Security Analyst Intern

Security Analyst Intern Interview Questions and Answers

Updated 17 Feb 2025

Q1. how do you find the IP address of the website since tracert, and ping is common so, find another one.

Ans.

One way to find the IP address of a website is by using the nslookup command in the command prompt.

  • Open the command prompt on your computer

  • Type 'nslookup' followed by the website URL (e.g. nslookup www.google.com)

  • The IP address of the website will be displayed in the 'Address' section

Q2. Why is the * displayed on the tracert command on the terminal

Ans.

The * on the tracert command indicates a timeout for a particular hop in the network path.

  • The * symbol is displayed when a particular hop in the network path does not respond within the specified time limit.

  • This could be due to network congestion, firewall blocking ICMP packets, or the target host being offline.

  • The tracert command sends ICMP packets to each router in the path to a destination, and if a router does not respond within the timeout period, the * symbol is display...read more

Security Analyst Intern Interview Questions and Answers for Freshers

illustration image

Q3. What are encoding, hashing, and encryption?

Ans.

Encoding, hashing, and encryption are methods used to protect data by transforming it into a different format.

  • Encoding is the process of converting data into a different format using a scheme that is publicly available. Example: Base64 encoding.

  • Hashing is the process of converting data into a fixed-size string of characters using a mathematical algorithm. Example: SHA-256 hashing.

  • Encryption is the process of converting data into a ciphertext using a key, making it unreadable ...read more

Q4. Code the Call by value and Call by reference in a simple C++ program

Ans.

Call by value passes a copy of the actual parameter, while Call by reference passes the address of the actual parameter.

  • In Call by value, changes made to the formal parameter do not affect the actual parameter.

  • In Call by reference, changes made to the formal parameter affect the actual parameter.

  • Example for Call by value: void swap(int x, int y) { int temp = x; x = y; y = temp; }

  • Example for Call by reference: void swap(int &x, int &y) { int temp = x; x = y; y = temp; }

Are these interview questions helpful?

Q5. Certificates used on their websites and find them

Ans.

Research and analyze certificates used on websites

  • Use tools like SSL Labs to analyze SSL certificates

  • Look for certificate details like issuer, expiration date, and encryption strength

  • Check for any potential vulnerabilities or misconfigurations

  • Verify if the certificates are properly installed and configured

Q6. OSI model with all the layer workings

Ans.

The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

  • Layer 1 - Physical layer: Deals with physical connections and transmission of raw data over a physical medium (e.g. cables)

  • Layer 2 - Data Link layer: Responsible for node-to-node communication, error detection, and flow control (e.g. Ethernet switches)

  • Layer 3 - Network layer: Manages routing of data packets between different networks (e.g. route...read more

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q7. nmap with all the -help otion

Ans.

nmap is a powerful network scanning tool used for discovering hosts and services on a network.

  • nmap -h: Display a brief help message

  • nmap -H: Display a detailed help message

  • nmap --help: Display all available options and usage information

Q8. Nmap with specific commands

Ans.

Nmap is a powerful network scanning tool used to discover hosts and services on a network.

  • Use 'nmap -sP <target>' to perform a ping scan to check which hosts are online

  • Use 'nmap -sS <target>' to perform a TCP SYN scan to identify open ports

  • Use 'nmap -A <target>' to enable OS detection, version detection, script scanning, and traceroute

  • Use 'nmap -O <target>' to perform OS detection on the target host

Q9. The harvester tool

Ans.

The harvester tool is a data collection tool used for gathering information from various sources.

  • The harvester tool can be used for collecting email addresses, usernames, and other information from websites and social media platforms.

  • It is commonly used by security analysts to gather intelligence on potential threats or vulnerabilities.

  • The tool can also be used for reconnaissance purposes to gather information about a target's online presence.

  • Examples of harvester tools inclu...read more

Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Interview experiences of popular companies

2.4
 • 2 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Security Analyst Intern Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter