| Title | Author | Created | Published | Tags |
| --------------------------------- | ---------- | ------------------ | ------------------ | ---------------------------------------------------------------------------- |
| Best Cybersecurity Questions - 50 | Jon Marien | September 08, 2025 | September 08, 2025 | [[#jobs\|#jobs]], [[#interviews\|#interviews]],<br>[arcticwolf](#arcticwolf) |
# Best Cybersecurity Questions - 50
***
**Q1:** What is Cryptography?
**Technical:** The practice and study of securing information using mathematical algorithms to prevent unauthorized access.
**Non-Technical:** It’s like putting your secret message into a special locked box, so only people with the key can read it.
***
**Q2:** Difference between Symmetric and Asymmetric encryption?
**Technical:** Symmetric uses a single key to encrypt and decrypt data; asymmetric uses a public/private key pair.
**Non-Technical:** Symmetric is like one house key for locking and unlocking. Asymmetric is like giving out a mailbox for people to send mail, but only you have the key to open it.
***
**Q3:** Difference between IDS and IPS?
**Technical:** IDS detects intrusions and alerts; IPS detects and actively blocks/prevents threats.
**Non-Technical:** IDS is like an alarm system (just warns), while IPS is like an alarm system that also locks the doors to keep bad people out.
***
**Q4:** Explain the CIA Triad.
**Technical:** Confidentiality (restricting access), Integrity (ensuring data isn’t changed), Availability (ensuring data is accessible).
**Non-Technical:** Only the right people see info (C), it can’t be changed without permission (I), and it’s there when needed (A).
***
**Q5:** How is Encryption different from Hashing?
**Technical:** Encryption can be reversed/decrypted with a key. Hashing is one-way and cannot be reversed.
**Non-Technical:** Encryption is like writing in code you can undo; hashing is like shredding paper—can’t be put back together.
***
**Q6:** What is a Firewall and why is it used?
**Technical:** A system or device that monitors and controls network traffic by applying security rules.
**Non-Technical:** It’s a digital security guard at your building’s doors, only letting approved people or packages in or out.
***
**Q7:** Difference between Vulnerability Assessment and Penetration Testing?
**Technical:** VA looks for and lists weaknesses; PT actually tries to exploit them to see what can happen.
**Non-Technical:** VA is like walking around your house and making a list of unlocked windows; PT is trying to get in through them to see what happens.
***
**Q8:** What is a three-way handshake?
**Technical:** The SYN, SYN-ACK, ACK process that establishes a TCP connection between client and server.
**Non-Technical:** Like shaking hands three times to be sure both people agree to start a conversation.
***
**Q9:** What are the response codes from a Web Application?
**Technical:** 1xx (Info), 2xx (Success), 3xx (Redirect), 4xx (Client Error), 5xx (Server Error).
**Non-Technical:** Like getting different colored tickets at a fair: green for all good, yellow for warning, red for error, blue for a change in plans, etc.
***
**Q10:** What is traceroute?
**Technical:** A network diagnostic tool showing the path data takes to reach a destination, listing each network “hop.”
**Non-Technical:** Like tracking your pizza’s journey from the restaurant, to every stop, to your door.
***
**Q11:** Difference between HIDS and NIDS?
**Technical:** HIDS watches activity on a single device; NIDS watches all traffic in a network segment.
**Non-Technical:** HIDS is like a security camera in one room; NIDS is like a camera watching all the hallways.
***
**Q12:** What is Port Scanning?
**Technical:** Systematically checking open ports on a device to find available and potentially vulnerable services.
**Non-Technical:** Like rattling all doorknobs on a building to see which doors are unlocked.
***
**Q13:** What is a VPN and why is it used?
**Technical:** A Virtual Private Network encrypts your internet traffic and routes it through a secure server.
**Non-Technical:** Like sending mail through a secret tunnel so nobody can peek at what you’re sending.
***
**Q14:** What is Phishing?
**Technical:** Deceptive attempts (often by email) to acquire sensitive info by pretending to be a legitimate entity.
**Non-Technical:** Like someone pretending to be your bank and tricking you into giving your account number.
***
**Q15:** What is SQL Injection?
**Technical:** An attack where malicious SQL commands are inserted into input fields to manipulate the underlying database.
**Non-Technical:** Like someone slipping extra instructions into your order at a restaurant, so they get free food without paying.
***
**Q16:** What is ARP Poisoning?
**Technical:** Sending fake ARP messages to a LAN, associating the attacker’s MAC address with the IP of another host to intercept traffic.
**Non-Technical:** It’s like making everyone in class think your mailbox is the teacher’s, so you get her mail.
***
**Q17:** What is a Botnet?
**Technical:** A group of internet-connected devices infected and controlled by a hacker, often used for massive attacks.
**Non-Technical:** It’s like a puppet master having hundreds of robots do everything at once—good or bad.
***
**Q18:** What is DDoS?
**Technical:** A Distributed Denial of Service attack floods a target with traffic from multiple sources, causing service disruption.
**Non-Technical:** Like a huge crowd trying to squeeze through a door at once, so nobody gets in.
***
**Q19:** Explain Brute Force Attack.
**Technical:** Repeated attempts to guess a password by trying every possible combination.
**Non-Technical:** Like guessing your friend’s phone password by trying every number until you get it right.
***
**Q20:** Explain Two-Factor Authentication (2FA).
**Technical:** A method requiring two different forms of identity verification before granting access.
**Non-Technical:** Like using both a key and a code to unlock your bike.
***
**Q21:** What is a Zero-Day Vulnerability?
**Technical:** A software flaw unknown to the vendor and unpatched, exploitable immediately by attackers.
**Non-Technical:** Like finding a leak in your roof before the repair worker knows about it—rain comes in right away.
***
**Q22:** What is Cross-Site Scripting (XSS)?
**Technical:** Injecting malicious scripts into trusted websites that execute in users’ browsers.
**Non-Technical:** Like writing a fake note on the classroom board, so everyone who reads it gets tricked.
***
**Q23:** What is Man-in-the-Middle attack?
**Technical:** An attacker secretly intercepts and possibly alters communications between two parties.
**Non-Technical:** Like someone listening to and changing messages between you and your friend without you knowing.
***
**Q24:** What is Data Leakage?
**Technical:** Unintentional or unauthorized transfer of data from inside an organization to outside.
**Non-Technical:** Like a secret recipe accidentally leaked outside the kitchen.
***
**Q25:** What is Patch Management?
**Technical:** The process of testing, acquiring, and installing patches (updates) to fix software vulnerabilities.
**Non-Technical:** Like fixing holes in your clothes as soon as they appear.
***
**Q26:** What is a Security Audit?
**Technical:** Systematic evaluation of security policies, procedures, controls, and risk management in an organization.
**Non-Technical:** Like a checkup for your security, making sure everything works and nothing is broken.
***
**Q27:** Difference between Vulnerability and Exploit?
**Technical:** Vulnerability is a flaw/weakness; an exploit is code or a method used to take advantage of that flaw.
**Non-Technical:** Vulnerability is an unlocked door; exploit is someone finding and using that door to get in.
***
**Q28:** What is Social Engineering?
**Technical:** Manipulating people into divulging confidential info rather than hacking computers directly.
**Non-Technical:** Like tricking someone into telling you a secret by pretending to be their friend.
***
**Q29:** What is a Honeypot?
**Technical:** A decoy system set up to lure attackers, monitor their behavior, and prevent attacks.
**Non-Technical:** Like a fake cookie jar to catch a cookie thief.
***
**Q30:** What is a Security Incident?
**Technical:** An event that may indicate a breach of information systems or policies.
**Non-Technical:** Like hearing a broken window in your house—something’s gone wrong and needs checking.
***
**Q31:** What is Penetration Testing Lifecycle?
**Technical:** Planning, reconnaissance, scanning, exploitation, maintaining access, and reporting.
**Non-Technical:** Like planning a pretend break-in, seeing where you can get in, trying it, and writing a report on how you did it.
***
**Q32:** What is Network Sniffing?
**Technical:** The process of capturing and analyzing packets moving through a network.
**Non-Technical:** Like eavesdropping on people’s conversations in a hallway.
***
**Q33:** What is a Proxy Server?
**Technical:** An intermediary server that separates end users from the websites they access, improving privacy and security.
**Non-Technical:** Like a middleman who passes along your messages so your real identity stays hidden.
***
**Q34:** Difference between SSL and TLS?
**Technical:** SSL (Secure Sockets Layer) is an older protocol; TLS (Transport Layer Security) is the updated, more secure version.
**Non-Technical:** Like replacing an old lock with a new, stronger one.
***
**Q35:** What is Risk Assessment?
**Technical:** Identifying, analyzing, and evaluating potential security risks to assets.
**Non-Technical:** Like figuring out what could go wrong when you leave the house unlocked and watching out for those risks.
***
**Q36:** SQL Injection Countermeasures?
**Technical:** Use parameterized queries, input validation, least privilege, and proper error handling.
**Non-Technical:** Like only letting certain phrases on your party invite—anything unusual gets rejected.
***
**Q37:** What is a Digital Signature?
**Technical:** An encrypted value using a private key that verifies origin and integrity of data.
**Non-Technical:** Like a unique fingerprint or signature proving something really came from you.
***
**Q38:** Difference between Black Box and White Box Testing?
**Technical:** Black box testers don’t know the system internals; white box testers see the actual code and logic.
**Non-Technical:** Black box is guessing what’s inside a present; white box is opening it up and looking inside.
***
**Q39:** What is Multi-factor Authentication (MFA)?
**Technical:** Requires more than two types of verification (e.g., password + app + fingerprint).
**Non-Technical:** Like needing a key, a code, and a fingerprint to get into your house.
***
**Q40:** What is a Security Policy?
**Technical:** A document outlining rules and practices to maintain information security in an organization.
**Non-Technical:** Like a rulebook everyone has to follow to keep things safe.
***
**Q41:** What is a Security Operations Center (SOC)?
**Technical:** Centralized unit for monitoring, detecting, analyzing, and responding to cybersecurity incidents.
**Non-Technical:** Like a 24/7 emergency room for digital accidents.
***
**Q42:** What is a Hash Collision?
**Technical:** Two different inputs produce the same hash output, risking data integrity.
**Non-Technical:** Like two people having the same student ID number—confusing and a problem for records.
***
**Q43:** What is Session Hijacking?
**Technical:** An attacker takes over a user's online session to gain unauthorized access.
**Non-Technical:** Like stealing someone’s backstage pass and then pretending to be them.
***
**Q44:** What is SSL Pinning?
**Technical:** Associating a host with a specific SSL certificate/public key to prevent fake certificates.
**Non-Technical:** Like only letting delivery people with a certain badge bring you packages.
***
**Q45:** What is a Rogue Access Point?
**Technical:** An unauthorized wireless device not controlled by network security, possibly used by attackers.
**Non-Technical:** Like someone setting up a fake WiFi hotspot in your school cafeteria and spying on students.
***
**Q46:** What is Data Masking?
**Technical:** Replacing sensitive data with fictitious but realistic values for testing or sharing.
**Non-Technical:** It’s like covering private info in a letter before showing it to a friend.
***
**Q47:** What is BYOD?
**Technical:** "Bring Your Own Device" policy; staff use personal devices for work, requiring extra security.
**Non-Technical:** Like bringing your own phone to school and using it for school work.
***
**Q48:** What is Two-person Control?
**Technical:** Security requiring two authorized personnel to take specific actions, preventing misuse.
**Non-Technical:** Like needing two people to turn keys at the same time to open a safe.
***
**Q49:** What is Security through Obscurity?
**Technical:** Relying on secrecy of design for security rather than robust protective measures.
**Non-Technical:** Like hiding your house key under a rock and hoping no one finds it—not really safe.
***
**Q50:** What is Red Team and Blue Team exercise?
**Technical:** Red Team simulates attacks; Blue Team defends and improves systems in these structured exercises.
**Non-Technical:** Like having a team pretend to break into a building (Red) and another team trying to stop them (Blue).
***