Prepare Interview

Mock Exams

Make Homepage

Bookmark this page

Subscribe Email Address

Cyber Security Interview Questions and Answers

Ques 11. What is a Man-in-the-Middle (MitM) attack?

A Man-in-the-Middle attack occurs when an attacker intercepts and potentially alters the communication between two parties without their knowledge.

Is it helpful? Add Comment View Comments
 

Ques 12. What is the purpose of a Security Information and Event Management (SIEM) system?

SIEM systems collect and analyze log data from various systems across an organization to detect and respond to security incidents.

Is it helpful? Add Comment View Comments
 

Ques 13. What is the difference between a virus and a worm?

A virus requires user interaction to spread, usually by executing an infected program, while a worm is a self-replicating malware that spreads without user interaction.

Is it helpful? Add Comment View Comments
 

Ques 14. Define social engineering.

Social engineering is a tactic used by attackers to manipulate individuals into divulging confidential information, such as passwords or financial information.

Is it helpful? Add Comment View Comments
 

Ques 15. What is the concept of least common mechanism in security design?

The least common mechanism principle states that security mechanisms should not be shared by multiple users, to minimize the potential impact of a security breach.

Is it helpful? Add Comment View Comments
 

Most helpful rated by users:

©2026 WithoutBook