Common Technical Interview Questions and Answers Update on December 31, 2020

Question 31: What does a backdoor do?
A. helps circumvent a computer’s security mechanisms.
B. decouples the front end of a website from the back end to improve privacy.
Correct Answer: A. helps circumvent a computer’s security mechanisms.

Question 32: Persistent droppers are often used to carry out APT attacks. What does APT stand for?
A. advanced persistent threat
B. automated programming thread
Correct Answer: A. advanced persistent threat

Question 33: Security _________ refers to an organization’s overall cybersecurity strength and how well it can predict, prevent and respond to ever-changing cyberthreats.
Correct Answer: Posture

Question 34: Social ________ is an attack vector that involves manipulating people into breaking normal security procedures and best practices.
Correct Answer: Engineering

Question 35: A threat ________ is an entity that is partially or wholly responsible for an incident that impacts an organization’s security.
Correct Answer: Actor

Question 36: A ___________ attack attempts to break into a password-protected computer or server by systematically entering every word in a particular language in alphabetical order.
Correct Answer: Dictionary

Question 37: A ___________ attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources.
Correct Answer: Denial of service

Question 38: What is a bill of materials?
A. It’s a comprehensive inventory.
B. It’s a claim for payment.
Correct Answer: A. It’s a comprehensive inventory.

Question 39: What do you call a formal proposal for an adjustment or alteration?
A. change request
B. request for proposal
Correct Answer: A. change request

Question 40: ERP is modular software designed to integrate the main functions of an organization’s business processes into a unified system. What does ERP stand for?
Correct Answer: Enterprise resource planning