Skip to content

Commit 7e90ffd

Browse files
committed
DevOps-Interview: docs: Add essential networking-security DevOps interview questions and answers
Signed-off-by: NotHarshhaa <[email protected]>
1 parent 87046a7 commit 7e90ffd

File tree

1 file changed

+278
-0
lines changed

1 file changed

+278
-0
lines changed

networking-security/README.md

Lines changed: 278 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,278 @@
1+
# Networking & Security Interview Questions
2+
3+
## **Beginner-Level (1-20) Questions**
4+
5+
### **1. What is a network?**
6+
7+
A network is a group of interconnected devices that communicate to share resources and information. It can be wired or wireless.
8+
9+
### **2. What is an IP address?**
10+
11+
An IP (Internet Protocol) address is a unique numerical identifier assigned to each device on a network to facilitate communication.
12+
13+
### **3. What is the difference between IPv4 and IPv6?**
14+
15+
- **IPv4**: 32-bit addressing, supports 4.3 billion addresses.
16+
- **IPv6**: 128-bit addressing, supports an enormous number of addresses, improving scalability and security.
17+
18+
### **4. What are private and public IP addresses?**
19+
20+
- **Private IPs**: Used within local networks (e.g., 192.168.x.x).
21+
- **Public IPs**: Used on the internet and assigned by ISPs.
22+
23+
### **5. What is a subnet mask?**
24+
25+
A subnet mask divides an IP address into network and host portions, determining which part identifies the network and which part identifies the device.
26+
27+
### **6. What is DHCP, and how does it work?**
28+
29+
The **Dynamic Host Configuration Protocol (DHCP)** automatically assigns IP addresses to devices in a network, reducing manual configuration.
30+
31+
### **7. What is DNS, and why is it important?**
32+
33+
The **Domain Name System (DNS)** translates domain names (e.g., google.com) into IP addresses, making it easier to access websites.
34+
35+
### **8. What is NAT (Network Address Translation)?**
36+
37+
NAT allows multiple devices on a local network to share a single public IP address for internet access.
38+
39+
### **9. What is a firewall?**
40+
41+
A firewall is a security system that monitors and controls incoming and outgoing network traffic based on security rules.
42+
43+
### **10. What are the types of firewalls?**
44+
45+
- **Packet Filtering Firewall**
46+
- **Stateful Inspection Firewall**
47+
- **Proxy Firewall**
48+
- **Next-Generation Firewall (NGFW)**
49+
50+
### **11. What is a VPN?**
51+
52+
A **Virtual Private Network (VPN)** encrypts internet connections, providing secure remote access and anonymity.
53+
54+
### **12. What is SSH, and why is it used?**
55+
56+
SSH (**Secure Shell**) is a protocol used for secure remote access to servers using encrypted communication.
57+
58+
### **13. What is HTTP and HTTPS?**
59+
60+
- **HTTP (Hypertext Transfer Protocol)**: Unencrypted web communication.
61+
- **HTTPS (HTTP Secure)**: Secure, encrypted communication using SSL/TLS.
62+
63+
### **14. What is an SSL/TLS certificate?**
64+
65+
An SSL/TLS certificate encrypts website traffic, ensuring secure communication and trustworthiness.
66+
67+
### **15. What is a load balancer?**
68+
69+
A load balancer distributes incoming network traffic across multiple servers to optimize performance and availability.
70+
71+
### **16. What are different types of load balancers?**
72+
73+
- **Layer 4 Load Balancer** (Transport Layer)
74+
- **Layer 7 Load Balancer** (Application Layer)
75+
76+
### **17. What is a DMZ in networking?**
77+
78+
A **Demilitarized Zone (DMZ)** is a security buffer between an internal network and the internet, hosting public-facing services securely.
79+
80+
### **18. What is port forwarding?**
81+
82+
Port forwarding redirects network traffic from one port to another, often used to expose internal services externally.
83+
84+
### **19. What is ARP (Address Resolution Protocol)?**
85+
86+
ARP translates IP addresses into MAC addresses to enable communication within a local network.
87+
88+
### **20. What is an IDS and IPS?**
89+
90+
- **IDS (Intrusion Detection System)**: Monitors network traffic for threats.
91+
- **IPS (Intrusion Prevention System)**: Blocks malicious traffic automatically.
92+
93+
---
94+
95+
## **Intermediate-Level (21-40) Questions**
96+
97+
### **21. What is Zero Trust Security?**
98+
99+
Zero Trust is a security model that assumes no entity (inside or outside the network) is trusted by default.
100+
101+
### **22. What is the difference between symmetric and asymmetric encryption?**
102+
103+
- **Symmetric Encryption**: Uses one key for encryption and decryption.
104+
- **Asymmetric Encryption**: Uses a public-private key pair (e.g., RSA).
105+
106+
### **23. What is a CDN (Content Delivery Network)?**
107+
108+
A **CDN** improves website speed and security by distributing content across multiple servers worldwide.
109+
110+
### **24. What is the difference between TCP and UDP?**
111+
112+
- **TCP**: Reliable, connection-oriented, ensures data delivery.
113+
- **UDP**: Faster, connectionless, best for real-time applications.
114+
115+
### **25. How does a reverse proxy improve security?**
116+
117+
A reverse proxy sits between users and backend servers, protecting them from direct exposure and filtering malicious traffic.
118+
119+
### **26. What are the benefits of HTTPS over HTTP?**
120+
121+
- Encryption
122+
- Data integrity
123+
- Authentication
124+
125+
### **27. How does multi-factor authentication (MFA) enhance security?**
126+
127+
MFA adds an extra security layer by requiring multiple verification methods (e.g., password + OTP).
128+
129+
### **28. What is a bastion host?**
130+
131+
A **bastion host** is a highly secured jump server used to access internal networks securely.
132+
133+
### **29. What is OSI Model and its layers?**
134+
135+
The OSI model has **7 layers**: Physical, Data Link, Network, Transport, Session, Presentation, Application.
136+
137+
### **30. What is a WAF (Web Application Firewall)?**
138+
139+
A **WAF** protects web applications by filtering and blocking malicious HTTP traffic.
140+
141+
### **31. What is a honeypot in cybersecurity?**
142+
143+
A honeypot is a security system designed to detect and study cyberattacks by mimicking real systems.
144+
145+
### **32. What is BGP (Border Gateway Protocol)?**
146+
147+
BGP is a routing protocol used for exchanging routing information between networks on the internet.
148+
149+
### **33. What is DDoS, and how can it be mitigated?**
150+
151+
A **Distributed Denial-of-Service (DDoS)** attack overwhelms a system. It can be mitigated using rate limiting, firewalls, and cloud-based protection.
152+
153+
### **34. What is the CIA Triad in security?**
154+
155+
The **CIA Triad** stands for **Confidentiality, Integrity, and Availability**, which are fundamental security principles.
156+
157+
### **35. What is SSO (Single Sign-On)?**
158+
159+
SSO allows users to log in to multiple applications using a single authentication process.
160+
161+
### **36. What is a security token?**
162+
163+
A **security token** is a physical or digital device used for authentication.
164+
165+
### **37. What is an access control list (ACL)?**
166+
167+
An ACL defines rules that allow or deny traffic based on IP, ports, or protocols.
168+
169+
### **38. What is a container network security concern?**
170+
171+
Containers share OS kernels, so misconfigurations can expose services to security threats.
172+
173+
### **39. What is network segmentation?**
174+
175+
It is dividing a network into smaller parts to improve security and performance.
176+
177+
### **40. What is the difference between active and passive reconnaissance?**
178+
179+
- **Active reconnaissance**: Direct interaction with the target.
180+
- **Passive reconnaissance**: Collecting data without direct interaction.
181+
182+
---
183+
184+
## **Advanced-Level (41-60) Questions**
185+
186+
### **41. What is mutual TLS (mTLS), and why is it used?**
187+
188+
Mutual TLS (mTLS) ensures **both client and server** authenticate each other before communication, enhancing security in microservices and API interactions.
189+
190+
### **42. What is the difference between L3, L4, and L7 firewalls?**
191+
192+
- **L3 Firewall (Network Layer)**: Filters traffic based on IP addresses.
193+
- **L4 Firewall (Transport Layer)**: Filters based on ports and TCP/UDP protocols.
194+
- **L7 Firewall (Application Layer)**: Filters based on application-specific data (e.g., HTTP, FTP).
195+
196+
### **43. How does AWS Security Groups differ from Network ACLs?**
197+
198+
- **Security Groups**: Act as virtual firewalls at the instance level, stateful.
199+
- **Network ACLs**: Act at the subnet level, stateless.
200+
201+
### **44. What is a SIEM (Security Information and Event Management) system?**
202+
203+
SIEM aggregates security data from multiple sources to detect, analyze, and respond to threats.
204+
205+
### **45. What is a threat model in security?**
206+
207+
Threat modeling identifies potential threats and vulnerabilities in a system to proactively mitigate risks.
208+
209+
### **46. What is an ephemeral port, and how is it used?**
210+
211+
Ephemeral ports (e.g., **49152-65535**) are temporary ports used by client applications for outbound connections.
212+
213+
### **47. How does DNSSEC enhance DNS security?**
214+
215+
DNSSEC (DNS Security Extensions) prevents DNS spoofing by adding cryptographic signatures to DNS records.
216+
217+
### **48. What are the different types of VPNs?**
218+
219+
- **Remote Access VPN** (for individuals connecting to a network remotely).
220+
- **Site-to-Site VPN** (connects entire networks).
221+
222+
### **49. How does a service mesh improve security in Kubernetes?**
223+
224+
A **service mesh** (e.g., Istio, Linkerd) provides **mTLS, authentication, and observability** for secure communication between microservices.
225+
226+
### **50. What are some common OWASP Top 10 security risks?**
227+
228+
1. Injection (e.g., SQL injection)
229+
2. Broken Authentication
230+
3. Sensitive Data Exposure
231+
4. XML External Entities (XXE)
232+
5. Broken Access Control
233+
6. Security Misconfiguration
234+
7. Cross-Site Scripting (XSS)
235+
8. Insecure Deserialization
236+
9. Using Components with Known Vulnerabilities
237+
10. Insufficient Logging & Monitoring
238+
239+
### **51. How do WebSockets handle security concerns?**
240+
241+
WebSockets require **authentication, encryption (WSS), and proper origin checks** to prevent attacks.
242+
243+
### **52. What is an SSRF (Server-Side Request Forgery) attack?**
244+
245+
An SSRF attack tricks a server into making requests to internal services, leading to data leaks or system compromise.
246+
247+
### **53. How does an AWS WAF protect applications?**
248+
249+
AWS WAF filters web traffic based on **rules, rate limiting, and bot mitigation** to prevent common attacks like SQL injection and XSS.
250+
251+
### **54. How does Kubernetes RBAC (Role-Based Access Control) work?**
252+
253+
Kubernetes RBAC grants permissions based on **Roles, RoleBindings, ClusterRoles, and ClusterRoleBindings**, restricting access to resources.
254+
255+
### **55. What is a MAC address, and how does MAC filtering enhance security?**
256+
257+
A MAC address is a **unique identifier** for network interfaces. MAC filtering allows or denies network access based on these addresses.
258+
259+
### **56. How does DNS poisoning work, and how can it be prevented?**
260+
261+
DNS poisoning tricks users into visiting **malicious sites** by altering DNS records. Prevention includes **DNSSEC, monitoring, and secure DNS resolvers**.
262+
263+
### **57. What is a federated identity in security?**
264+
265+
Federated identity allows users to authenticate across multiple applications using a **single set of credentials** (e.g., Google or Microsoft sign-in).
266+
267+
### **58. How does Kubernetes Network Policy improve security?**
268+
269+
Kubernetes Network Policies define **rules for pod communication**, restricting traffic based on namespaces, labels, and IP ranges.
270+
271+
### **59. What is the principle of least privilege (PoLP)?**
272+
273+
PoLP ensures **users and applications only have the minimum access** needed to perform their tasks, reducing security risks.
274+
275+
### **60. How do HSTS (HTTP Strict Transport Security) and CSP (Content Security Policy) improve web security?**
276+
277+
- **HSTS**: Forces HTTPS connections to prevent downgrade attacks.
278+
- **CSP**: Restricts allowed content sources to prevent XSS attacks.

0 commit comments

Comments
 (0)