Security Architect
Security Architect Interview Questions
Most Searched Companies
10 results found
Sort By:
Popularity
Interview Questions
Q1. Round 2: Technical 1.) How to mitigate DoS and DDos attacks 2.) Explain smurf, ping of death, SIEM 3.) What is BOT & BOTNET 4.) Explain denial of service mitigation using rate control techniques 5.) What are client reputation profiles based on IP address subnet behavior 6.) SQLi, Command Injection , Remote file inclusion, RFI, Local file inclusion , dictionary , brute force, SSRF, CSRF, XSS, XML entity attacks and prevention 7.) Explain DNS Resolution process explained in detail starting from how you hit a web domain in browser toll resolution to loading of webpage including TCP handshake and SSL handshake 8) Explain resource recordset, DNS security , DNS amplification attacks and mitigation s, DNS security , DNS spoofing attacks MITM etc 9.) Explain HTTP versions request response flow , status codes 2xx , 3xx, 4xx, 5xx how they are used 10 ) different types of HTTP request methods suchs as GET, HEAD, PUT, POST, OPTIONS, HTTPS 1.1 and 2.0 and 3.0 differences 11.) How SSL handshake works using encryption TLS versions 1.2 , 1.1 , 1.3
Add AnswerQ2. Round 1 : Technical 1.) OWASP Top 10 2.) Different types of DoS DDoS attacks 3.) Explain difference between vulnerability , threat and risk 4.) Different types of application layer attacks and mitigation techniques
Add AnswerQ3. Round 3: Whiteboard/Presentation Rounds A topic such as BoT DoS DDoS or volumetric attacks types detection and prevention techniques using ppt presentation a and explanation and cross questions by panels to test your technical logical and approach
Add Answer
Interview Questions
Q1. Process and improvement and planning related questions
Add AnswerQ2. Ask flexibility and availability related questions
Add AnswerQ3. Security attacks related questions
Add Answer
Interview Questions
Q1. Technical security questionnaires on web, network and cloud computing
Add Answer- Add Answer
Interview Questions
Q1. How to make the policy process to the non it users
View answer (1)- View answer (1)
- Home >
- Interviews >
- Security Architect Interview Questions