Cyber Security Intern
10+ Cyber Security Intern Interview Questions and Answers
Q1. What are the layers in network system
The layers in a network system refer to the different levels of protocols and technologies that work together to transmit data.
Physical layer: Deals with the physical connection between devices (e.g. cables, switches)
Data link layer: Responsible for node-to-node communication (e.g. Ethernet)
Network layer: Manages routing and addressing (e.g. IP)
Transport layer: Ensures end-to-end communication (e.g. TCP)
Application layer: Provides interfaces for applications to access network...read more
Q2. Who is called as white hat hacker
White hat hackers are ethical hackers who use their skills to help organizations improve their security.
White hat hackers are ethical hackers who have permission to test the security of systems and networks.
They help organizations by identifying vulnerabilities and providing recommendations for improving security.
White hat hackers often work as security consultants, penetration testers, or security researchers.
Examples of white hat hackers include Kevin Mitnick, Charlie Mille...read more
Cyber Security Intern Interview Questions and Answers for Freshers
Q3. tcp/udp difference and tcp/ip model layers
TCP is connection-oriented, reliable protocol while UDP is connectionless, unreliable protocol. TCP/IP model has 4 layers - Application, Transport, Internet, Link.
TCP is connection-oriented, ensures data delivery in order, and provides error-checking and retransmission of lost packets (e.g. email, web browsing)
UDP is connectionless, faster but less reliable, used for real-time applications where speed is more important than accuracy (e.g. video streaming, online gaming)
TCP/IP...read more
Q4. Explain 5 vulnerability in owasp Top 10
Explanation of 5 vulnerabilities in OWASP Top 10
Injection: Allows attackers to inject malicious code into an application, such as SQL injection or command injection.
Broken Authentication: Weak authentication methods can lead to unauthorized access to sensitive data.
Sensitive Data Exposure: Failure to properly protect sensitive data can result in data breaches.
XML External Entities (XXE): Attackers can exploit vulnerable XML processors to access sensitive data or execute remot...read more
Q5. What is SIEM, SOAR, etc
SIEM stands for Security Information and Event Management, while SOAR stands for Security Orchestration, Automation, and Response.
SIEM is a software solution that aggregates and analyzes security data from various sources to identify and respond to security incidents.
SOAR platforms automate and orchestrate security operations tasks, enabling faster incident response and improved efficiency.
Examples of SIEM tools include Splunk, IBM QRadar, and ArcSight.
Examples of SOAR platfo...read more
Q6. what is purpose of wireshark
Wireshark is a network protocol analyzer used for troubleshooting, analysis, and security purposes.
Wireshark captures and analyzes network traffic in real-time.
It helps in identifying network problems, security vulnerabilities, and malicious activities.
Users can view packet details, filter traffic, and generate reports for analysis.
Wireshark is commonly used by network administrators, security professionals, and developers.
Example: Using Wireshark to analyze a network attack ...read more
Share interview questions and help millions of jobseekers 🌟
Q7. How to find suspicious email
Look for suspicious sender, check for spelling errors, verify links before clicking
Check the sender's email address for any suspicious or unfamiliar domains
Look for spelling and grammatical errors in the email content
Hover over links to see the actual URL before clicking on them
Be cautious of urgent or threatening language in the email
Avoid downloading attachments from unknown senders
Q8. Difference between SOC and SIEM
SOC is a team responsible for monitoring and responding to security incidents, while SIEM is a tool used to collect, analyze, and correlate security data.
SOC (Security Operations Center) is a team of cybersecurity professionals responsible for monitoring, detecting, analyzing, and responding to security incidents.
SIEM (Security Information and Event Management) is a software solution that collects, analyzes, and correlates security data from various sources to provide actiona...read more
Cyber Security Intern Jobs
Q9. What is XSS attack?
XSS attack is a type of cyber attack where attackers inject malicious scripts into web pages viewed by other users.
XSS stands for Cross-Site Scripting.
Attackers inject malicious scripts into web pages viewed by other users.
These scripts can steal sensitive information, deface websites, redirect users to malicious sites, etc.
There are three types of XSS attacks: Stored XSS, Reflected XSS, and DOM-based XSS.
Example: Attacker injects a script into a comment section of a website,...read more
Q10. Explain OSI Model
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It divides network communication into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and interacts with adjacent layers to facilitate communication.
For example, the Physical layer deals with the physical co...read more
Q11. Identify hidden info
Identifying hidden information is crucial in cyber security to uncover potential threats or vulnerabilities.
Look for hidden files or directories on a system
Check for hidden code or malware within legitimate files
Analyze network traffic for hidden communication channels
Examine metadata of files for hidden information
Q12. Explain OWASP Top 10
OWASP Top 10 is a list of the top 10 most critical web application security risks.
Published by the Open Web Application Security Project (OWASP)
Helps organizations prioritize their security efforts
Includes vulnerabilities like injection, broken authentication, and sensitive data exposure
Interview Questions of Similar Designations
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month