|
| 1 | +# Networking & Security Interview Questions |
| 2 | + |
| 3 | +## **Beginner-Level (1-20) Questions** |
| 4 | + |
| 5 | +### **1. What is a network?** |
| 6 | + |
| 7 | +A network is a group of interconnected devices that communicate to share resources and information. It can be wired or wireless. |
| 8 | + |
| 9 | +### **2. What is an IP address?** |
| 10 | + |
| 11 | +An IP (Internet Protocol) address is a unique numerical identifier assigned to each device on a network to facilitate communication. |
| 12 | + |
| 13 | +### **3. What is the difference between IPv4 and IPv6?** |
| 14 | + |
| 15 | +- **IPv4**: 32-bit addressing, supports 4.3 billion addresses. |
| 16 | +- **IPv6**: 128-bit addressing, supports an enormous number of addresses, improving scalability and security. |
| 17 | + |
| 18 | +### **4. What are private and public IP addresses?** |
| 19 | + |
| 20 | +- **Private IPs**: Used within local networks (e.g., 192.168.x.x). |
| 21 | +- **Public IPs**: Used on the internet and assigned by ISPs. |
| 22 | + |
| 23 | +### **5. What is a subnet mask?** |
| 24 | + |
| 25 | +A subnet mask divides an IP address into network and host portions, determining which part identifies the network and which part identifies the device. |
| 26 | + |
| 27 | +### **6. What is DHCP, and how does it work?** |
| 28 | + |
| 29 | +The **Dynamic Host Configuration Protocol (DHCP)** automatically assigns IP addresses to devices in a network, reducing manual configuration. |
| 30 | + |
| 31 | +### **7. What is DNS, and why is it important?** |
| 32 | + |
| 33 | +The **Domain Name System (DNS)** translates domain names (e.g., google.com) into IP addresses, making it easier to access websites. |
| 34 | + |
| 35 | +### **8. What is NAT (Network Address Translation)?** |
| 36 | + |
| 37 | +NAT allows multiple devices on a local network to share a single public IP address for internet access. |
| 38 | + |
| 39 | +### **9. What is a firewall?** |
| 40 | + |
| 41 | +A firewall is a security system that monitors and controls incoming and outgoing network traffic based on security rules. |
| 42 | + |
| 43 | +### **10. What are the types of firewalls?** |
| 44 | + |
| 45 | +- **Packet Filtering Firewall** |
| 46 | +- **Stateful Inspection Firewall** |
| 47 | +- **Proxy Firewall** |
| 48 | +- **Next-Generation Firewall (NGFW)** |
| 49 | + |
| 50 | +### **11. What is a VPN?** |
| 51 | + |
| 52 | +A **Virtual Private Network (VPN)** encrypts internet connections, providing secure remote access and anonymity. |
| 53 | + |
| 54 | +### **12. What is SSH, and why is it used?** |
| 55 | + |
| 56 | +SSH (**Secure Shell**) is a protocol used for secure remote access to servers using encrypted communication. |
| 57 | + |
| 58 | +### **13. What is HTTP and HTTPS?** |
| 59 | + |
| 60 | +- **HTTP (Hypertext Transfer Protocol)**: Unencrypted web communication. |
| 61 | +- **HTTPS (HTTP Secure)**: Secure, encrypted communication using SSL/TLS. |
| 62 | + |
| 63 | +### **14. What is an SSL/TLS certificate?** |
| 64 | + |
| 65 | +An SSL/TLS certificate encrypts website traffic, ensuring secure communication and trustworthiness. |
| 66 | + |
| 67 | +### **15. What is a load balancer?** |
| 68 | + |
| 69 | +A load balancer distributes incoming network traffic across multiple servers to optimize performance and availability. |
| 70 | + |
| 71 | +### **16. What are different types of load balancers?** |
| 72 | + |
| 73 | +- **Layer 4 Load Balancer** (Transport Layer) |
| 74 | +- **Layer 7 Load Balancer** (Application Layer) |
| 75 | + |
| 76 | +### **17. What is a DMZ in networking?** |
| 77 | + |
| 78 | +A **Demilitarized Zone (DMZ)** is a security buffer between an internal network and the internet, hosting public-facing services securely. |
| 79 | + |
| 80 | +### **18. What is port forwarding?** |
| 81 | + |
| 82 | +Port forwarding redirects network traffic from one port to another, often used to expose internal services externally. |
| 83 | + |
| 84 | +### **19. What is ARP (Address Resolution Protocol)?** |
| 85 | + |
| 86 | +ARP translates IP addresses into MAC addresses to enable communication within a local network. |
| 87 | + |
| 88 | +### **20. What is an IDS and IPS?** |
| 89 | + |
| 90 | +- **IDS (Intrusion Detection System)**: Monitors network traffic for threats. |
| 91 | +- **IPS (Intrusion Prevention System)**: Blocks malicious traffic automatically. |
| 92 | + |
| 93 | +--- |
| 94 | + |
| 95 | +## **Intermediate-Level (21-40) Questions** |
| 96 | + |
| 97 | +### **21. What is Zero Trust Security?** |
| 98 | + |
| 99 | +Zero Trust is a security model that assumes no entity (inside or outside the network) is trusted by default. |
| 100 | + |
| 101 | +### **22. What is the difference between symmetric and asymmetric encryption?** |
| 102 | + |
| 103 | +- **Symmetric Encryption**: Uses one key for encryption and decryption. |
| 104 | +- **Asymmetric Encryption**: Uses a public-private key pair (e.g., RSA). |
| 105 | + |
| 106 | +### **23. What is a CDN (Content Delivery Network)?** |
| 107 | + |
| 108 | +A **CDN** improves website speed and security by distributing content across multiple servers worldwide. |
| 109 | + |
| 110 | +### **24. What is the difference between TCP and UDP?** |
| 111 | + |
| 112 | +- **TCP**: Reliable, connection-oriented, ensures data delivery. |
| 113 | +- **UDP**: Faster, connectionless, best for real-time applications. |
| 114 | + |
| 115 | +### **25. How does a reverse proxy improve security?** |
| 116 | + |
| 117 | +A reverse proxy sits between users and backend servers, protecting them from direct exposure and filtering malicious traffic. |
| 118 | + |
| 119 | +### **26. What are the benefits of HTTPS over HTTP?** |
| 120 | + |
| 121 | +- Encryption |
| 122 | +- Data integrity |
| 123 | +- Authentication |
| 124 | + |
| 125 | +### **27. How does multi-factor authentication (MFA) enhance security?** |
| 126 | + |
| 127 | +MFA adds an extra security layer by requiring multiple verification methods (e.g., password + OTP). |
| 128 | + |
| 129 | +### **28. What is a bastion host?** |
| 130 | + |
| 131 | +A **bastion host** is a highly secured jump server used to access internal networks securely. |
| 132 | + |
| 133 | +### **29. What is OSI Model and its layers?** |
| 134 | + |
| 135 | +The OSI model has **7 layers**: Physical, Data Link, Network, Transport, Session, Presentation, Application. |
| 136 | + |
| 137 | +### **30. What is a WAF (Web Application Firewall)?** |
| 138 | + |
| 139 | +A **WAF** protects web applications by filtering and blocking malicious HTTP traffic. |
| 140 | + |
| 141 | +### **31. What is a honeypot in cybersecurity?** |
| 142 | + |
| 143 | +A honeypot is a security system designed to detect and study cyberattacks by mimicking real systems. |
| 144 | + |
| 145 | +### **32. What is BGP (Border Gateway Protocol)?** |
| 146 | + |
| 147 | +BGP is a routing protocol used for exchanging routing information between networks on the internet. |
| 148 | + |
| 149 | +### **33. What is DDoS, and how can it be mitigated?** |
| 150 | + |
| 151 | +A **Distributed Denial-of-Service (DDoS)** attack overwhelms a system. It can be mitigated using rate limiting, firewalls, and cloud-based protection. |
| 152 | + |
| 153 | +### **34. What is the CIA Triad in security?** |
| 154 | + |
| 155 | +The **CIA Triad** stands for **Confidentiality, Integrity, and Availability**, which are fundamental security principles. |
| 156 | + |
| 157 | +### **35. What is SSO (Single Sign-On)?** |
| 158 | + |
| 159 | +SSO allows users to log in to multiple applications using a single authentication process. |
| 160 | + |
| 161 | +### **36. What is a security token?** |
| 162 | + |
| 163 | +A **security token** is a physical or digital device used for authentication. |
| 164 | + |
| 165 | +### **37. What is an access control list (ACL)?** |
| 166 | + |
| 167 | +An ACL defines rules that allow or deny traffic based on IP, ports, or protocols. |
| 168 | + |
| 169 | +### **38. What is a container network security concern?** |
| 170 | + |
| 171 | +Containers share OS kernels, so misconfigurations can expose services to security threats. |
| 172 | + |
| 173 | +### **39. What is network segmentation?** |
| 174 | + |
| 175 | +It is dividing a network into smaller parts to improve security and performance. |
| 176 | + |
| 177 | +### **40. What is the difference between active and passive reconnaissance?** |
| 178 | + |
| 179 | +- **Active reconnaissance**: Direct interaction with the target. |
| 180 | +- **Passive reconnaissance**: Collecting data without direct interaction. |
| 181 | + |
| 182 | +--- |
| 183 | + |
| 184 | +## **Advanced-Level (41-60) Questions** |
| 185 | + |
| 186 | +### **41. What is mutual TLS (mTLS), and why is it used?** |
| 187 | + |
| 188 | +Mutual TLS (mTLS) ensures **both client and server** authenticate each other before communication, enhancing security in microservices and API interactions. |
| 189 | + |
| 190 | +### **42. What is the difference between L3, L4, and L7 firewalls?** |
| 191 | + |
| 192 | +- **L3 Firewall (Network Layer)**: Filters traffic based on IP addresses. |
| 193 | +- **L4 Firewall (Transport Layer)**: Filters based on ports and TCP/UDP protocols. |
| 194 | +- **L7 Firewall (Application Layer)**: Filters based on application-specific data (e.g., HTTP, FTP). |
| 195 | + |
| 196 | +### **43. How does AWS Security Groups differ from Network ACLs?** |
| 197 | + |
| 198 | +- **Security Groups**: Act as virtual firewalls at the instance level, stateful. |
| 199 | +- **Network ACLs**: Act at the subnet level, stateless. |
| 200 | + |
| 201 | +### **44. What is a SIEM (Security Information and Event Management) system?** |
| 202 | + |
| 203 | +SIEM aggregates security data from multiple sources to detect, analyze, and respond to threats. |
| 204 | + |
| 205 | +### **45. What is a threat model in security?** |
| 206 | + |
| 207 | +Threat modeling identifies potential threats and vulnerabilities in a system to proactively mitigate risks. |
| 208 | + |
| 209 | +### **46. What is an ephemeral port, and how is it used?** |
| 210 | + |
| 211 | +Ephemeral ports (e.g., **49152-65535**) are temporary ports used by client applications for outbound connections. |
| 212 | + |
| 213 | +### **47. How does DNSSEC enhance DNS security?** |
| 214 | + |
| 215 | +DNSSEC (DNS Security Extensions) prevents DNS spoofing by adding cryptographic signatures to DNS records. |
| 216 | + |
| 217 | +### **48. What are the different types of VPNs?** |
| 218 | + |
| 219 | +- **Remote Access VPN** (for individuals connecting to a network remotely). |
| 220 | +- **Site-to-Site VPN** (connects entire networks). |
| 221 | + |
| 222 | +### **49. How does a service mesh improve security in Kubernetes?** |
| 223 | + |
| 224 | +A **service mesh** (e.g., Istio, Linkerd) provides **mTLS, authentication, and observability** for secure communication between microservices. |
| 225 | + |
| 226 | +### **50. What are some common OWASP Top 10 security risks?** |
| 227 | + |
| 228 | +1. Injection (e.g., SQL injection) |
| 229 | +2. Broken Authentication |
| 230 | +3. Sensitive Data Exposure |
| 231 | +4. XML External Entities (XXE) |
| 232 | +5. Broken Access Control |
| 233 | +6. Security Misconfiguration |
| 234 | +7. Cross-Site Scripting (XSS) |
| 235 | +8. Insecure Deserialization |
| 236 | +9. Using Components with Known Vulnerabilities |
| 237 | +10. Insufficient Logging & Monitoring |
| 238 | + |
| 239 | +### **51. How do WebSockets handle security concerns?** |
| 240 | + |
| 241 | +WebSockets require **authentication, encryption (WSS), and proper origin checks** to prevent attacks. |
| 242 | + |
| 243 | +### **52. What is an SSRF (Server-Side Request Forgery) attack?** |
| 244 | + |
| 245 | +An SSRF attack tricks a server into making requests to internal services, leading to data leaks or system compromise. |
| 246 | + |
| 247 | +### **53. How does an AWS WAF protect applications?** |
| 248 | + |
| 249 | +AWS WAF filters web traffic based on **rules, rate limiting, and bot mitigation** to prevent common attacks like SQL injection and XSS. |
| 250 | + |
| 251 | +### **54. How does Kubernetes RBAC (Role-Based Access Control) work?** |
| 252 | + |
| 253 | +Kubernetes RBAC grants permissions based on **Roles, RoleBindings, ClusterRoles, and ClusterRoleBindings**, restricting access to resources. |
| 254 | + |
| 255 | +### **55. What is a MAC address, and how does MAC filtering enhance security?** |
| 256 | + |
| 257 | +A MAC address is a **unique identifier** for network interfaces. MAC filtering allows or denies network access based on these addresses. |
| 258 | + |
| 259 | +### **56. How does DNS poisoning work, and how can it be prevented?** |
| 260 | + |
| 261 | +DNS poisoning tricks users into visiting **malicious sites** by altering DNS records. Prevention includes **DNSSEC, monitoring, and secure DNS resolvers**. |
| 262 | + |
| 263 | +### **57. What is a federated identity in security?** |
| 264 | + |
| 265 | +Federated identity allows users to authenticate across multiple applications using a **single set of credentials** (e.g., Google or Microsoft sign-in). |
| 266 | + |
| 267 | +### **58. How does Kubernetes Network Policy improve security?** |
| 268 | + |
| 269 | +Kubernetes Network Policies define **rules for pod communication**, restricting traffic based on namespaces, labels, and IP ranges. |
| 270 | + |
| 271 | +### **59. What is the principle of least privilege (PoLP)?** |
| 272 | + |
| 273 | +PoLP ensures **users and applications only have the minimum access** needed to perform their tasks, reducing security risks. |
| 274 | + |
| 275 | +### **60. How do HSTS (HTTP Strict Transport Security) and CSP (Content Security Policy) improve web security?** |
| 276 | + |
| 277 | +- **HSTS**: Forces HTTPS connections to prevent downgrade attacks. |
| 278 | +- **CSP**: Restricts allowed content sources to prevent XSS attacks. |
0 commit comments