See the upcoming Training Dates for CISSP Training:

Cybersecurity is the one word that is failing to go unnoticed. It is indeed creating noise in the news or media or the office next door every other day or the moment. And it is expected for, in this digital era.



At this crossroad, it is becoming an unwritten command that one has to be aware of certain basic things/issues of cyber security though might not be directly engaged with.



Accordingly, top 15 must-know Cyber Security Questions and Answers in 2019 have been discussed here that would help you clear the interview at the first attempt and fetch you a rewarding job.



The discipline cybersecurity is evolving at a faster pace and connected people are getting more concerned. Every day, we witness a major headline regarding cybersecurity. Evidently, the field is becoming difficult to understand or navigate. All things considered, before moving to a complete sustainable solution, the need of the hour is an increased awareness.



The pathetic situation is that cybersecurity is more of personal and business concern, rather than just a technology concern.



Accordingly, the most commonly asked inquiries and answers related to cybersecurity have been briefed here.

1. What should I do to encrypt my email transmissions?



Pretty Good Privacy [PGP] is a software that could be used to encrypt email transmissions. It is used to sign, encrypt, decrypt the emails, files, texts, directories, data, and the whole disk partition. Most of the companies today choose PGP to encrypt their communication.



The PGP uses a secret private key and a public key that is shared by the sender and the receiver. The receiver is able to verify the identity of the sender and the content integrity. The receiver would know if the mail has tampered en route.



Schematic representation of the PGP principle:

Source: Wikipedia



2. How can I securely access my computer desktop from a remote device?



You may connect with your desktop through any device connected to the Internet. A few of the popular software and web service option that facilitate the connection includes TeamViewer, LogMeIn, GoToMyPC, and, etc.



This software facilitates easy transfer of file[s], make a video chat and mobile apps. It is useful to access your PC while on move.



3. What is the protocol that broadcast the messages across all the devices?



Internet Group Management Protocol [IGMP] is the communication protocol which is used in video or game streaming. This communication protocol facilitates the communication devices and the adjacent routers to send packets across the network.



4. What is used to hide the message in cryptography?



The cipher, an algorithm is used to perform the encryption or the decryption. It is used to protect e-mail messages, corporate data, and credit card information.



Only, the sender and the receiver are able to read the message.



5. What is social engineering attack?



With reference to Information security, it is an act of psychological manipulation of the human to divulge for confidential data.



Social engineering mainly relies on the 6 principles of influence that includes Authority, Commitment and consistency, Liking, Reciprocity, Scarcity and Social Proof.



Authority: People tend to obey their authority figures even if they may not be willing for objectionable acts.

People tend to obey their authority figures even if they may not be willing for objectionable acts. Commitment and Consistency: People are likely to honor their commitment even if the original motivation has been removed as a matter of self-image.

People are likely to honor their commitment even if the original motivation has been removed as a matter of self-image. Liking: People get persuaded to get into act easily if they like the person and is asked by the person to do so.

People get persuaded to get into act easily if they like the person and is asked by the person to do so. Reciprocity: People are generally reciprocal. They tend to return the favor they had received prior and indulge as directed.

People are generally reciprocal. They tend to return the favor they had received prior and indulge as directed. Scarcity: The scarcity generates demand even though it may be real or perceived. It kindles the person to perform as directed.

The scarcity generates demand even though it may be real or perceived. It kindles the person to perform as directed. Social Proof: It is generally agreed that people tend to perform things if others are also doing. It is matching of the attitudes, behavior as per the group norms.



6. What are the risks if I use public Wi-Fi?



It is the general tendency of the public to prefer Wi-Fi in spite of having independent data plans as it is faster and free.



However, Wi-Fi comes with certain security issues. A few of the public Wi-Fi attack includes brute-force attacks, war-driving, sniffing, karma attack, and, etc. it would definitely obstruct the data that is conveyed through the router like the passwords, emails, addresses, credit card data, browsing history, and, etc.



This could be minimized by using routers that are encrypted with WPA2 alone.



And, when connected to public Wi-Fi it is suggested to take the following steps.



Turn-off the public networking sharing of the data.

Enable the firewall at all times

Use only the secure websites for sensitive operations.

Encrypt the IP address by using the Virtual Private Network [VPN].

Do not forget to turn-off the Wi-Fi once work is done.

Keep your system always updated to latest version and patch-up.

Keep your system free of malware by using the latest and reliable antivirus.

Browse the sites only with a good anti-spyware solution[s].

Avoid any kind of financial transactions on public Wi-Fi unprotected.

Ensure you have the latest browser with the security patches.

Use the two-factor authentication factor as an extra security measure.



7. I am using an unsecured Wi-Fi from my neighbor. Is it possible for them to get access to my login ID and password?



Yes, it is possible to access your IP address, passwords, GPS tracking, and so forth. It could be a trap like the Honeypot, set up to detect the data or neutralize the attempts of using the neighbor’s network unrightfully. In case the neighbor is tech-savvy, there is every chance that the connection could be used to hack the device, gain access to the system, or attribute the unwanted browsing history to you.



8. Why Mac OS is reliable?



Till date, there are no cybersecurity solutions that would claim 100% safe. Still as compared to Windows, the prevalence of cyber attack may be lesser in Mac OS. The Macs run on Apple computers and thus are less prone to hardware/software crashing.



9. What is a Firewall?



A firewall is a device placed on the boundary of the trusted and untrusted networks. One can set or define the rules that allow or blocks the traffic accordingly.



10. How to prevent identity thefts?



Identity theft refers to the acquisition of personal data of the victim and uses it for illegal purposes.It is the most common type of fraud that may lead to financial losses and at times may be held responsible for criminal actions as the victim might be personified.



A few of steps to follow in order to prevent identity thefts include:



Ensure the strong and unique password

Avoid postings of confidential information online

Do not post personal information on social media

Shop from known and trusted websites

Use the latest version of the browsers

Install advanced malware and spyware tools

Use specialized security solutions against financial data

Always update your system and the software

Protect the social security number

Download only the well-known apps and share limited details



11. Is social media secure?



The online social sites like the Facebook, Twitter, LinkedIn, Instagram, and so forth are becoming more agreeable for networking, business communications, and professional benefits creating a major and direct impact of our life activities.



Though the extent of networking is favorable and appreciated, it is creating space for intruders too. As we find headlines about data breach through social media, the use of social networking is getting reconsidered.



Recommended for You Back to Basics: Top 5 Social Media Safety Tips

However, there are measures to stay safe on social media. The possible risks are hacking, identity theft, bullying, standing, damage reputation, impersonators, and, etc.



A few of the measures to follow includes:



Avoidance of sharing personal things

Limiting the details about work in LinkedIn

Screening of images or any personal news before posting

Educating oneself about the rules followed in social postings

Connect with only trusted people

Have stronger and unique passwords for different social channels

It is recommended to be generic on social media

And more



12. What is data leakage?



The movement of data out of the organization in an unauthorized way is data leakage. The information could be from a computer or the data center itself.



The leakage is generally accomplished by physical removal of disks, reports, tapes, paper works, data hiding, and, etc.



A few of the measures to prevent data leakage are briefed below.



Schedule fire drill at regular intervals in order to restore the data

Placing the computers in a safe and conditioned environment to avoid any damage

Backup the data regularly to avoid the loss for any reasons

Possession of a battery or generator back up

Protect the assets from static electricity that may erase data or damage the physical components

Restricted use of Internet uploads and websites

Have an internal encryption solution

Restriction of mail to internal networks alone

Restriction of having hardcopy or printouts of the confidential data



13. What are a risk, vulnerability, and threat?



Vulnerability means weakness. It refers to the gap between the protection efforts of a system and the attacker who can exploit the weak points.



A risk is nothing but a measure that determines the potential loss that would occur if the vulnerability gets exploited.



Threat refers to something that has all the potential to deliver serious damage to the computer systems, networks, and, etc. some of the threats include spyware, keylogger, backdoor, and, etc.



14. How can I keep myself updated with news on Information Security?



It is recommended to surf the Internet and follow a few numbers of security forums. Have regular reading from sites like the hacker news, Pentest mag, and, etc. It will keep you updated with the latest trends and incidents happening in the market.



15. What are the ways to gain personal achievement?



Certain basic courses related to cybersecurity are best recommended for any professional irrespective of the job role. A person need not be a cybersecurity specialist to hold the certification. Certain certifications are generic and deal with common and best practices one has to follow so as to keep safe from the cyber threats.



To be simple and relevant, earning a security certification could be one of personal achievement. It validates your knowledge, skills and helps to be aware of your own surroundings and measures to protect from it.

Recommended for You Cybersecurity for Beginners: Definitive Guide

Though there are several other in-depth questions related to cybersecurity, these are some of the basic cybersecurity interview questions one has to know irrespective of work profile.



You may get in touch with us for any other specified queries regarding cybersecurity and its related training.