Title: Cyber Security Interview Questions - Javatpoint
1CYBER SECURITY
MCQ
www.javatpoint.com
2What is Cyber Security?
Cybersecurity protects systems, networks, and
programs from digital attacks, damage, or theft.
These cyberattacks usually target accessing,
changing, or destroying sensitive information
extorting money from users through ransomware or
interrupting normal business processes.
3Some Common Types Of Cyberattacks
4Why Cyber Crime increasing day by day?
- Cybercrime is easily achievable for those with
advanced hacking skills.
- There is a lower risk of getting caught in
Cybercrime.
- Cyber attackers can get huge amounts of money for
their little work.
- Cyber attackers can target thousands of victims.
- Cryptocurrencies have made money laundering
easier.
5 IDS vs IPS
- Intrusion Detection Systems
- Detect only intrusions, but unable to prevent
intrusions - Monitoring system
- Requires a human or another system to look at the
results
- Intrusion Prevention Systems
- Detect as well as prevent intrusions
- Control system
- Requires only a regularly updated database with
the latest threat data
6The key elements of Cyber Security
- Information security
- Network security
- Operational security
- Application security
- End-user security
- Business continuity planning
7WHAT IS THE MAIN GOAL OF CYBER SECURITY?
01
02
CONFIDENTIALITY
AVAILABILITY
INTEGRITY
It ensures that the information is constantly
available and accessible
It is used to provide privacy and prevent
unauthorized access to data.
This ensures the data is genuine, correct, and
safe from unwanted threat actors or unintentional
user alteration.
8The main advantages of cyber security
- Cyber security protects online businesses and
transactions against ransomware, malware, online
fraud, and phishing. - It protects the end-users.
- It provides great protection for both data as
well as networks. - It can increase the recovery time after a breach.
- It prevents unauthorized users from accessing
sensitive information.
9WHAT IS CRYPTOGRAPHY?
It is used to protect information from third
parties called adversaries. It is a method of
protecting information and communications through
codes so that only those for whom the information
is intended can read and process the data.
10WHAT DO YOU UNDERSTAND BY THE CIA TRIAD?
CIA is an acronym that stands for
Confidentiality, Integrity, and Availability. It
is commonly known as the CIA triad. CIA is a
model that specifies the guide policies for
Information Security. It is one of the most
popular models used by organizations.
11WHAT IS A FIREWALL? WHAT IS THE USAGE OF IT?
The main usage of Firewalls is to protect the
system/network from viruses, worms, malware,
threats etc. Firewalls can also be used to
prevent remote access and content filtering.
12WHAT DO YOU UNDERSTAND BY VA AND PT?
PT
VA
VA or Vulnerability Assessment is the process of
finding vulnerabilities or flaws in the target.
In this process, the organization already knows
that its system/network has flaws or weaknesses
and wants to find these flaws and prioritize
fixing them.
PT or Penetration Testing is the process of deep
searching and finding vulnerabilities on the
target. In this process, the organizations set up
all the possible security measures they could
think of and test if there is any other way their
system/network can be hacked.
13WHAT IS A VPN AND ITS USE IN CYBER SECURITY?
VPN - It is an acronym that stands for Virtual
Private Network. It creates a safe encrypted
tunnel across the internet by connecting a VPN
server to a VPN client.
Use - Suppose a user has a VPN client installed
on their machine. The VPN client then creates an
encrypted tunnel to the VPN server, and the user
can securely send or receive information over the
internet.
14THANK'S FOR WATCHING
www.javatpoint.com