Cyber Security Interview Questions and Answers
Ques 11. What is a Man-in-the-Middle (MitM) attack?
A Man-in-the-Middle attack occurs when an attacker intercepts and potentially alters the communication between two parties without their knowledge.
Ques 12. What is the purpose of a Security Information and Event Management (SIEM) system?
SIEM systems collect and analyze log data from various systems across an organization to detect and respond to security incidents.
Ques 13. What is the difference between a virus and a worm?
A virus requires user interaction to spread, usually by executing an infected program, while a worm is a self-replicating malware that spreads without user interaction.
Ques 14. Define social engineering.
Social engineering is a tactic used by attackers to manipulate individuals into divulging confidential information, such as passwords or financial information.
Ques 15. What is the concept of least common mechanism in security design?
The least common mechanism principle states that security mechanisms should not be shared by multiple users, to minimize the potential impact of a security breach.
Most helpful rated by users:
- What is the concept of a security patch?
- What is the CIA triad in information security?
- Explain the concept of zero-day vulnerability.
- What is the difference between symmetric and asymmetric encryption?
- What is a firewall and how does it work?