Cybersecurity Prologue Interview Question-Answer

Cyber Security Interview Question-Answer

Cyber Security Interview Question-Answer Part – 2

Q.1 The common term for a software that is considered as nonessential, whose implementation can compromise privacy or weaken the computer’s security is called ___________.

       A. Potentially Unwanted Program

       B. Malware

       C. Malicious Program

       D. Spam

Ans : Potentially Unwanted Program


Q.2 ________ is designed to extract data from its host computer for marketing purposes.

       A. Spyware

       B. Ransomware

       C. Trojans

       D. Adware

Ans : Spyware


Q.3 _________ is a standalone software that does not need human help/host program to spread.

       A. Trojan

       B. Worm

       C. Ransomware

       D. Virus

Ans : Worm


Q.4 The type of malware that tricks users by making them believe that their computer has been infected with a virus is called __________.

       A. Spyware

       B. Ransomware

       C. Scareware

       D. Rootkits

Ans : Scareware


Q.5 Programs that are specifically designed to disrupt the performance of computers/networks are commonly known as __________.

       A. Malware

       B. Virus

       C. Ransomware

       D. Trojans

Ans : Malware


Q.6 The type of malware that restricts access to the computer either by encrypting files on the hard drive or by displaying messages demanding a ransom is called __________.

       A. Spyware

       B. Trojans

       C. Scareware

       D. Ransomware

Ans : Ransomware


Q.7 Which of the following is a new method of spreading malware by injecting malicious or malware-laden advertisements into genuine online advertising networks and webpages?

       A. Malvertising

       B. Adware

       C. Scareware

       D. Malnet

Ans : Malvertising


Q.8 Which of the following is used to draw in users and infect them and deploy fast changing infrastructures?

       A. Honeynet

       B. Trojans

       C. Malnet

       D. Botnet

Ans : Malnet


Q.9 The security attribute that aims to achieve data privacy and protection against unauthorized disclosure is called ____________.

       A. Confidentiality

       B. Availability

       C. Authentication

       D. Integrity

Ans : Confidentiality


Q.10 The type of attack in which the attacker intercepts the information in transit without altering it.

       A. Invasive Attack

       B. Passive Attack

       C. Active Attack

Ans : Passive Attack


Q.11 Which of the following is an attack against availability?

       A. DoS Attack

       B. Zero Day Attack

       C. Man in the Middle Attack

       D. Birthday Attack

Ans : DoS Attack


Q.12 As an application of cryptography, digital Signatures and MACs can be used for _____________.

       A. Availability

       B. Confidentiality

       C. Authentication

       D. Integrity

Ans : Authentication


Q.13 A type of assessment that is often performed in a sandbox-virtual environment to prevent malware from actually infecting production systems is known as _________.

       A. Penetration Testing

       B. Black Box Testing

       C. Dynamic Analysis

       D. Static Analysis

Ans : Dynamic Analysis


Q.14 Deployment in APTs is fully automated.

       A. True

       B. False

Ans : False


Q.15 Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?

       A. Assymmetric Key Encryption

       B. Symmetric Key Encryption

Ans : Assymmetric Key Encryption


Q.16 A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called _________.

       A. Invisible Threats

       B. Malicious threats

       C. Advanced Persistent Threats

       D. Hidden Threats

Ans : Advanced Persistent Threats


Q.17 A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker’s pov is called ___________.

       A. Threat Landscaping

       B. Threat Modeling

       C. Threat Hunting

       D. Threat Analysis

Ans : Threat Modeling


Q.18 SABSA Framework is commonly represented as _______ SABSA matrix.

       A. 8×8

       B. 4×4

       C. 5×5

       D. 6×6

Ans : 6×6


Q.19 Which of these are Threats related to Email Security?

       A. Pharming

       B. Spoofing

       C. Spam

       D. Phishing

       E. All the options

Ans : All the options


Q.20 Which of these is true with respect to passwords?

       A. Passwords can be kept openly

       B. Passwords need to be easy

       C. Passwords need to be atleast 8 chars of length

       D. None of the options

Ans : Passwords need to be atleast 8 chars of length


Q.21 Which of these are examples biometrics?

       A. Signature

       B. Gait

       C. Iris

       D. All the options

Ans : All the options


Q.22 __________ is a proactive process to predict potential risks efficiently.

       A. Threat Analysing

       B. Threat Hunting

       C. Threat Modeling

       D. Threat Landscaping

Ans : Threat Hunting


Q.23 As an email client, we should not use caution when opening emails and can download any attachments.

       A. True

       B. False

Ans : False


Q.24 An error message displayed on the system, symbolizes virus infection.

       A. True

       B. False

Ans : False


Q.25 What is PUP?

       A. Practially Unwanted Program

       B. Practically Unrelated Program

       C. Potentially Unwanted Program

       D. Potentially Unwanted Process

Ans : Potentially Unwanted Program


Q.26 An extension of RADIUS that provides access control for routers, network access servers, and other networked computing devices is called __________.

       A. Endpoint Access Controller Access Control System

       B. Terminal-Access Controller Access Control System

       C. Network Access Controller Access Control System

Ans : Terminal-Access Controller Access Control System


Q.27 The process of converting a message to an unintelligible form with the help of an algorithm and a key is known as _______.

       A. Cryptology

       B. Encryption

       C. Cryptography

       D. Cryptanalysis

Ans : Encryption


Q.28 What is the security attribute that ensures data and services are available to authorized users whenever required?

       A. Confidentiality

       B. Availability

       C. Integrity

Ans : Confidentiality


Q.29 Which of the following attack method aims to gather confidential information by deceiving the victim?

       A. Spoofing

       B. Drive-by Download

       C. Phishing

       D. Spamming

Ans : Phishing


Q.30 An email security threat that occurs when a malicious user sends an email pretending to be someone you know is called ___________.

       A. Phishing

       B. Pharming

       C. SPAM

       D. Spoofing

Ans : Spoofing


Q.31 As an application of cryptography, digital Signatures and MACs can be used for _____________.

       A. Availability

       B. Integrity

       C. Confidentiality

       D. Authentication

Ans : Authentication


Q.32 How do we define RADIUS?

       A. Remote Authentication Digital Users Services

       B. Remote Authorization Dial-In Universal Service

       C. Remote Authentication Dial-In User Service

       D. Remote Authorization Dial-In User Service

Ans : Remote Authentication Dial-In User Service


Q.33 A system set up to lure an attacker, to learn about attack methodologies, and to gather evidence of intruders.

       A. Camouflage

       B. Honeytrap

       C. Honeypot

       D. HoneyCloak

Ans : Honeypot


Q.34 A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is known as ______________.

       A. Invisible Threats

       B. Hidden Threats

       C. Advanced Persistent Threats

       D. Malicious threats

Ans : Advanced Persistent Threats


Q.35 Threats can exploit assets if assets are not vulnerable.

       A. True

       B. False

Ans : False


Q.36 Which of the following is a physiological biometric that could be used for authentication?

       A. Gait

       B. Signature

       C. Voice Recognition

       D. Facial Recognition

       E. All the options

Ans : All the options


Q.37 If a student gains unauthorized access to the student database and modifies his/her marks, what type of violation would it be?

       A. Integrity

       B. Confidentiality

       C. Both

Ans : Both


Q.38 Passive attacks are considered a threat to _______.

       A. Integrity

       B. Availability

       C. Confidentiality

       D. Authenticity

Ans : Confidentiality


Cyber Security Interview Question-Answer

Cyber Security Interview Question-Answer Part – 2

Leave a Comment

Your email address will not be published. Required fields are marked *