PAYTM CYBER SECURITY INTERVIEW QUESTIONS
What are the tools using? What is edr? What is difference between vpn & proxy? Telenet port num & ssh port number port number for rdp What is golden ticket? Owasp top 10 vulnerabiluties Ssl handshake After ransomware came into system before encrypting attacker will do some things . what is that? What is logon number for rdp What is cyber kill chain? Can u give the example of what is the ways to delivery and explain What is mitm What is XSS ? how to prevent cross site scripting? How do you know u r using proper sanitization? What is fileless malware & file malware? A)fileless malware is a type of malicious software that uses legitimate programs to infect a computer . It does not rely on files and leaves no footprint, making it challenging to detect and remove. If we checked av no suspicious logs.but cnc connection happened . how to detect that. What will u see in the proxy logs? A) Date and time. · ...