Interview Topics

Study these to get placed in your DREAM COMPANY !

  • Dos Vs DDos

  • Linux Permissions

  • Private Key and Public Key Communications

  • Hashing Vs Encryption

  • What is False Positive - True Negative - False Negative and True Postive

  • 401 Vs 403

  • Hotfixes for XSS and all other OWASP 10 bugs

  • In-Depth understanding of SQLi Queries and its types

  • Session tokens - Cookies - Same-Site Cookies - Secure flag - HTTP-Only flag

  • CIA Traid

  • Pivoting and Lateral Movement

  • What is access control ? What is Broken Access control

  • What kind of bugs can be found in security misconfiguration ?

  • CORS and Same-Origin Policy

  • Parameter Pollution

  • Prototype Pollution

  • Insecure Deserialization

  • What kind of issues can be found in OAuth

  • Secure algorithm for JWT's

  • Name some modern industry standard hashing algorithm used nowadays?

  • SAST vs DAST

  • All the Burpsuite's tabs, especially the Intruder attack types

Sniper - Battering RAM - Cluster Bomb - Pitch fork

  • Explain Log4j attack - Spring4shell attack

  • Refer this Interview Prep

  • All the Wireshark filters and Flags

SYN - ACK - FIN - URG - PSH

Active Directory Questions

In a Windows domain, credentials are stored in a centralised repository called ?

  • Active Directory

The server in charge of running the Active Directory services is called ?

  • Domain Controller

Which group normally administrates all computers and resources in a domain ?

  • Domain Admins

What would be the name of the machine account associated with a machine named TOM-PC ?

  • TOM-PC$

Suppose our company creates a new department for Quality Assurance. What type of containers should we use to group all Quality Assurance users so that policies can be applied consistently to them?

  • Organizational Units

The process of granting privileges to a user over some OU or other AD Object is called ?

  • Delegation

Difference between Organizational Units and Security Groups in an Active Directory Network ?

  • Organization Units are helpful while applying policies to users and computers, which include specific configurations that pertain to sets of users depending on their particular role in the enterprise [The Sales department has a different set of policies when compared to an IT department]

  • Security Groups on the other hand, are used to grant permissions over resources - We will use groups if you want to allow some users to access a shared folder or network printer

Explain what are Group Policy Objects ( GPOs ) ?

  • GPOs is a collection of settings that can be applied to OUs, they contain specific set of policies which differ within the OUs

For example, the Sales OU's policies will differ from the IT OUs

Explain Kerberos Authentication in simple words ?

Explain NetNTLM Authentication in simple words ?

Will a current version of Windows use NetNTLM as the preferred authentication protocol by default?

  • Nope

When referring to Kerberos, what type of ticket allows us to request further tickets known as TGS?

  • Ticket Granting Ticket (TGT)

When using NetNTLM, is a user's password transmitted over the network at any point?

  • Nope

Last updated