Jump to Navigation

IT Security Interview Answers


  1. What is the difference between IT Security and Information Security?

    IT Security focuses on technical controls such as applying antivirus and firewall systems. Whereas Information Security concentrates on securing information.

  2. What is the different between proxy and firewall?

    The firewall blocks ports and programs and prevents unauthorised people from gaining access to your network and the proxy server hides your network from the internet.

  3. How does NAT work?

    NAT allows a router to act as an agent between the internet and a local network. This means only a unique IP address is needed to represent a complete group of computers.

  4. Can you explain a Man In The Middle attack?

    This is an attack where a user gets in the middle of the sender and receiver of information and can steal any information being sent.

  5. What are Honeypots?

    A Honeypot is a system on the internet that is set up to draw in and trap people who try to enter other people’s computer systems.

  6. What is a buffer overflow?

    This is when a programme overruns the buffers boundary why writing data to the buffer, and overwrites adjacent memory.

  7. Can you explain what a false positive is?

    A false positive is one of the largest problems facing someone implementing an intrusion detection system. It is any expected behaviour that is identified as irregular or malicious.

Find IT Security jobs here.