Security Engineer

100+ Security Engineer Interview Questions and Answers

Updated 26 Jul 2025

Asked in DELTA

2w ago

Q. Do you know Dynatrace, sumologic tools?

Ans.

Yes, I am familiar with Dynatrace and Sumo Logic tools.

  • I have experience using Dynatrace for application performance monitoring and management.

  • I have used Sumo Logic for log management and analytics.

  • I am proficient in setting up alerts, dashboards, and troubleshooting issues using these tools.

Asked in Infosys

1w ago

Q. what are different types of protocols

Ans.

Protocols are a set of rules that govern the communication between devices or systems.

  • Transport Layer Protocols: TCP, UDP

  • Internet Layer Protocols: IP, ICMP

  • Application Layer Protocols: HTTP, FTP, SMTP

  • Routing Protocols: OSPF, BGP

  • Security Protocols: SSL/TLS, IPSec

Asked in Providence

2w ago

Q. How does DNS work, and what are the different stages?

Ans.

DNS (Domain Name System) is a protocol that translates domain names into IP addresses and facilitates communication on the internet.

  • DNS works by resolving domain names to IP addresses through a series of stages.

  • The stages of DNS include: querying the local DNS resolver, querying the root DNS server, querying the top-level domain (TLD) DNS server, querying the authoritative DNS server, and returning the IP address.

  • DNS uses a hierarchical structure with multiple DNS servers to ...read more

Q. What types of CSPM posture have you worked with?

Ans.

I have worked with various types of CSPM postures including preventive, detective, corrective, and responsive.

  • Preventive CSPM posture focuses on proactively identifying and mitigating security risks before they occur.

  • Detective CSPM posture involves monitoring and detecting security incidents as they happen.

  • Corrective CSPM posture involves responding to security incidents and implementing necessary fixes.

  • Responsive CSPM posture focuses on recovering from security incidents and...read more

Are these interview questions helpful?

Q. What is XSS and how can it be prevented?

Ans.

XSS (Cross-Site Scripting) is a security vulnerability that allows attackers to inject malicious scripts into web pages viewed by users.

  • Input Validation: Always validate and sanitize user inputs to prevent malicious scripts from being executed. For example, use libraries like DOMPurify.

  • Output Encoding: Encode data before rendering it in the browser. For instance, convert special characters like < and > to &lt; and &gt;.

  • Content Security Policy (CSP): Implement CSP headers to r...read more

Q. What steps do you take to secure an API?

Ans.

Securing an API involves implementing authentication, authorization, encryption, and monitoring to protect data and access.

  • Authentication: Use OAuth 2.0 or JWT (JSON Web Tokens) to ensure that only authorized users can access the API.

  • Authorization: Implement role-based access control (RBAC) to restrict access to resources based on user roles, e.g., admin vs. user.

  • Data Encryption: Use HTTPS to encrypt data in transit and consider encrypting sensitive data at rest to protect ag...read more

Security Engineer Jobs

Ericsson India Global Services Pvt. Ltd. logo
Security engineer 8-15 years
Ericsson India Global Services Pvt. Ltd.
4.1
Bangalore / Bengaluru
Larsen & Toubro (L&T) logo
Automotive Cybersecurity Engineer 3-8 years
Larsen & Toubro (L&T)
3.9
Pune
Accenture Solutions Pvt Ltd logo
Security Engineer 15-20 years
Accenture Solutions Pvt Ltd
3.7
Pune
3d ago

Q. How do you configure a firewall from scratch?

Ans.

To configure a firewall from scratch, you need to define rules, set up access control lists, configure NAT, and monitor traffic.

  • Define the purpose of the firewall and the network topology

  • Create rules to allow or block specific traffic based on IP addresses, ports, protocols, etc.

  • Set up access control lists to control traffic flow within the network

  • Configure Network Address Translation (NAT) to map internal IP addresses to external ones

  • Monitor firewall logs and traffic to ensu...read more

Asked in AppSecure

2w ago

Q. All bugs type and how to find them

Ans.

Various types of bugs and methods to find them

  • Common bugs include logic errors, syntax errors, and security vulnerabilities

  • Use debugging tools like breakpoints and logging to find bugs

  • Perform code reviews and testing to catch bugs early

  • Examples: buffer overflow, SQL injection, cross-site scripting

Share interview questions and help millions of jobseekers 🌟

man-with-laptop
2w ago

Q. Tell me about the CSPM tools you have used.

Ans.

I have experience with several CSPM tools.

  • I have used AWS Config to monitor and assess the configuration of AWS resources.

  • I am familiar with Azure Security Center, which provides continuous monitoring and threat detection for Azure resources.

  • I have worked with Google Cloud Security Command Center to gain visibility into security risks and vulnerabilities in Google Cloud Platform.

  • I have also used tools like CloudCheckr and Dome9 for multi-cloud security management and complian...read more

Asked in SPRINKLR

2w ago

Q. Practical pentest of vulnerable web application.

Ans.

Practical pentest involves identifying vulnerabilities in a web application and exploiting them to gain unauthorized access.

  • Conduct a thorough reconnaissance of the target application

  • Identify potential vulnerabilities such as SQL injection, cross-site scripting, and file inclusion

  • Exploit the vulnerabilities using tools such as Burp Suite and Metasploit

  • Document the findings and provide recommendations for remediation

  • Re-test the application after remediation to ensure all vulne...read more

Asked in BT Business

2w ago

Q. What is SP3 architecture?

Ans.

SP3 architecture is a security architecture designed to protect against malware attacks.

  • SP3 stands for Security Platform 3

  • It is a hardware-based security architecture

  • It is designed to protect against malware attacks by isolating critical system components

  • It is used in some Intel processors, such as the Intel Core i7

  • It provides a secure execution environment for sensitive applications

6d ago

Q. What Python libraries do you use?

Ans.

I primarily use the following Python libraries: requests, BeautifulSoup, pandas, numpy, scikit-learn, matplotlib.

  • requests: for making HTTP requests

  • BeautifulSoup: for web scraping

  • pandas: for data manipulation and analysis

  • numpy: for numerical computing

  • scikit-learn: for machine learning

  • matplotlib: for data visualization

2w ago

Q. Explain PACLI in CyberArk.

Ans.

PACLI is a command-line interface tool provided by CyberArk to manage privileged accounts and credentials.

  • PACLI stands for Privileged Account Command Line Interface.

  • It allows users to perform various tasks related to privileged accounts and credentials such as adding, modifying, and deleting them.

  • PACLI can also be used to retrieve account information, generate reports, and perform password rotations.

  • It is a powerful tool that can be integrated with other CyberArk solutions su...read more

1w ago

Q. How do you onboard applications?

Ans.

Applications can be onboarded by following a structured process that includes identifying requirements, testing, and deployment.

  • Identify the requirements of the application and ensure that it meets the security standards.

  • Test the application thoroughly to identify any vulnerabilities or weaknesses.

  • Deploy the application in a controlled environment and monitor its performance.

  • Ensure that the application is integrated with the existing security infrastructure.

  • Provide training a...read more

Asked in Accenture

1w ago

Q. Explain the concept of XSS.

Ans.

XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

  • XSS attacks can be used to steal sensitive information, such as login credentials or personal data.

  • Attackers can also use XSS to hijack user sessions, redirect users to malicious websites, or deface web pages.

  • XSS vulnerabilities can be prevented by properly sanitizing user input and using output encoding to prevent ...read more

1w ago

Q. Explain the difference between a router and a switch.

Ans.

Routers connect multiple networks together, while switches connect devices within a single network.

  • Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).

  • Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.

  • Routers are typically used to connect different networks, such as a home network to the internet, while switches are used to connect de...read more

6d ago

Q. What is subnetting? Please explain.

Ans.

Subnetting is the process of dividing a network into smaller subnetworks.

  • Subnetting helps in efficient utilization of IP addresses

  • It improves network performance and security

  • Subnetting is done by borrowing bits from the host portion of an IP address

  • Example: 192.168.1.0/24 can be subnetted into 192.168.1.0/25 and 192.168.1.128/25

Asked in TCS iON

2w ago

Q. What is vulnerability management?

Ans.

Vulnerability management is the practice of identifying, classifying, prioritizing, and mitigating security vulnerabilities in systems and software.

  • Identifying vulnerabilities in systems and software

  • Classifying vulnerabilities based on severity

  • Prioritizing vulnerabilities based on risk level

  • Mitigating vulnerabilities through patches or other security measures

1w ago

Q. How do you manipulate two numbers?

Ans.

Two numbers can be manipulated using mathematical operations such as addition, subtraction, multiplication, and division.

  • Addition: add the two numbers together

  • Subtraction: subtract one number from the other

  • Multiplication: multiply the two numbers together

  • Division: divide one number by the other

  • Modulo: find the remainder when one number is divided by the other

Q. What is Encryption &amp; Decryption?

Ans.

Encryption is the process of converting data into a coded format, while decryption is the reverse process of converting it back to its original form.

  • Encryption transforms plaintext into ciphertext using algorithms and keys.

  • Decryption reverses the process, turning ciphertext back into readable plaintext.

  • Common encryption algorithms include AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman).

  • For example, when you send a secure email, the content is encrypted to p...read more

2w ago

Q. how to multiply two number

Ans.

To multiply two numbers, you can use the multiplication operator (*) in most programming languages.

  • In Python: num1 * num2

  • In Java: num1 * num2

  • In JavaScript: num1 * num2

  • In C++: num1 * num2

  • In Ruby: num1 * num2

Asked in Providence

2w ago

Q. different stages of attack vectors

Ans.

Attack vectors have three stages: pre-attack, attack, and post-attack.

  • Pre-attack stage involves reconnaissance and gathering information about the target.

  • Attack stage involves exploiting vulnerabilities and gaining access to the target system.

  • Post-attack stage involves maintaining access, covering tracks, and exfiltrating data.

  • Examples of attack vectors include phishing, malware, social engineering, and physical attacks.

Asked in CitiusTech

4d ago

Q. What is JWT and OAuth

Ans.

JWT is a compact, self-contained way to transmit information between parties as a JSON object. OAuth is an open standard for access delegation.

  • JWT stands for JSON Web Token and is used for securely transmitting information between parties as a JSON object.

  • JWTs consist of three parts: a header, a payload, and a signature.

  • OAuth is an open standard for access delegation, commonly used for authorization and authentication.

  • OAuth allows a user to grant a third-party application acc...read more

4d ago

Q. What is routing? Please explain.

Ans.

Routing is the process of selecting the best path for network traffic to travel from one network to another.

  • Routing involves analyzing network topology and determining the most efficient path for data to travel

  • Routing protocols such as OSPF and BGP are used to exchange routing information between routers

  • Routing tables are used to store information about network destinations and the best path to reach them

  • Routing can be static or dynamic, with dynamic routing adjusting to chan...read more

2w ago

Q. what is ssrf and csrf

Ans.

SSRF is a server-side attack that allows an attacker to make requests from the server. CSRF is a client-side attack that tricks a user into performing an action on a website.

  • SSRF stands for Server-Side Request Forgery

  • It allows an attacker to send requests from the server to other servers

  • This can be used to access internal systems or perform actions on behalf of the server

  • CSRF stands for Cross-Site Request Forgery

  • It tricks a user into performing an action on a website without ...read more

1w ago

Q. What are the different functionalities of Burp Suite?

Ans.

Burpsuite is a web application security testing tool used for scanning, analyzing, and exploiting web applications.

  • Burpsuite can intercept and modify HTTP/S requests and responses

  • It can be used for scanning web applications for vulnerabilities

  • Burpsuite includes tools for spidering, scanning, and intruder attacks

  • It has a repeater tool for manually manipulating and re-sending requests

  • Burpsuite can be used for session handling and authentication testing

Asked in ACL Digital

6d ago

Q. Why cybersecurity?

Ans.

Passion for protecting data and systems from cyber threats.

  • Fascination with technology and computers from a young age

  • Desire to make a positive impact by safeguarding sensitive information

  • Constantly evolving field with new challenges and opportunities

  • Examples: Preventing data breaches, defending against malware attacks

Q. What is SCIM and OpenID

Ans.

SCIM is System for Cross-domain Identity Management and OpenID is an open standard for authentication.

  • SCIM is a protocol that allows for the automation of user provisioning and deprovisioning across different systems.

  • OpenID is a decentralized authentication protocol that allows users to log into multiple websites using a single set of credentials.

  • SCIM and OpenID are commonly used in identity and access management systems to streamline user management and authentication proces...read more

Asked in TCS iON

1w ago

Q. What is threat modeling?

Ans.

Threat modelling is a structured approach to identifying and prioritizing potential security threats to a system.

  • Involves identifying potential threats to a system

  • Prioritizing threats based on likelihood and impact

  • Helps in designing appropriate security controls

  • Common methodologies include STRIDE and DREAD

  • Example: Identifying potential threats to a web application such as SQL injection, cross-site scripting, etc.

1w ago

Q. How does a Firewall work?

Ans.

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  • Acts as a barrier between a trusted internal network and untrusted external network

  • Filters traffic based on rules set by network administrators

  • Can be hardware-based or software-based

  • Can block or allow traffic based on IP addresses, ports, protocols, etc.

  • Examples include Cisco ASA, Palo Alto Networks, and pfSense

Previous
1
2
3
4
Next

Interview Experiences of Popular Companies

TCS Logo
3.6
 • 11.2k Interviews
Accenture Logo
3.7
 • 8.7k Interviews
Infosys Logo
3.6
 • 8k Interviews
Wipro Logo
3.7
 • 6.1k Interviews
Amazon Logo
4.0
 • 5.4k Interviews
View all
Interview Tips & Stories
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories
Security Engineer Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Trusted by over 1.5 Crore job seekers to find their right fit company
80 L+

Reviews

10L+

Interviews

4 Cr+

Salaries

1.5 Cr+

Users

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2025 Info Edge (India) Ltd.

Follow Us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter
Profile Image
Hello, Guest
AmbitionBox Employee Choice Awards 2025
Winners announced!
awards-icon
Contribute to help millions!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos
Add office benefits
Add office benefits