100 Multiple-Choice Questions
100 Multiple-Choice Questions
CHOICE
QUESTIONS TO
PREPARE YOU
FOR A
CYBERSECURITY
ANALYST
INTERVIEW
BY IZZMIER IZZUDDIN
General Knowledge
Social Skills
6. How would you handle a situation where a colleague disagrees with your security
recommendation?
a) Ignore their opinion and proceed with your plan
b) Escalate the issue to management immediately
c) Listen to their concerns and collaborate on a solution
d) Argue until they agree with you
8. How would you respond to a user who repeatedly falls for phishing scams?
a) Report them to HR
b) Provide additional training and resources
c) Restrict their access to the internet
d) Ignore the issue
9. What is the most important trait for a cybersecurity analyst when working in a team?
a) Technical expertise
b) Communication skills
c) Independence
d) Strict adherence to rules
10. How would you handle a situation where you discover a vulnerability but are asked
to delay fixing it?
a) Fix it immediately without approval
b) Document the risk and escalate to management
c) Ignore the vulnerability
d) Resign from your position
Scenario-Based Questions
16. You receive an email from your CEO asking for an urgent wire transfer. What should
you do?
a) Process the transfer immediately
b) Verify the request through a separate communication channel
c) Ignore the email
d) Reply to the email asking for more details
17. A user reports that their computer is running slowly. Upon investigation, you find
unauthorised software installed. What is the next step?
a) Reinstall the operating system
b) Scan for malware and investigate further
c) Ignore the issue
d) Restart the computer
18. During a penetration test, you discover a critical vulnerability. What should you do
first?
a) Exploit the vulnerability to demonstrate the risk
b) Report the vulnerability to the relevant team immediately
c) Ignore the vulnerability
d) Document the vulnerability but take no action
19. A colleague accidentally shares sensitive data on a public forum. What is the first
step?
a) Report the incident to HR
b) Remove the data and assess the impact
c) Ignore the incident
d) Blame the colleague publicly
20. You notice unusual login attempts from an unknown IP address. What should you
do?
a) Block the IP address immediately
b) Investigate further and monitor the activity
c) Ignore the activity
d) Change all user passwords
Technical Questions
General Knowledge
Social Skills
37. A team member is consistently missing deadlines. How would you address this?
a) Report them to management immediately
b) Offer support and ask if they need help
c) Ignore the issue
d) Publicly criticise their performance
38. How would you handle a situation where a manager asks you to bypass security
protocols?
a) Comply without question
b) Explain the risks and suggest alternatives
c) Ignore the request
d) Report the manager to HR
39. What is the best way to build trust with your team?
a) Take credit for their work
b) Communicate openly and support their growth
c) Avoid collaboration
d) Micromanage their tasks
40. How would you respond to a user who is frustrated with frequent password
changes?
a) Ignore their frustration
b) Explain the importance of strong passwords and offer tips
c) Reduce the password complexity requirements
d) Report them to HR
Scenario-Based Questions
46. A user reports that their account has been locked due to multiple failed login
attempts. What should you do?
a) Unlock the account immediately
b) Investigate for potential brute force attacks
c) Ignore the issue
d) Change the user’s password
47. During a routine scan, you discover an open port that should be closed. What is the
next step?
a) Close the port and investigate why it was open
b) Ignore the issue
c) Report the issue to management
d) Block all incoming traffic
48. A phishing email is reported by multiple users. What should you do first?
a) Delete the email from all inboxes
b) Investigate the email and block the sender
c) Ignore the issue
d) Report the issue to HR
49. A critical system is infected with ransomware. What is the first step?
a) Pay the ransom
b) Isolate the system to prevent spread
c) Reboot the system
d) Ignore the issue
50. A vendor requests remote access to your network for maintenance. What should
you do?
a) Grant access immediately
b) Verify the request and provide limited access
c) Ignore the request
d) Block the vendor’s IP address
Technical Questions
60. What is the purpose of a security information and event management (SIEM)
system?
a) To monitor and analyse security events in real-time
b) To encrypt sensitive data
c) To block malicious websites
d) To scan for viruses
General Knowledge
Social Skills
66. How would you handle a situation where a team member is resistant to following
security protocols?
a) Report them to HR
b) Explain the importance of the protocols and provide training
c) Ignore the issue
d) Publicly criticise their behavior
67. A stakeholder asks for a detailed technical report on a security incident. How would
you respond?
a) Provide a highly technical report without explanation
b) Offer a high-level summary with technical details as an appendix
c) Ignore the request
d) Refuse to provide the report
68. How would you handle a situation where you discover a colleague has shared
sensitive data externally?
a) Report the incident to HR immediately
b) Discuss the issue with the colleague and escalate if necessary
c) Ignore the issue
d) Publicly shame the colleague
69. What is the best way to handle a conflict with a team member over a security
decision?
a) Avoid the conflict and let them have their way
b) Listen to their perspective and find a compromise
c) Escalate the issue to management immediately
d) Argue until they agree with you
70. How would you explain the importance of patching to a non-technical audience?
a) Use technical jargon to emphasize the complexity
b) Compare patching to fixing a leaky roof to prevent further damage
c) Avoid discussing patching unless asked
d) Provide a detailed technical report
Scenario-Based Questions
76. A user reports that their computer is displaying a ransomware message. What
should you do first?
a) Pay the ransom
b) Isolate the computer from the network
c) Reboot the computer
d) Ignore the issue
77. During a security audit, you discover that a critical system has not been patched for
months. What should you do?
a) Patch the system immediately
b) Report the issue to management and recommend a patching schedule
c) Ignore the issue
d) Blame the IT team
78. A phishing email is sent to all employees. What should you do first?
a) Delete the email from all inboxes
b) Investigate the email and notify employees
c) Ignore the issue
d) Report the issue to HR
79. A vendor’s system is compromised and they have access to your network. What
should you do?
a) Terminate the vendor’s contract immediately
b) Revoke their access and investigate the breach
c) Ignore the issue
d) Block all external access
80. A critical vulnerability is discovered in a widely used software. What should you do
first?
a) Patch all systems immediately
b) Assess the risk and prioritise patching
c) Ignore the vulnerability
d) Block all internet access
Technical Questions
87. What is the difference between a false positive and a false negative in
cybersecurity?
a) A false positive is a legitimate action flagged as malicious, a false negative is a
malicious action not detected
b) Both are the same
c) A false positive is a malicious action not detected, a false negative is a legitimate
action flagged as malicious
d) Both refer to undetected vulnerabilities
General Knowledge
91. What is the primary purpose of a demilitarised zone (DMZ) in network security?
a) To isolate public-facing servers from the internal network
b) To encrypt sensitive data
c) To block malicious websites
d) To monitor employee activity
Scenario-Based Questions
96. A user reports that their account has been compromised. What should you do first?
a) Reset the user’s password and investigate the incident
b) Ignore the issue
c) Report the issue to HR
d) Block the user’s account permanently
97. During a routine scan, you discover that a server is running an outdated operating
system. What should you do?
a) Upgrade the operating system immediately
b) Document the risk and plan an upgrade
c) Ignore the issue
d) Block the server from the network
98. A phishing email is sent to a small group of employees. What should you do first?
a) Delete the email from all inboxes
b) Investigate the email and notify the affected employees
c) Ignore the issue
d) Report the issue to HR
100. A user accidentally downloads a malicious file. What should you do first?
a) Isolate the user’s computer and scan for malware
b) Ignore the issue
c) Report the issue to HR
d) Reboot the user’s computer
Technical Questions
103. What is the purpose of a security information and event management (SIEM)
system?
a) To monitor and analyse security events in real-time
b) To encrypt sensitive data
c) To block malicious websites
d) To scan for viruses
104. What is the difference between a vulnerability scan and a penetration test?
a) A vulnerability scan identifies weaknesses, a penetration test exploits them
b) Both are the same
c) A vulnerability scan exploits weaknesses, a penetration test identifies them
d) Both refer to malware detection