PAYTM CYBER SECURITY INTERVIEW QUESTIONS
What are the tools using?
What is edr?
What is difference between
vpn & proxy?
Telenet port num & ssh port number port number for rdp
What is
golden ticket?
Owasp top 10 vulnerabiluties
Ssl handshake
After ransomware
came into system before encrypting attacker will do some things . what is that?
What is
logon number for rdp
What is cyber kill chain? Can u give the example of what is the ways to delivery
and explain
What is mitm
What is XSS ? how to prevent cross site scripting? How do you know u r using proper sanitization?
What is
fileless malware & file malware?
A)fileless malware is a type of malicious software that uses legitimate programs to infect a computer. It does not rely on files and leaves no
footprint, making it challenging to detect and remove.
If we checked av no suspicious logs.but cnc
connection happened . how to detect that.
What will u see in the proxy logs?
A)Date and time.
·
HTTP protocol version.
·
HTTP request method.
·
Content type.
·
User agent.
·
HTTP referer.
·
Length of the content
response.
·
Authenticated username
of the client.
What is spf soft fail and hard fail
A)any servers not listed in this SPF record should be treated as a "softfail", ie. mail can be allowed through but should
be tagged as spam or suspiciou
A) any senders not listed in this SPF record should be treated as a "hardfail", ie. they are unauthorised and emails from them should
be discarded
If I am the attacker how will u take password of public wifi?
If u r
the attacker how can u do the mitm attack?
What is ssl & tsl
Difference between encryption & hashing & digital
signature
What is
a smurf malware?
sWhat is
lateral movement?
Comments