1. What is the primary purpose of a firewall in network security?
A firewall acts as a barrier between trusted and untrusted networks. It filters traffic by applying security rules. Understanding this basic tool is vital for system security roles.
Get the Preplance app for a seamless learning experience. Practice offline, get daily streaks, and stay ahead with real-time interview updates.
Get it on
Google Play
4.9/5 Rating on Store
System Security · Question Set
System Security Basics interview questions for placements and exams.
Questions
9
Included in this set
Subject
System Security
Explore more sets
Difficulty
Mixed
Level of this set
Go through each question and its explanation. Use this set as a focused practice pack for System Security.
A firewall acts as a barrier between trusted and untrusted networks. It filters traffic by applying security rules. Understanding this basic tool is vital for system security roles.
For complete preparation, combine this set with full subject-wise practice for System Security. You can also explore other subjects and sets from the links below.
A WAF inspects HTTP/HTTPS traffic to and from a web application and blocks attacks like SQL injection or cross-site scripting. It’s specifically designed for web system security.
The CIA triad is the foundational model in system security. Confidentiality means data is accessible only to authorised users. Integrity means data remains accurate and unaltered. Availability means authorised users can access data and systems when needed. Knowing this shows you understand basic security goals.
SQL injection is a major web-system vulnerability, where unsanitised user inputs allow attackers to execute arbitrary SQL commands on the database. Recognising this shows you understand application layer threats.
Zero Trust rejects the assumption that internal users or networks are safe. It emphasises continuous verification and is highly relevant in system-security architecture.
A vulnerability scanner is a tool that automatically inspects computers, networks or applications for known security weaknesses — missing patches, mis-configurations, open ports. Using such scanners helps organisations identify risk before attackers exploit it. For example, scanning externally facing servers for open services and then remediating issues. Understanding how to run, interpret and prioritise scanner findings is a valuable system-security skill.
The principle of least privilege means granting users or systems only the access rights they need to perform their tasks — no more, no less. This limits opportunities for misuse or damage if credentials are compromised. In system security interviews you might be asked how you applied this principle to role design and access control. Showing you understand this principle demonstrates maturity and alignment with secure practices.
Failure to apply security patches is a common cause of compromise. Regular patch management is a basic but essential system-security control.
Segmentation isolates different parts of a network so that if one part is compromised, the attacker cannot easily move to others. This is a key control in system security.