| Title | Author | Created | Published | Tags | | --------------------------------- | ---------- | ------------------ | ------------------ | ---------------------------------------------------------------------------- | | Best Cybersecurity Questions - 50 | Jon Marien | September 08, 2025 | September 08, 2025 | [[#jobs\|#jobs]], [[#interviews\|#interviews]],<br>[arcticwolf](#arcticwolf) | # Best Cybersecurity Questions - 50 *** **Q1:** What is Cryptography? **Technical:** The practice and study of securing information using mathematical algorithms to prevent unauthorized access. **Non-Technical:** It’s like putting your secret message into a special locked box, so only people with the key can read it. *** **Q2:** Difference between Symmetric and Asymmetric encryption? **Technical:** Symmetric uses a single key to encrypt and decrypt data; asymmetric uses a public/private key pair. **Non-Technical:** Symmetric is like one house key for locking and unlocking. Asymmetric is like giving out a mailbox for people to send mail, but only you have the key to open it. *** **Q3:** Difference between IDS and IPS? **Technical:** IDS detects intrusions and alerts; IPS detects and actively blocks/prevents threats. **Non-Technical:** IDS is like an alarm system (just warns), while IPS is like an alarm system that also locks the doors to keep bad people out. *** **Q4:** Explain the CIA Triad. **Technical:** Confidentiality (restricting access), Integrity (ensuring data isn’t changed), Availability (ensuring data is accessible). **Non-Technical:** Only the right people see info (C), it can’t be changed without permission (I), and it’s there when needed (A). *** **Q5:** How is Encryption different from Hashing? **Technical:** Encryption can be reversed/decrypted with a key. Hashing is one-way and cannot be reversed. **Non-Technical:** Encryption is like writing in code you can undo; hashing is like shredding paper—can’t be put back together. *** **Q6:** What is a Firewall and why is it used? **Technical:** A system or device that monitors and controls network traffic by applying security rules. **Non-Technical:** It’s a digital security guard at your building’s doors, only letting approved people or packages in or out. *** **Q7:** Difference between Vulnerability Assessment and Penetration Testing? **Technical:** VA looks for and lists weaknesses; PT actually tries to exploit them to see what can happen. **Non-Technical:** VA is like walking around your house and making a list of unlocked windows; PT is trying to get in through them to see what happens. *** **Q8:** What is a three-way handshake? **Technical:** The SYN, SYN-ACK, ACK process that establishes a TCP connection between client and server. **Non-Technical:** Like shaking hands three times to be sure both people agree to start a conversation. *** **Q9:** What are the response codes from a Web Application? **Technical:** 1xx (Info), 2xx (Success), 3xx (Redirect), 4xx (Client Error), 5xx (Server Error). **Non-Technical:** Like getting different colored tickets at a fair: green for all good, yellow for warning, red for error, blue for a change in plans, etc. *** **Q10:** What is traceroute? **Technical:** A network diagnostic tool showing the path data takes to reach a destination, listing each network “hop.” **Non-Technical:** Like tracking your pizza’s journey from the restaurant, to every stop, to your door. *** **Q11:** Difference between HIDS and NIDS? **Technical:** HIDS watches activity on a single device; NIDS watches all traffic in a network segment. **Non-Technical:** HIDS is like a security camera in one room; NIDS is like a camera watching all the hallways. *** **Q12:** What is Port Scanning? **Technical:** Systematically checking open ports on a device to find available and potentially vulnerable services. **Non-Technical:** Like rattling all doorknobs on a building to see which doors are unlocked. *** **Q13:** What is a VPN and why is it used? **Technical:** A Virtual Private Network encrypts your internet traffic and routes it through a secure server. **Non-Technical:** Like sending mail through a secret tunnel so nobody can peek at what you’re sending. *** **Q14:** What is Phishing? **Technical:** Deceptive attempts (often by email) to acquire sensitive info by pretending to be a legitimate entity. **Non-Technical:** Like someone pretending to be your bank and tricking you into giving your account number. *** **Q15:** What is SQL Injection? **Technical:** An attack where malicious SQL commands are inserted into input fields to manipulate the underlying database. **Non-Technical:** Like someone slipping extra instructions into your order at a restaurant, so they get free food without paying. *** **Q16:** What is ARP Poisoning? **Technical:** Sending fake ARP messages to a LAN, associating the attacker’s MAC address with the IP of another host to intercept traffic. **Non-Technical:** It’s like making everyone in class think your mailbox is the teacher’s, so you get her mail. *** **Q17:** What is a Botnet? **Technical:** A group of internet-connected devices infected and controlled by a hacker, often used for massive attacks. **Non-Technical:** It’s like a puppet master having hundreds of robots do everything at once—good or bad. *** **Q18:** What is DDoS? **Technical:** A Distributed Denial of Service attack floods a target with traffic from multiple sources, causing service disruption. **Non-Technical:** Like a huge crowd trying to squeeze through a door at once, so nobody gets in. *** **Q19:** Explain Brute Force Attack. **Technical:** Repeated attempts to guess a password by trying every possible combination. **Non-Technical:** Like guessing your friend’s phone password by trying every number until you get it right. *** **Q20:** Explain Two-Factor Authentication (2FA). **Technical:** A method requiring two different forms of identity verification before granting access. **Non-Technical:** Like using both a key and a code to unlock your bike. *** **Q21:** What is a Zero-Day Vulnerability? **Technical:** A software flaw unknown to the vendor and unpatched, exploitable immediately by attackers. **Non-Technical:** Like finding a leak in your roof before the repair worker knows about it—rain comes in right away. *** **Q22:** What is Cross-Site Scripting (XSS)? **Technical:** Injecting malicious scripts into trusted websites that execute in users’ browsers. **Non-Technical:** Like writing a fake note on the classroom board, so everyone who reads it gets tricked. *** **Q23:** What is Man-in-the-Middle attack? **Technical:** An attacker secretly intercepts and possibly alters communications between two parties. **Non-Technical:** Like someone listening to and changing messages between you and your friend without you knowing. *** **Q24:** What is Data Leakage? **Technical:** Unintentional or unauthorized transfer of data from inside an organization to outside. **Non-Technical:** Like a secret recipe accidentally leaked outside the kitchen. *** **Q25:** What is Patch Management? **Technical:** The process of testing, acquiring, and installing patches (updates) to fix software vulnerabilities. **Non-Technical:** Like fixing holes in your clothes as soon as they appear. *** **Q26:** What is a Security Audit? **Technical:** Systematic evaluation of security policies, procedures, controls, and risk management in an organization. **Non-Technical:** Like a checkup for your security, making sure everything works and nothing is broken. *** **Q27:** Difference between Vulnerability and Exploit? **Technical:** Vulnerability is a flaw/weakness; an exploit is code or a method used to take advantage of that flaw. **Non-Technical:** Vulnerability is an unlocked door; exploit is someone finding and using that door to get in. *** **Q28:** What is Social Engineering? **Technical:** Manipulating people into divulging confidential info rather than hacking computers directly. **Non-Technical:** Like tricking someone into telling you a secret by pretending to be their friend. *** **Q29:** What is a Honeypot? **Technical:** A decoy system set up to lure attackers, monitor their behavior, and prevent attacks. **Non-Technical:** Like a fake cookie jar to catch a cookie thief. *** **Q30:** What is a Security Incident? **Technical:** An event that may indicate a breach of information systems or policies. **Non-Technical:** Like hearing a broken window in your house—something’s gone wrong and needs checking. *** **Q31:** What is Penetration Testing Lifecycle? **Technical:** Planning, reconnaissance, scanning, exploitation, maintaining access, and reporting. **Non-Technical:** Like planning a pretend break-in, seeing where you can get in, trying it, and writing a report on how you did it. *** **Q32:** What is Network Sniffing? **Technical:** The process of capturing and analyzing packets moving through a network. **Non-Technical:** Like eavesdropping on people’s conversations in a hallway. *** **Q33:** What is a Proxy Server? **Technical:** An intermediary server that separates end users from the websites they access, improving privacy and security. **Non-Technical:** Like a middleman who passes along your messages so your real identity stays hidden. *** **Q34:** Difference between SSL and TLS? **Technical:** SSL (Secure Sockets Layer) is an older protocol; TLS (Transport Layer Security) is the updated, more secure version. **Non-Technical:** Like replacing an old lock with a new, stronger one. *** **Q35:** What is Risk Assessment? **Technical:** Identifying, analyzing, and evaluating potential security risks to assets. **Non-Technical:** Like figuring out what could go wrong when you leave the house unlocked and watching out for those risks. *** **Q36:** SQL Injection Countermeasures? **Technical:** Use parameterized queries, input validation, least privilege, and proper error handling. **Non-Technical:** Like only letting certain phrases on your party invite—anything unusual gets rejected. *** **Q37:** What is a Digital Signature? **Technical:** An encrypted value using a private key that verifies origin and integrity of data. **Non-Technical:** Like a unique fingerprint or signature proving something really came from you. *** **Q38:** Difference between Black Box and White Box Testing? **Technical:** Black box testers don’t know the system internals; white box testers see the actual code and logic. **Non-Technical:** Black box is guessing what’s inside a present; white box is opening it up and looking inside. *** **Q39:** What is Multi-factor Authentication (MFA)? **Technical:** Requires more than two types of verification (e.g., password + app + fingerprint). **Non-Technical:** Like needing a key, a code, and a fingerprint to get into your house. *** **Q40:** What is a Security Policy? **Technical:** A document outlining rules and practices to maintain information security in an organization. **Non-Technical:** Like a rulebook everyone has to follow to keep things safe. *** **Q41:** What is a Security Operations Center (SOC)? **Technical:** Centralized unit for monitoring, detecting, analyzing, and responding to cybersecurity incidents. **Non-Technical:** Like a 24/7 emergency room for digital accidents. *** **Q42:** What is a Hash Collision? **Technical:** Two different inputs produce the same hash output, risking data integrity. **Non-Technical:** Like two people having the same student ID number—confusing and a problem for records. *** **Q43:** What is Session Hijacking? **Technical:** An attacker takes over a user's online session to gain unauthorized access. **Non-Technical:** Like stealing someone’s backstage pass and then pretending to be them. *** **Q44:** What is SSL Pinning? **Technical:** Associating a host with a specific SSL certificate/public key to prevent fake certificates. **Non-Technical:** Like only letting delivery people with a certain badge bring you packages. *** **Q45:** What is a Rogue Access Point? **Technical:** An unauthorized wireless device not controlled by network security, possibly used by attackers. **Non-Technical:** Like someone setting up a fake WiFi hotspot in your school cafeteria and spying on students. *** **Q46:** What is Data Masking? **Technical:** Replacing sensitive data with fictitious but realistic values for testing or sharing. **Non-Technical:** It’s like covering private info in a letter before showing it to a friend. *** **Q47:** What is BYOD? **Technical:** "Bring Your Own Device" policy; staff use personal devices for work, requiring extra security. **Non-Technical:** Like bringing your own phone to school and using it for school work. *** **Q48:** What is Two-person Control? **Technical:** Security requiring two authorized personnel to take specific actions, preventing misuse. **Non-Technical:** Like needing two people to turn keys at the same time to open a safe. *** **Q49:** What is Security through Obscurity? **Technical:** Relying on secrecy of design for security rather than robust protective measures. **Non-Technical:** Like hiding your house key under a rock and hoping no one finds it—not really safe. *** **Q50:** What is Red Team and Blue Team exercise? **Technical:** Red Team simulates attacks; Blue Team defends and improves systems in these structured exercises. **Non-Technical:** Like having a team pretend to break into a building (Red) and another team trying to stop them (Blue). ***