Wednesday, February 1, 2017

101 Questions for interviews in Cyber Security Career

Interview questions for cyber security career

Hello readers, this is a quite interesting post. Here I have given 101 questions based out of my memory during multiple interviews I had attended while trying to switching jobs. So after a long thinking, it came to my mind to keep it posted that can help others. So I kept here for reference and study purpose only. I have not kept the answers here, because that is your task to find out the answers and prepare yourself accordingly. 

While you read questions and find answers, it will help you to remember some parts. Then practice, revise and learn. Although there are lots of questions in this domain. Cyber Security domain is very large and depth in nature. But for basic understanding and preparing for interviews to take or give, this post might help. 

Lets see the questions below:


  1. What is your current job role and why you want to change your job role?
  2. Have you ever worked on Security audit, IT audit, internal audit, SOC, SOX environment?
  3. How many types of risks are there?
  4. What do you mean by risk assessment and risk management?
  5. Tell the formula for calculating risk in risk assessment.
  6. Difference between qualitative and quantitative risk.
  7. How you address residual risks?
  8. What is inherent risk?
  9. Difference between threat, vulnerability and risk.
  10. What is shoulder surfing and social engineering?
  11. What is CIA triad?
  12. Do you know data classification? Example. 
  13. What is that risk called when you accept it?
  14. What do you mean by risk register and risk treatment plan?
  15. The difference between internal audit and external audit.
  16. What is a RACI chart?
  17. What do you mean by SOX audit?
  18. Have you done any SOX, SOC2 , ITGC audit?
  19. Difference between SOC2 and SOC1 audit reports.
  20. What control activities ape applicable for financial audit?
  21. What are ITGC controls?
  22. What is a control environment?
  23. What is an information processing facility and what are basic controls applicable for it?
  24. What is an encryption and how many types of encryption is there. Which encryption is best encryption method?
  25. What is the goal of system and application audit?
  26. How you address the risks identified. What are steps after getting your findings?
  27. The important factors required for planning audit?
  28. How many controls are there in ISO27001? Name few controls how you review those controls.
  29. What is context of a organization in ISO 27001?
  30. What is advantage of implementing ISO 27001 for an organization?
  31. What is the process for implementing ISO 27001?
  32. What is human resource security in ISO 27001?
  33. What are the controls tested for network security in ISO 27001 context?
  34. What is enterprise security?
  35. What is SOA?
  36. What is BCP and how the activity is being carried out?
  37. What is RTO and RPO?
  38. What is GRC? Name some GRC tools and best features in it.
  39. What is GDPR? When it came to effect?
  40. What is personal data and how to keep safe personal data?
  41. What kind of information does the GDPR applied?
  42. What tools you have used for application security audit? Name some application security tools. 
  43. Difference between Vulnerability assessment and Penetration Testing.
  44. Difference between NMAP and NESSUS tool.
  45. Can you perform PT from a VA tool? Which tool offers both VA and PT capability?
  46. What do you mean by port scanning? Name some tools.
  47. How do you plan your audit within your team and with client?
  48. What is patch management?
  49. Describe phishing with an example.
  50. What is audit methodology and how it is planned?
  51. Describe change management in ISO 27001.
  52. What is threat analysis and how you can perform that?
  53. Name some of logical security technologies you have used.
  54. Difference between incident management and problem management with example.
  55. How incident management and change management is integrated?
  56. What is IAM, PAM? 
  57. What is DAST / MAST / SAST / IAST?
  58. Difference between SAST / DAST?
  59. How can you securely access to a cloud network?
  60. Can you name 3 basic areas of control under PCI DSS standard?
  61. Do you know NIST framework? Can you name 2-3 controls?
  62. Can you give one example, of NIST control associated with ISO27001 controls?
  63. What are basic methods for financial fraud detection and prevention?
  64. Any critical risks identified in last 3 months? How you have addressed?
  65. Do you know SDLC? What the security measures being carried out during a software development. How you can audit a SDLC process?
  66. What is a Zero day attack? How you can prevent that?
  67. Difference between IDS and IPS systems.
  68. Difference between firewall and IPS device.
  69. Can you name some VPN tools and DLP tools? What tools you have used?
  70. Name some features of DLP.
  71. What is OT security?
  72. What is Zero trust network?
  73. How identity theft can be prevented?
  74. What is DMZ zone and why it is required?
  75. How to protect your home wireless access point?
  76. What is ransomware attack and how do you address it?
  77. Do you know DDoS attack and how it occurs?
  78. What is access control policy?
  79. Difference between SSO and MFA. Which one is best authentication method?
  80. Do you know Ubikey?
  81. Do you know how to harden a server?
  82. What are common policies need to be configured in firewall?
  83. What is signature based filter?
  84. What is source-routed traffic?
  85. What is SQL injection?
  86. What is Salting?
  87. Difference between SSL, SSH.
  88. What are OWASP top 10 controls?
  89. Difference between symmetric and asymmetric encryption.
  90. What is XSS attack?
  91. What is black box testing and white box testing?
  92. What is a botnet attack?
  93. What is network honey pot?
  94. What is network sniffing?
  95. What is a key logger?
  96. How to secure RDP? Why it is not secure to use RDP?
  97. What are risks arises from malware attack?
  98. What is threat intelligence?
  99. What are biggest sources of malware?
  100. What is reverse engineering? Where it is used?
  101. What is a root kit? 

If you unable to understand or find any answers, please post in comment section below.

-DR

No comments:

Post a Comment

Network Scanning Tools

Network Scanning through Nmap and Nessus Network scanning is a process used to troubleshoot active devices on a network for vulnerabilities....