Tannenbaum
iv) Scott Fahlman
Ans : William Gibson
Question#24 In which year has hacking become a practical crime and a matter of concern in the field of cyber technology?
i) 1991
ii) 1983
iii) 1970
iv) 1964
Ans : 1970
Question#25 Which one of the following is actually considered as the first computer virus?
i) Sasser
ii) Blaster
iii) Creeper
iv) Both A and C
Ans : Creeper
Question#26 Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______.
i) Nation / State sponsored hackers
ii) CIA triad
iii) Special Hackers
iv) Government Hackers
Ans : Nation / State sponsored hackers
Question#27 To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.
i) Antivirus
ii) Firewall
iii) Vlc player
iv) Script
Ans : Firewall
Question#28 Which of the following act violates cyber security?
i) Exploit
ii) Attack
iii) Threat
iv) Vulnerability
Ans : Attack
Question#29 Code Red is a type of ________.
i) An Antivirus Program
ii) A photo editing software
iii) A computer virus
iv) A video editing software
Ans : A computer virus
Question#30 Which of the following actions compromise cyber security?
i) Vulnerability
ii) Attack
iii) Threat
iv) Exploit
Ans : Threat