cyber security interview questions and answers for freshers 2022

Cyber Security Interview Questions for Freshers 2022

 Most Asked Cyber Security Interview Questions and Answers. Following is a list of most frequently asked Cyber Security interview questions Define Cybersecurity? · What is the difference between IDS and IPS? Here are the cyber security interview questions. … Cyber security is the protection of software, hardware, and data from various attackers.

Q1.All of the following are examples of real security and privacy threats except:

A. Hackers
B. Virus
C. Spam
D. Worm

Option C – Spam

Q2.Viruses are __.

A. Man made
B. Naturally occur
C. Machine made
D. All of the above

Option A – Man made

Q3.When a person is harrassed repeatedly by being followed, called or be written to he / she is a target of

A. Bullying
B. Stalking
C. Identity theft
D. Phishing

Option B -Stalking

Q4.It is a program or hardware device that filters the information coming through an internet connection to a network or computer system.

A. Anti virus
B. Cookies
C. Firewall
D. Cyber safety

Option C – Firewall

Q5.It is stealing ideas or creations of others.

A. Plagiarism
B. Intellectual Property Rights
C. Piracy
D. All of the above

Option D – All of the above

Q6.Which of the following principle is violated if computer system is not accessible?

A. Confidentiality
B. Availability
C. Access Control
D. Authentication

Option B – Availability

Q7.The number of users on a network has the greatest impact on the network’s _

A. Performance
B. Reliability
C. Security
D. none of the above

Option A – Performance

Q8._ is a network reliability issue.

A. Catastrophe
B. The number of users
C. The type of transmission medium
D. Unauthorized access

Option A – Catastrophe

Q9.Encryption techniques improve a network’s _

A. Performance
B. Reliability
C. Security
D. Longevity

Option C – Security

Q10.Which of the following are network reliability issues?

A. frequency of failure
B. recovery time after a failure
C. catastrophe
D. all of the above

Option D – all of the above

Q11.When an earthquake severs a fiber-optic cable, this is a network _ issue

A. Performance
B. Reliability
C. Security
D. none of the above

Option A – Performance

Q12.What Security tradeoff occurs while using IDS (Intrusion Detection System)?

A. Change in permission
B. Login Failures
C. Change in privilege
D. Performance degradation

Option D – Performance degradation

Q13.EDI (Electronic Data Interchange) over internet uses

A. MIME to attach EDI forms to e-mail messages
B. FTP to send business forms
C. HTTP to send business forms
D. SGML to send business forms

Option A – MIME to attach EDI forms to e-mail messages

Q14.EDI (Electronic Data Interchange) standard

A. is not easily available
B. defines several hundred transaction sets for various business forms
C. is not popular
D. defines only a transmission protocol

Option B – defines several hundred transaction sets for various business forms

Q15.A firewall may be implemented in

A. routers which connect intranet to internet
B. bridges used in an intranet
C. expensive modem
D. user’s application programs

Option A – routers which connect intranet to internet

Q16.By applying permutation (31254) and substitution by 5 characters away from current character (A Æ F , B Æ G etc..) the following string ABRACADABRA becomes

A. FGWCAAADRBF
B. RABCAAADRBF
C. WFGHFFFIWGF
D. None of the above

Option C – WFGHFFFIWGF

Q17.The Acronym DES stands for

A. Digital Evaluation System
B. Digital Encryption Standard
C. Digital Encryption System
D. Double Encryption Standard

Option B – Digital Encryption Standard

Q18. DES
(i) is a symmetric key encryption method
(ii) guarantees absolute security
(iii) is implementable as hardware VLSI chip
(iv) is a public key encryption method

A. i and ii
B. ii and iii
C. i and iii
D. iii and iv

Option C – i and iii

Q19.Triple DES uses

A. 168 bit keys on 64-bit blocks of plain text
B. Working on 64-bit blocks of plain text and 56 bit keys by applying DES algorithm for three rounds.
C. Works with 144 bit blocks of plain text and applies DES algorithm once.
D. Uses 128 bit blocks of plain text and 112 bit keys and apply DES algorithm thrice.

Option B – Working on 64-bit blocks of plain text and 56 bit keys by applying DES algorithm for three rounds.

Q20.In public key encryption if A wants to send an encrypted message

A.A encrypts message using his private key
B. A encrypts message using B’s private key
C. A encrypts message using B’s public key
D. A encrypts message using his public key

Option C – A encrypts message using B’s public key

Q21.Message can be sent more securely using DES by

A. encrypting plain text by a different randomly selected key for each transmission
B. encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system
C. using an algorithm to implement DES instead of using hardware
D. designing DES with high security and not publicizing algorithm used by it

Option B – encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system

Q22.While sending a signed message, a sender

A. sends message key using public key encryption using DES and hashed message using public key encryption
B. sends message using public key encryption and hashed message using DES
C. sends both message and hashed message using DES
D. sends both message and hashed message using public key encryption

Option A – sends message key using public key encryption using DES and hashed message using public key encryption

Q23.In SET protocol a customer encrypts credit card number using

A. his private key
B. bank’s public key
C. bank’s private key
D. merchant’s public key

Option B – bank’s public key

Q24.In NetBill’s protocol for small payments for internet services
(i) Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account
(ii) The vendor supplies the key to NetBill server when he receives payment
(iii) Checksum of encrypted information received by customer is attached to his payment order
(iv) Vendor does not encrypt information purchased by customer

A. i, ii
B. i, ii, iii
C. i, ii, iii, iv
D. i, ii, iv

Option B – i, ii, iii

Q25.What does IP mean?

A. Instance Principle
B. Internet Protocol
C. Instant Protocol
D. Intellectual Property

Option B – Internet Protocol

Leave a Reply

Your email address will not be published.