Essential Concepts and Answers for
Freshers"
,Interview Q&A
Introduction
1. What is cybersecurity?
Cybersecurity refers to the practice of protecting systems, networks, and data from digital
attacks. It encompasses technologies, processes, and practices designed to safeguard
information and prevent unauthorized access, exploitation, or damage.
2. What are the three main goals of cybersecurity?
The three main goals of cybersecurity are:
● Confidentiality: Ensuring that data is accessible only to authorized individuals.
● Integrity: Maintaining the accuracy and trustworthiness of data and systems.
● Availability: Ensuring that systems and data are accessible and usable when needed.
3. What is a threat in cybersecurity?
A threat is any potential danger that could exploit a vulnerability to breach security and
negatively impact an organization's assets (data, systems, networks, etc.).
4. Explain the CIA Triad in cybersecurity.
The CIA Triad stands for Confidentiality, Integrity, and Availability. It is a foundational model for
guiding cybersecurity policies and practices:
● Confidentiality: Ensures that information is only accessible to authorized individuals.
● Integrity: Ensures that information is accurate, complete, and trustworthy.
● Availability: Ensures that information and systems are accessible and usable when
needed.
5. What is a vulnerability?
A vulnerability is a weakness or flaw in a system, network, or application that could be exploited
by a threat actor to compromise its security.
6. Explain the concept of a risk in cybersecurity.
Risk in cybersecurity refers to the potential for loss, harm, or damage caused by a threat
exploiting vulnerabilities. It is measured in terms of the likelihood of a threat occurring and the
impact it would have if it did.
1
,Interview Q&A
7. What is the difference between a threat and a vulnerability?
● Threat: Any potential danger or harmful event that exploits a vulnerability.
● Vulnerability: A weakness or flaw in a system, network, or application that could be
exploited by a threat.
8. What is malware?
Malware (malicious software) is any software intentionally designed to cause damage to a
computer, server, client, or computer network. It includes viruses, worms, Trojans, ransomware,
spyware, and adware.
9. Explain the difference between a virus and a worm.
● Virus: A computer virus is a type of malware that attaches itself to a legitimate program
and spreads when that program is executed.
● Worm: A worm is a standalone malware program that replicates itself to spread to other
computers through networks.
10. What is a firewall?
A firewall is a network security device that monitors and controls incoming and outgoing network
traffic based on predetermined security rules. It acts as a barrier between a trusted internal
network and untrusted external networks (like the internet).
11. What is encryption?
Encryption is the process of converting plaintext (normal data) into ciphertext (encrypted data)
using an algorithm and a cryptographic key. It ensures data confidentiality by making it
unreadable to unauthorized individuals.
12. What is a brute-force attack?
A brute-force attack is a trial-and-error method used by threat actors to crack passwords or
encryption keys by systematically trying all possible combinations until the correct one is found.
13. What is phishing?
Phishing is a cyber attack where attackers attempt to trick individuals into revealing sensitive
information, such as login credentials or financial information, by posing as a legitimate entity
via email, messaging, or other communication channels.
2
, Interview Q&A
14. Explain the concept of social engineering.
Social engineering is the manipulation of individuals to divulge confidential information or
perform actions that compromise security. It exploits human psychology rather than technical
vulnerabilities.
15. What is a DDoS attack?
A Distributed Denial of Service (DDoS) attack is an attempt to make an online service
unavailable by overwhelming it with traffic from multiple sources. This renders the service
inaccessible to legitimate users.
16. What is a VPN (Virtual Private Network)?
A Virtual Private Network (VPN) extends a private network across a public network (like the
internet) and enables users to send and receive data securely and privately. It encrypts the
connection to ensure data confidentiality.
17. What is two-factor authentication (2FA)?
Two-factor authentication (2FA) adds an extra layer of security to the authentication process by
requiring users to provide two forms of identification: typically something they know (password)
and something they have (a token or mobile device).
18. What is a data breach?
A data breach is an incident where sensitive, protected, or confidential data is accessed, stolen,
or exposed without authorization. It can occur due to cyber attacks, human error, or system
glitches.
19. What is endpoint security?
Endpoint security refers to the protection of endpoints (such as laptops, desktops, smartphones,
and tablets) from malicious activity and unauthorized access. It involves securing devices at the
network perimeter where they connect to the enterprise network.
20. What is network segmentation?
Network segmentation is the process of dividing a computer network into smaller sub-networks
or segments to improve performance, security, and manageability. It limits the scope of potential
security breaches.
3