Cyber Security Engineer

20+ Cyber Security Engineer Interview Questions and Answers

Updated 6 Aug 2024

Popular Companies

search-icon

Q1. What is private and public IP address

Ans.

Private IP addresses are used within a local network, while public IP addresses are used to identify a network on the internet.

  • Private IP addresses are not unique on the internet and are used within a local network to identify devices.

  • Public IP addresses are unique on the internet and are used to identify a network on the internet.

  • Private IP addresses are in the range of 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255.

  • Public IP add...read more

Q2. Explain about web application VAPT & in depth concepts in it

Ans.

Web application VAPT is a process of identifying vulnerabilities, assessing their impact, and providing solutions to secure web applications.

  • VAPT stands for Vulnerability Assessment and Penetration Testing

  • It involves identifying vulnerabilities in web applications and assessing their impact on the system

  • Penetration testing is done to simulate an attack and identify potential security breaches

  • The process includes identifying vulnerabilities, prioritizing them, and providing so...read more

Cyber Security Engineer Interview Questions and Answers for Freshers

illustration image

Q3. What happens when you search for something on the internet?

Ans.

When you search for something on the internet, your query is sent to a search engine which then retrieves relevant information from its index of websites.

  • User enters a search query into a search engine.

  • Search engine uses algorithms to find relevant websites from its index.

  • Search results are displayed to the user based on relevance and ranking.

  • User can click on search results to access the desired information.

Q4. Which tools do you use in Network Penetration Testing

Ans.

Some tools used in Network Penetration Testing include Nmap, Metasploit, Wireshark, and Burp Suite.

  • Nmap - for network discovery and mapping

  • Metasploit - for exploiting vulnerabilities

  • Wireshark - for analyzing network traffic

  • Burp Suite - for web application testing

Are these interview questions helpful?

Q5. How many hosts in class C IP address

Ans.

There are 256 hosts in a class C IP address.

  • Class C IP addresses have a subnet mask of 255.255.255.0

  • The first three octets are used for network identification

  • The last octet is used for host identification

  • The range of IP addresses in a class C network is from 192.0.0.0 to 223.255.255.255

  • Each octet has 8 bits, so the last octet can have 2^8 (256) possible values

Q6. What is the most recent vulnerability

Ans.

The most recent vulnerability is the PrintNightmare vulnerability in Windows Print Spooler service.

  • The vulnerability allows attackers to remotely execute code with system-level privileges.

  • It affects all versions of Windows and has a CVSS score of 8.8.

  • Microsoft has released patches for the vulnerability, but some experts suggest disabling the Print Spooler service as a temporary fix.

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q7. What do you know about Endpoint Security?

Ans.

Endpoint security focuses on protecting individual devices like laptops, smartphones, and tablets from cyber threats.

  • Endpoint security involves securing endpoints like laptops, smartphones, and tablets from cyber attacks.

  • It includes antivirus software, firewalls, intrusion detection systems, and encryption to protect endpoints.

  • Endpoint security helps prevent data breaches, malware infections, and unauthorized access to devices.

  • Examples of endpoint security solutions include S...read more

Q8. What tools are you familiar with?

Ans.

I am familiar with a variety of cyber security tools including Wireshark, Nmap, Metasploit, and Snort.

  • Wireshark

  • Nmap

  • Metasploit

  • Snort

Cyber Security Engineer Jobs

Cyber Security Engineer/Lead-Automotive(5+ Yrs) 5-10 years
Tata Elxsi
3.9
Chennai
Cyber Security Engineer (MALES) 5-8 years
Panzer Technologies
4.7
Hyderabad / Secunderabad
Cyber Security Engineer( Male) 5-7 years
Panzer Technologies
4.7
Hyderabad / Secunderabad

Q9. What is sql injection

Ans.

SQL injection is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate a database.

  • Allows attackers to access sensitive data or execute unauthorized actions

  • Occurs when user input is not properly sanitized

  • Can be prevented by using parameterized queries and input validation

  • Example: Entering ' OR 1=1;--' into a login form to bypass authentication

Q10. Give some example of vulnerable ports

Ans.

Vulnerable ports are those that are commonly targeted by attackers to gain unauthorized access to a system.

  • Port 21 (FTP)

  • Port 23 (Telnet)

  • Port 25 (SMTP)

  • Port 80 (HTTP)

  • Port 443 (HTTPS)

  • Port 3389 (Remote Desktop Protocol)

Q11. If the pinging is request is failed

Ans.

If the pinging request fails, it could be due to network issues, firewall restrictions, or incorrect IP address.

  • Check network connectivity to ensure the target device is reachable

  • Verify firewall settings to see if the ping request is being blocked

  • Ensure the correct IP address or hostname is being used in the ping command

Q12. Real scenario of sql injection in detail.

Ans.

SQL injection is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate the database.

  • SQL injection occurs when an attacker inserts malicious SQL code into a form field or URL parameter.

  • The injected SQL code can then be used to access or modify the database, steal data, or perform other malicious actions.

  • For example, entering ' OR '1'='1' into a login form could bypass authentication and grant unauthorized access.

  • Preventing SQL inj...read more

Q13. Difference between virus and Trojan?

Ans.

A virus is a self-replicating program that spreads by infecting other programs, while a Trojan is a program that appears harmless but actually has malicious intent.

  • Viruses attach themselves to clean files and spread when the infected file is executed.

  • Trojans are often disguised as legitimate software and trick users into installing them.

  • Viruses can cause damage to files and systems, while Trojans can steal data or give hackers remote access to a system.

  • Examples of viruses inc...read more

Q14. what is kerberos protocol?

Ans.

Kerberos protocol is a network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner.

  • Developed by MIT in the 1980s

  • Uses symmetric key cryptography

  • Involves a Key Distribution Center (KDC)

  • Prevents eavesdropping and replay attacks

Q15. What is cyber security

Ans.

Cyber security refers to the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.

  • It involves implementing security measures to prevent cyber attacks

  • It includes protecting against viruses, malware, and other malicious software

  • It also involves educating users on safe online practices

  • Examples of cyber security measures include firewalls, encryption, and multi-factor authentication

Q16. OWASP Top 10 and their definition

Ans.

OWASP Top 10 is a list of the most critical web application security risks.

  • Injection

  • Broken Authentication and Session Management

  • Cross-Site Scripting (XSS)

  • Broken Access Control

  • Security Misconfiguration

  • Insecure Cryptographic Storage

  • Insufficient Transport Layer Protection

  • Unvalidated and Unsanitized Input

  • Insufficient Logging and Monitoring

  • Using Components with Known Vulnerabilities

Q17. Real scenario of broken authorization

Ans.

Broken authorization occurs when a user is able to access resources they should not have permission to.

  • Improperly configured access control lists

  • Weak authentication mechanisms

  • Insufficient validation of user input

  • Insecure direct object references

Q18. how TLS work ?

Ans.

TLS (Transport Layer Security) is a protocol that ensures privacy and data integrity between communicating applications.

  • TLS encrypts data to ensure confidentiality during transmission.

  • It uses cryptographic algorithms to authenticate the parties involved in the communication.

  • TLS also provides mechanisms for data integrity to prevent tampering.

  • Handshake process involves negotiation of encryption algorithms and exchange of keys.

  • Common examples of TLS implementations include HTTP...read more

Q19. explain three way hand-shake

Ans.

Three-way handshake is a method used in TCP/IP network to establish a connection between a client and a server.

  • Client sends a SYN (synchronize) packet to the server to initiate a connection

  • Server responds with a SYN-ACK (synchronize-acknowledgment) packet to acknowledge the request

  • Client sends an ACK (acknowledgment) packet back to the server to confirm the connection

Q20. Explain the OSI Layers.

Ans.

The OSI Layers refer to the seven layers of the Open Systems Interconnection model that define the functions of a network protocol stack.

  • Layer 1 - Physical Layer: Deals with physical connections and transmission of raw data over a physical medium (e.g. cables, wires)

  • Layer 2 - Data Link Layer: Responsible for node-to-node communication, error detection, and flow control (e.g. Ethernet switches)

  • Layer 3 - Network Layer: Manages routing of data packets between different networks ...read more

Q21. Working of a firewall

Ans.

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  • Firewalls can be hardware or software-based

  • They act as a barrier between a trusted internal network and untrusted external network

  • Firewalls can filter traffic based on IP addresses, ports, protocols, and applications

  • They can be configured to block or allow specific traffic based on security policies

  • Examples of firewalls include Cisco A...read more

Q22. Explain owasp top 10

Ans.

OWASP Top 10 is a list of the top 10 most critical web application security risks.

  • OWASP Top 10 is updated regularly to reflect current security threats.

  • It helps organizations prioritize their security efforts.

  • Some examples of OWASP Top 10 risks include injection, broken authentication, and sensitive data exposure.

Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Interview experiences of popular companies

3.8
 • 5.4k Interviews
3.9
 • 153 Interviews
3.7
 • 131 Interviews
3.7
 • 44 Interviews
3.8
 • 35 Interviews
3.1
 • 2 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Cyber Security Engineer Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter