So basically interview questions can never be same.
It depends upon the interviewer, what questions he can asked.
Also, on which level of cybersecurity position you are on.
But after giving so many interviews and talking to my friends i find one thing very common.
Your Networking should be strong! and crystal clear.
So, I am gonna brief some questions which they asked me in Concentrix for junior-senior level position.
My First round in concentrix interview process starts with these questions:
Ques1: What is DC Transversal Attack?
Answer: A path traversal vulnerability permits attackers to access files on a web or DC server that they should not have access to.
Quest2: Do you know any latest vulnerabilities ?
Answer: For this you can take the help of cert.
Ques3: What is Non-repudiation in Information Security?
Answer: Non-repudiation offers evidence regarding the origin, authenticity, and integrity of data, ensuring that both sender and recipient cannot deny their involvement in a message’s transmission, receipt, and processing.
It assures the sender that the message was delivered and provides the recipient with proof of the sender’s identity.
This way, both parties are unable to refute the occurrence of the message exchange and its handling.
Ques4: Can you define different protocols on each layer of OSI Model?
Answer: Below are the listed protocols on each layer of OSI layer model:
7) Application Layer- HTTP, FTP
6) Presentation Layer- FTP, IMAP
5) Session Layer- NetBIOS
4) Transport Layer: TCP, UDP
3) Network Layer- IP
2) Data-link Layer- ARP (Adress resolution Protocol)
1) Physical Layer- Packet Sniffing
Its ok if you say NetBIOS and packet sniffing on Session layer and physical layer respectively.
Ques5: What is Access Control list and its types?
Answer: Access control list is a type of list which provide users on what type of services or resources they are allowed or authorized to use.
Types:
Standard ACL- Standard ACLs are access control lists that specify the types of network traffic permitted to traverse a network, determining what can pass through and what is restricted.
Extended ACL- Within an Extended access list, packet filtering occurs by examining source and destination IP addresses as well as port numbers.
Although there are other ACLs such as- Role-based Access Control, Discretionary Access Control, Mandatory Access Control, Attribute-Based Access Control, Rule-Based Access Control.
Ques6: How do you keep yourself update related to new Cyber threats, attacks and other news?
Ans: I have subscribed to OTX Alien Vault(Threat Intelligence) it provides me details attack news, IOC’s, and attack patter, MITRE ATT&CK framework, twitter, plus I read blogs, and also I am part of hacking community (HIHCommunity.org)
Ques7: Define Private Range with its Class-
Ans- Class A (10.0.0.0 – 10.255.255.255)
Class B (172.16.0.0 – 172.31.255.255)
Class C (192.168.0.0 – 192.168.255.255)
Now, after clearing the first round the second round starts with certain questions with the senior level guy.
TBH, second round interview process is the main round which actually checks your knowledge and skills.
Second Round Interview Process:
In second round there are scenario based cybersecurity questions.
Ques1: If a production server is infected with virus what would you do?
Answer: I will report to the concerned authorities, and create a bridge call with client.
Whether to isolate or stop this server or what to do, if we off this server how much impact will it be on the organization.
Gonna ask client do they have backups, and then will take the steps accordingly.
Ques2: What is Ransomware and how to mitigate it?
Answer: Ransomware is a type of malware which encrypts the file system and asks for a ransom payment in order to decrypt it.
It is very dangerous virus because proper mitigation of this virus is still not found yet.
But for mitigation we can use last backup, scanning of host and network, check for any C2.
Ques3: How to use DLP policies on PAN Card?
Answer: We can use regex to apply policies by mentioning the unique parameter value of PAN Card.
Like [A-Z, a-z,0-9] etc.
Ques4: Difference Between XDR and EDR?
Answer: XDR and EDR both functions the same, but XDR works on whole Network level including Hosts but EDR works on endpoints only.
Conclusion
So these were questions asked by interviewer during the cybersecurity process.
I hope this will help you in your career.
happy hacking 🙂