Add office photos
Engaged Employer

Virtual Employee

3.4
based on 424 Reviews
Filter interviews by

Seyan International School Interview Questions and Answers

Updated 5 Feb 2024

Q1. Tell me about the top 10 OWASP vulnerabilities

Ans.

The OWASP Top 10 is a list of the most critical web application security risks.

  • Injection

  • Broken Authentication and Session Management

  • Cross-Site Scripting (XSS)

  • Broken Access Control

  • Security Misconfiguration

  • Insecure Cryptographic Storage

  • Insufficient Transport Layer Protection

  • Unvalidated and Unsanitized Input

  • Using Components with Known Vulnerabilities

  • Insufficient Logging and Monitoring

Add your answer

Q2. Tell me about how to mitigate common cyber attacks

Ans.

Mitigating common cyber attacks involves implementing strong passwords, regular software updates, and employee training.

  • Use strong passwords and two-factor authentication

  • Regularly update software and operating systems

  • Train employees on how to identify and avoid phishing scams

  • Implement firewalls and antivirus software

  • Limit access to sensitive data and regularly backup important files

Add your answer

Q3. Tell me about common Cyber Attacks

Ans.

Common cyber attacks include phishing, malware, ransomware, DDoS, and social engineering.

  • Phishing: fraudulent emails or websites that trick users into giving sensitive information

  • Malware: malicious software that can damage or control a computer system

  • Ransomware: malware that encrypts files and demands payment for their release

  • DDoS: Distributed Denial of Service attacks overwhelm a website or network with traffic

  • Social engineering: manipulating people into divulging sensitive ...read more

Add your answer

Q4. Tell me about HTTP vs HTTPS

Ans.

HTTP is unencrypted while HTTPS is encrypted. HTTPS provides secure communication over the internet.

  • HTTP stands for Hypertext Transfer Protocol while HTTPS stands for Hypertext Transfer Protocol Secure

  • HTTP is vulnerable to attacks like man-in-the-middle while HTTPS is secure

  • HTTPS uses SSL/TLS certificates to encrypt data while HTTP does not

  • HTTPS is used for secure online transactions like online banking, e-commerce, etc.

  • HTTP is used for general browsing and accessing websites

Add your answer
Discover Seyan International School interview dos and don'ts from real experiences

Q5. Tell me about the OSI model

Ans.

The OSI model is a conceptual model that describes how data is transmitted over a network.

  • OSI stands for Open Systems Interconnection

  • It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application

  • Each layer has a specific function and communicates with adjacent layers

  • The model helps ensure interoperability between different network devices and software

  • Example: HTTP operates at the Application layer, while TCP operates at the Transport layer

Add your answer

Q6. Basic terminologies in cyber security

Ans.

Basic terminologies in cyber security

  • Malware

  • Phishing

  • Firewall

  • Encryption

  • Vulnerability

  • Patch

  • Intrusion Detection System

  • Social Engineering

  • Two-Factor Authentication

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Cyber Security Analyst Interview Questions from Similar Companies

3.4
 • 12 Interview Questions
3.5
 • 11 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter