| Title | Author | Created | Published | Tags |
| ----------------------------------------- | ---------- | ------------------ | ------------------ | ---------------------------------------------------------------------------- |
| Best Cybersecurity Questions - 50 (Table) | Jon Marien | September 08, 2025 | September 08, 2025 | [[#jobs\|#jobs]], [[#interviews\|#interviews]],<br>[arcticwolf](#arcticwolf) |
# Best Cybersecurity Questions - 50 (Table)
***
| # | Question | Technical Answer | Non-Technical Answer |
| --- | -------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------- |
| 1 | What is Cryptography? | The practice and study of securing information using mathematical algorithms to prevent unauthorized access. | Like putting a message into a locked box so only people with the special key can open it. |
| 2 | Difference between Symmetric & Asymmetric encryption? | Symmetric uses the same key to encrypt and decrypt; asymmetric uses paired public and private keys. | Symmetric: one key for locking/unlocking. Asymmetric: mailbox address for mail, but only you can open it. |
| 3 | Difference between IDS and IPS? | IDS detects intrusions and alerts; IPS detects and actively blocks/prevents threats. | IDS: alarm system warns you. IPS: alarm that also locks the doors to keep people out. |
| 4 | Explain the CIA Triad. | Confidentiality (restricting access), Integrity (ensuring data isn’t changed), Availability (ensuring data is accessible). | Only the right people see info (C); it can’t be changed without permission (I); it’s there when needed (A). |
| 5 | How is Encryption different from Hashing? | Encryption is reversible with a key. Hashing is one-way and cannot be reversed. | Encryption: code you can undo. Hashing: like shredding paper—can’t be put back together. |
| 6 | What is a Firewall and why is it used? | A system or device that monitors and controls network traffic by applying security rules. | A digital guard at your doors, only letting approved people/things in or out. |
| 7 | Difference between Vulnerability Assessment and Penetration Testing? | VA looks for and lists weaknesses; PT actually tries to exploit them to see what can happen. | VA: list of unlocked windows. PT: tries to get in through them to test what happens. |
| 8 | What is a three-way handshake? | The SYN, SYN-ACK, ACK process that establishes a TCP connection between client and server. | Like shaking hands three times to be sure both people want to start a conversation. |
| 9 | What are the response codes from a Web Application? | 1xx (Info), 2xx (Success), 3xx (Redirect), 4xx (Client Error), 5xx (Server Error). | Like colored tickets: green (all good), yellow (warning), red (error), blue (redirect), etc. |
| 10 | What is traceroute? | A network diagnostic tool showing the path data takes to reach a destination, listing each network “hop.” | Like tracking your pizza’s route from restaurant to your door. |
| 11 | Difference between HIDS and NIDS? | HIDS: watches activity on a single device; NIDS: watches all traffic in a network segment. | HIDS: camera in one room; NIDS: camera in hallways watching everything. |
| 12 | What is Port Scanning? | Checking open ports on a device to find available/vulnerable services. | Like rattling doorknobs to see which doors are unlocked. |
| 13 | What is a VPN and why is it used? | VPN encrypts internet traffic and routes it through a secure server. | Like sending mail in a secret tunnel so nobody else can see it. |
| 14 | What is Phishing? | Attacker pretends to be trustworthy to trick users into sharing sensitive data. | Like someone pretending to be your bank to get your password. |
| 15 | What is SQL Injection? | Attack inserting malicious SQL statements via input fields to manipulate a database. | Like slipping a secret instruction into your food order to get free dessert! |
| 16 | What is ARP Poisoning? | Sending fake ARP messages to a LAN to associate attacker’s MAC with another IP, intercepting traffic. | Like telling the mailman your mailbox is the principal’s to get her mail. |
| 17 | What is a Botnet? | Infected internet-connected devices controlled by a hacker, often used for attacks like DDoS. | Like a puppet master making lots of robots attack at once. |
| 18 | What is DDoS? | Distributed Denial of Service: floods a target with traffic from many sources, causing disruptions. | Like a thousand people crowding a doorway so nobody gets in. |
| 19 | Explain Brute Force Attack. | Systematic trial of all possible passwords/keys until the correct one is found. | Like guessing every possible locker combination until one works. |
| 20 | Explain Two-Factor Authentication (2FA). | Access requires two verification types, e.g., password and physical token. | Like using both a key and a code to unlock your house. |
| 21 | What is a Zero-Day Vulnerability? | Software flaw unknown to the vendor, not patched yet, exploitable immediately. | Like a leaky pipe before the plumber knows about it—problem happens instantly. |
| 22 | What is Cross-Site Scripting (XSS)? | Attack injecting scripts into a trusted website to run in other users’ browsers. | Like putting a prank note on the blackboard for everyone to read and believe. |
| 23 | What is Man-in-the-Middle attack? | Attacker secretly relays/changes communication between two people. | Like a sneaky eavesdropper changing messages between you and a friend. |
| 24 | What is Data Leakage? | Unintentional or unauthorized transfer of data outside the organization. | Like a secret recipe leaving the kitchen without permission. |
| 25 | What is Patch Management? | Testing, acquiring, and installing software patches/updates to fix bugs/security holes. | Like sewing patches on clothes as soon as holes appear. |
| 26 | What is a Security Audit? | Review/evaluation of security policies, controls, and practices in an organization. | Like a security checkup for your technology systems. |
| 27 | Difference between Vulnerability and Exploit? | Vulnerability: a flaw; Exploit: code or method that takes advantage of the flaw. | Vulnerability: unlocked door; exploit: someone walks through it. |
| 28 | What is Social Engineering? | Manipulating people to reveal confidential info rather than hacking technology. | Like tricking someone into giving you their password by pretending to be their boss. |
| 29 | What is a Honeypot? | Decoy system meant to lure, study, and trap attackers. | Like a fake cookie jar to catch cookie thieves. |
| 30 | What is a Security Incident? | Event that may indicate a breach or security failure needing investigation. | Like seeing a broken window at home—means something went wrong. |
| 31 | What is Penetration Testing Lifecycle? | Planning, reconnaissance, scanning, exploitation, maintaining access, reporting. | Like planning a pretend break-in, testing ways in, then writing about how you did it. |
| 32 | What is Network Sniffing? | Capturing, inspecting, and analyzing packets on a network. | Like eavesdropping on other people’s conversations. |
| 33 | What is a Proxy Server? | An intermediary server separating users from the sites they access, for privacy/security. | Like sending messages through a middleman who keeps your identity secret. |
| 34 | Difference between SSL and TLS? | SSL is older; TLS is an updated, more secure protocol for encrypting data. | Like using a new, stronger lock instead of an old, weak one. |
| 35 | What is Risk Assessment? | Identifying and evaluating potential threats and impacts to assets and choosing how to manage them. | Like thinking about what could go wrong if you leave home unlocked and planning for it. |
| 36 | SQL Injection Countermeasures? | Use parameterized queries, input validation, least privilege, and error handling. | Like only letting certain safe words/phrases into your party—it stops troublemakers at the door. |
| 37 | What is a Digital Signature? | Encrypted, unique value verifying sender’s identity and data integrity using private keys. | Like a special signature that proves only you could have sent the message. |
| 38 | Difference between Black Box & White Box Testing? | Black box: no knowledge of internals; white box: has access to internal code/logic. | Black box: guessing what’s inside a present; white box: opening to look inside. |
| 39 | What is Multi-factor Authentication (MFA)? | Using more than two verification methods (password, fingerprint, token, etc.) for access. | Like needing a key, a code, and a fingerprint to get in. |
| 40 | What is a Security Policy? | A document outlining rules and procedures to maintain security in an organization. | Like a rulebook everyone follows to stay safe. |
| 41 | What is a Security Operations Center (SOC)? | Central unit for monitoring, detecting, analyzing, and responding to cyber incidents. | Like a 24/7 emergency room for digital problems. |
| 42 | What is a Hash Collision? | When two different data inputs result in the same hash value, risking integrity and uniqueness. | Like two people with the same ID number—leads to confusion. |
| 43 | What is Session Hijacking? | Attack where a hacker takes control of a user’s active web session (often via stealing cookies). | Like stealing someone’s backstage pass and pretending to be them. |
| 44 | What is SSL Pinning? | Restricting an app/server to trust only specific SSL certificates/public keys, blocking fakes. | Like only accepting deliveries from people with a certain badge. |
| 45 | What is a Rogue Access Point? | Unauthorized wireless device not managed by network admins, potentially used by attackers. | Like someone setting up a fake Wi-Fi hotspot in your school to trick people. |
| 46 | What is Data Masking? | Replacing sensitive data with fictional, but realistic values for testing/sharing. | Like covering private info in a letter before showing it to someone. |
| 47 | What is BYOD? | Bring Your Own Device—policy allowing people to use their own devices for work. | Like bringing your own phone/laptop to school for class work. |
| 48 | What is Two-person Control? | Security requiring two authorized users to perform a sensitive action together. | Like needing two people to turn a key at the same time to open something valuable. |
| 49 | What is Security through Obscurity? | Relying on design secrecy rather than robust security mechanisms for protection (not best practice). | Like hiding your house key under a flowerpot and hoping nobody finds it—not truly safe. |
| 50 | What is Red Team and Blue Team exercise? | Red Team attacks; Blue Team defends—structured exercises to test and improve company security. | Like classmates trying to break in (Red) while others defend and watch for mistakes (Blue). |
***