Cyber Security Intern

10+ Cyber Security Intern Interview Questions and Answers

Updated 25 Feb 2025
search-icon

Q1. What are the layers in network system

Ans.

The layers in a network system refer to the different levels of protocols and technologies that work together to transmit data.

  • Physical layer: Deals with the physical connection between devices (e.g. cables, switches)

  • Data link layer: Responsible for node-to-node communication (e.g. Ethernet)

  • Network layer: Manages routing and addressing (e.g. IP)

  • Transport layer: Ensures end-to-end communication (e.g. TCP)

  • Application layer: Provides interfaces for applications to access network...read more

Q2. Who is called as white hat hacker

Ans.

White hat hackers are ethical hackers who use their skills to help organizations improve their security.

  • White hat hackers are ethical hackers who have permission to test the security of systems and networks.

  • They help organizations by identifying vulnerabilities and providing recommendations for improving security.

  • White hat hackers often work as security consultants, penetration testers, or security researchers.

  • Examples of white hat hackers include Kevin Mitnick, Charlie Mille...read more

Cyber Security Intern Interview Questions and Answers for Freshers

illustration image

Q3. tcp/udp difference and tcp/ip model layers

Ans.

TCP is connection-oriented, reliable protocol while UDP is connectionless, unreliable protocol. TCP/IP model has 4 layers - Application, Transport, Internet, Link.

  • TCP is connection-oriented, ensures data delivery in order, and provides error-checking and retransmission of lost packets (e.g. email, web browsing)

  • UDP is connectionless, faster but less reliable, used for real-time applications where speed is more important than accuracy (e.g. video streaming, online gaming)

  • TCP/IP...read more

Q4. Explain 5 vulnerability in owasp Top 10

Ans.

Explanation of 5 vulnerabilities in OWASP Top 10

  • Injection: Allows attackers to inject malicious code into an application, such as SQL injection or command injection.

  • Broken Authentication: Weak authentication methods can lead to unauthorized access to sensitive data.

  • Sensitive Data Exposure: Failure to properly protect sensitive data can result in data breaches.

  • XML External Entities (XXE): Attackers can exploit vulnerable XML processors to access sensitive data or execute remot...read more

Are these interview questions helpful?

Q5. What is SIEM, SOAR, etc

Ans.

SIEM stands for Security Information and Event Management, while SOAR stands for Security Orchestration, Automation, and Response.

  • SIEM is a software solution that aggregates and analyzes security data from various sources to identify and respond to security incidents.

  • SOAR platforms automate and orchestrate security operations tasks, enabling faster incident response and improved efficiency.

  • Examples of SIEM tools include Splunk, IBM QRadar, and ArcSight.

  • Examples of SOAR platfo...read more

Q6. what is purpose of wireshark

Ans.

Wireshark is a network protocol analyzer used for troubleshooting, analysis, and security purposes.

  • Wireshark captures and analyzes network traffic in real-time.

  • It helps in identifying network problems, security vulnerabilities, and malicious activities.

  • Users can view packet details, filter traffic, and generate reports for analysis.

  • Wireshark is commonly used by network administrators, security professionals, and developers.

  • Example: Using Wireshark to analyze a network attack ...read more

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q7. How to find suspicious email

Ans.

Look for suspicious sender, check for spelling errors, verify links before clicking

  • Check the sender's email address for any suspicious or unfamiliar domains

  • Look for spelling and grammatical errors in the email content

  • Hover over links to see the actual URL before clicking on them

  • Be cautious of urgent or threatening language in the email

  • Avoid downloading attachments from unknown senders

Q8. Difference between SOC and SIEM

Ans.

SOC is a team responsible for monitoring and responding to security incidents, while SIEM is a tool used to collect, analyze, and correlate security data.

  • SOC (Security Operations Center) is a team of cybersecurity professionals responsible for monitoring, detecting, analyzing, and responding to security incidents.

  • SIEM (Security Information and Event Management) is a software solution that collects, analyzes, and correlates security data from various sources to provide actiona...read more

Cyber Security Intern Jobs

Cyber Security Internship 0-1 years
Wahy Lab Solutions
4.8
Ernakulam
Cyber Security Internship 0-1 years
Slash Mark IT Solutions (Startup)
4.1
Remote
Cyber Security Intern 3-4 years
i3indya Technologies
3.9
Noida

Q9. What is XSS attack?

Ans.

XSS attack is a type of cyber attack where attackers inject malicious scripts into web pages viewed by other users.

  • XSS stands for Cross-Site Scripting.

  • Attackers inject malicious scripts into web pages viewed by other users.

  • These scripts can steal sensitive information, deface websites, redirect users to malicious sites, etc.

  • There are three types of XSS attacks: Stored XSS, Reflected XSS, and DOM-based XSS.

  • Example: Attacker injects a script into a comment section of a website,...read more

Q10. Explain OSI Model

Ans.

The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

  • The OSI Model stands for Open Systems Interconnection Model.

  • It divides network communication into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has specific functions and interacts with adjacent layers to facilitate communication.

  • For example, the Physical layer deals with the physical co...read more

Q11. Identify hidden info

Ans.

Identifying hidden information is crucial in cyber security to uncover potential threats or vulnerabilities.

  • Look for hidden files or directories on a system

  • Check for hidden code or malware within legitimate files

  • Analyze network traffic for hidden communication channels

  • Examine metadata of files for hidden information

Q12. Explain OWASP Top 10

Ans.

OWASP Top 10 is a list of the top 10 most critical web application security risks.

  • Published by the Open Web Application Security Project (OWASP)

  • Helps organizations prioritize their security efforts

  • Includes vulnerabilities like injection, broken authentication, and sensitive data exposure

Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Cyber Security Intern Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter