If you’re applying for a cybersecurity job, one cybersecurity basics you should focus on are the interview questions. Here, we’ll discuss scenario-based cybersecurity interview questions you may encounter.
Scenario 1
A buddy of yours sends you an electronic greeting card. To obtain the card, you must first click on the attachment.
So, what exactly do you do? Justify your response.
There are four risks:
- Because some attachments include viruses or other dangerous programs, opening unknown or unsolicited attachments is perilous in general.
- Also, in certain situations, simply clicking on a malicious link might infect a computer, so don’t click on it until you’re confident it’s secure.
- Because email addresses can be faked, you can’t be sure it’s from someone you know without checking with them.
- Finally, while some websites and links appear to be legitimate, they are actually scams aimed to steal your personal information.
Scenario 2
XYZ has a staff member who subscribes to a number of free periodicals. Now, one of the publications requested for her month of birth, another for her year of birth, and the third for her maiden name in order to activate her subscriptions.
What conclusions do you draw from this situation? Justify.
All three newsletters are likely produced by the same company or distributed by the same provider. Individual bits of seemingly innocent information might be combined by the parent firm or service and used or sold for identity theft.
Moreover, it’s even plausible that a fourth mailing exists, with one of the activation questions being the date of birth.
Personal information inquiries are frequently optional. So, in addition to being wary of circumstances like the one mentioned above, you should never give out personal information unless it is absolutely required, or to persons or companies, you do not know.
Scenario 3
Print billing is frequently link to the user’s login in our computing laboratories. People occasionally phone to complain about bills they never received for printing, only to discover that the bills are correct.
What conclusions do you draw from this situation? Justify.
They may not discover it till later that they had rented their account to a friend who couldn’t remember his or her password and had done the printing. As a result, the charges. It’s also conceivable that they were followed in and their account was used.
This is a problem with public or shared computers in general. Someone else can come in behind you and retrieve what you were doing, use your accounts, and so on if you don’t properly log out of the computer when you leave. Before you go, log out of all accounts, close programs, and close browser windows.
Scenario 4
There was a situation that occurred in my computer lab. My friend used their yahoo account in a college computer lab. Before leaving the lab, she double-checked that her account had not been left open. Someone tracked her down and re-entered her account using the same browser. It was then that they began sending emails from it.
What do you think the situation is?
Because the first individual most likely did not log out of her account, the new person may simply go to history and access it.
Another option is that she logged out but did not delete her web cache. (To clear sites that the browser has saved for future use, go to the browser menu.)