Positka
iEnergizer Interview Questions and Answers
Q1. Encryption and decryption comes under which part of the CIA triad.
Encryption and decryption come under the confidentiality part of the CIA triad.
Encryption and decryption are used to protect sensitive information from unauthorized access.
Confidentiality ensures that only authorized users can access the data.
Examples of encryption methods include AES, RSA, and DES.
Q2. What is the purpose DNS?
DNS stands for Domain Name System and its purpose is to translate domain names into IP addresses.
DNS helps users easily access websites by translating human-readable domain names (e.g. www.google.com) into machine-readable IP addresses (e.g. 172.217.3.206).
It helps in load balancing by distributing traffic among multiple servers based on the IP address resolved by DNS.
DNS also provides redundancy and fault tolerance by allowing multiple DNS servers to store the same DNS recor...read more
Q3. What is write blocker
A write blocker is a hardware device or software tool that prevents data from being written to a storage device.
Used in digital forensics to prevent accidental or intentional modification of data during analysis
Ensures the integrity of evidence by allowing read-only access to the storage device
Commonly used in investigations involving computers, mobile devices, and other digital media
Examples include Tableau write blockers, WiebeTech write blockers
Q4. What is firewall?
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters network traffic based on rules set by the administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and pfSense
Q5. What is CIA Triad
CIA Triad is a foundational concept in cybersecurity that stands for Confidentiality, Integrity, and Availability.
Confidentiality ensures that data is only accessible to authorized individuals.
Integrity ensures that data is accurate and has not been tampered with.
Availability ensures that data is accessible when needed, without interruption.
Examples: Encrypting sensitive information for confidentiality, using checksums for data integrity, and implementing redundancy for avail...read more
Q6. Difference between IDS and IPS
IDS detects and logs potential security threats, while IPS actively blocks and prevents them.
IDS stands for Intrusion Detection System, which monitors network traffic for suspicious activity and alerts the administrator.
IPS stands for Intrusion Prevention System, which not only detects threats like IDS but also takes action to block or prevent them.
IDS is passive in nature, while IPS is active and can automatically respond to threats.
An example of IDS is Snort, which analyzes...read more
Interview Process at iEnergizer
Top Cyber Security Analyst Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month