Top 10 Cyber Security Interview Questions And Answers

Share on facebook
Share on twitter
Share on linkedin
Share on email
Share on whatsapp
To help you clear the interview, we’ve listed the Top 10 Frequently Asked Cyber Security Interview Questions and Answers. So, let’s get started.

10 Must - Know Cyber Security Interview Questions And Answers

1.What is the OSI model, Different layers in this model? How this model is different from the TCP/IP model?

OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network. A reference model is a conceptual framework for understanding relationships. The purpose of the OSI reference model is to guide vendors and developers so the digital communication products and software programs they create can interoperate, and to facilitate a clear framework that describes the functions of a networking or telecommunication system.

cyber-security-osi-model This model breaks down data transmission over a series of seven layers, each of which is responsible for performing specific tasks concerning sending and receiving data.

7 layers of the OSI model

The seven Open Systems Interconnection layers are:

osi-model2

Layer 7 – The application layer

Layer 6 – The presentation layer

Layer 5 – The session layer

Layer 4 – The transport layer

Layer 3 – The network layer

Layer 2 – The data-link layer

Layer 1 – The physical layer

 

TCP/IP and OSI are the two most widely used networking models for communication. There are some similarities and dissimilarities between them. One of the major difference is that OSI is a conceptual model which is not practically used for communication, whereas, TCP/IP is used for establishing a connection and communicating through the network. The OSI model mainly emphasis on the services, interfaces and protocols; make a clear distinction between these concepts. Conversely, the TCP model is not able to distinctly describe these concepts.

Furthermore, the TCP/IP enables only connectionless communication mode in the network layer but both modes (Connectionless and connection-oriented) in the transport layer. When it comes to the OSI model, it supports connectionless and connection-oriented communication over the network layer but in the transport layer, connection-oriented communication is merely allowed.

2.Difference between Hashing, encoding, and encryption?

Encryption, Encoding and Hashing are kind of similar terms and are often confused with each other.

Encoding:
In the Encoding method, data is transformed from one form to another. The main aim of encoding is to transform data into a form that is readable by most of the systems or that can be used by any external process.
It can’t be used for securing data, various publicly available algorithms are used for encoding. Encoding can be used to reduce the size of the audio and video files.

Example: ASCII, BASE64, UNICODE

Encryption_vs_Encoding_vs_Hashing_1

Encryption:
Encryption in encoding technique in which message is encoded by using encryption algorithm in such a way that only authorized personnel can access the message or information. It is a special type of encoding that is used for transferring private data, for example sending a combination of username and password over the internet for email login.

Example: AES, RSA Algorithm

Encryption_vs_Encoding_vs_Hashing_2111

Hashing:
In hashing, data is converted to the hash using some hashing function, which can be any number generated from string or text. Various hashing algorithms are MD5, SHA256. Data once hashnonreversible.                                                                                                          Hash function can be any function that is used to map data of arbitrary size to data of fixed size. The data structure hash table is used for storing of data.

3.What is the Same-origin policy?

The same-origin policy is a critical security mechanism that restricts how a document or script loaded from one origin can interact with a resource from another origin. It helps isolate potentially malicious documents, reducing possible attack vectors.

4.Types of XSS?

There are three types of XSS:

persistent-xss

Stored XSS 

Stored XSS generally occurs when user input is stored on the target server, such as in a database, in a message forum, visitor log, comment field, etc. And then a victim is able to retrieve the stored data from the web application without that data being made safe to render in the browser. With the advent of HTML5, and other browser technologies, we can envision the attack payload being permanently stored in the victim’s browser, such as an HTML5 database, and never being sent to the server at all.

Reflected XSS

Reflected XSS occurs when user input is immediately returned by a web application in an error message, search result, or any other response that includes some or all of the input provided by the user as part of the request, without that data being made safe to render in the browser, and without permanently storing the user provided data. In some cases, the user provided data may never even leave the browser.

reflected-xss

DOM XSS

DOM Based XSS is a form of XSS where the entire tainted data flow from source to sink takes place in the browser, i.e., the source of the data is in the DOM, the sink is also in the DOM, and the data flow never leaves the browser. For example, the source (where malicious data is read) could be the URL of the page (e.g., document. location), or it could be an element of the HTML, and the sink is a sensitive method call that causes the execution of the malicious data (e.g., document. write)

dom-based-xss

5.How does ping work? 

 Ping is a basic Internet tool that allows a user to verify that a particular IP address exists and can accept requests. The verb ping means the act of using the ping utility or command. Ping is used diagnostically to ensure that a host computer you are trying to reach is actually operating. If, for example, a user cannot ping a host, then the user will be unable to use the File Transfer Protocol (FTP) to send files to that host.

6. Situation question- Imagine you’re sending a message to your friend but not reach to him? What are the possible reasons for it?

There are many reasons for it, but the main reasons is

  • Internet issue
  • Not connected to any network

7. Which port does ping works on?

Ping does not work on any port. A ping is a basic Internet tool that allows a user to verify that a particular IP address exists and can accept requests.

8. Any Favorite bug?

Mine is functionality error. Functionality is a way the software is intended to behave. Software has a functionality error if something that you expected to do is hard, awkward, confusing, or impossible.

9. What is a secure layer?

Secure Sockets Layer (SSL) is a standard security technology for establishing an encrypted link between a server and a client – typically a web server (website) and a browser, or a mail server and a mail client (e.g., Outlook).

ssl-standard-bar-example

10. What is session fixation? 

Fixation

Session Fixation is an attack that permits an attacker to hijack a valid user session. The attack explores a limitation in the way the web application manages the session ID, more specifically the vulnerable web application. When authenticating a user, it doesn’t assign a new session ID, making it possible to use an existent session ID. The attack consists of obtaining a valid session ID (e.g. by connecting to the application), inducing a user to authenticate himself with that session ID, and then hijacking the user-validated session by the knowledge of the used session ID. The attacker has to provide a legitimate Web application session ID and try to make the victim’s browser use it.

The session fixation attack is a class of Session Hijacking, which steals the established session between the client and the Web Server after the user logs in. Instead, the Session Fixation attack fixes an established session on the victim’s browser, so the attack starts before the user logs in.

11. What is Blind SQL?

Blind SQL (Structured Query Language) injection is a type of SQL Injection attack that asks the database true or false questions and determines the answer based on the applications response. This attack is often used when the web application is configured to show generic error messages, but has not mitigated the code that is vulnerable to SQL injection.

When an attacker exploits SQL injection, sometimes the web application displays error messages from the database complaining that the SQL Query’s syntax is incorrect. Blind SQL injection is nearly identical to normal SQL Injection, the only difference being the way the data is retrieved from the database. When the database does not output data to the web page, an attacker is forced to steal data by asking the database a series of true or false questions. This makes exploiting the SQL Injection vulnerability more difficult, but not impossible.