Cyber Security Interview Questions and Answers
Ques 1. What is the CIA triad in information security?
CIA stands for Confidentiality, Integrity, and Availability. It is a model designed to guide policies for information security within an organization.
Ques 2. Explain the concept of zero-day vulnerability.
A zero-day vulnerability is a security flaw in software or hardware that is unknown to the vendor. It is called 'zero-day' because developers have zero days to fix the issue before it is exploited.
Ques 3. What is the difference between symmetric and asymmetric encryption?
Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses a pair of public and private keys.
Ques 4. What is a firewall and how does it work?
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks.
Ques 5. Define penetration testing.
Penetration testing, or ethical hacking, is a simulated cyber attack on a computer system, network, or application to discover security vulnerabilities. It helps identify weaknesses that malicious attackers could exploit.
Most helpful rated by users: