PAYTM CYBER SECURITY INTERVIEW QUESTIONS

 

What are the tools using?

What is edr?

What is difference between  vpn & proxy?

Telenet port num & ssh port number port number for rdp

What is golden ticket?

Owasp top 10 vulnerabiluties

Ssl handshake

After ransomware came into system before encrypting attacker will do some things . what is that?

What is logon number for rdp

What is cyber kill chain? Can u give the example of what is the ways to delivery and explain

What is mitm

What is XSS ? how to prevent cross site scripting?  How do you know u r using proper sanitization?

What is fileless malware & file malware?

A)fileless malware is a type of malicious software that uses legitimate programs to infect a computer. It does not rely on files and leaves no footprint, making it challenging to detect and remove.

If we checked av no suspicious logs.but cnc connection happened . how to detect that.

What will u see in the proxy logs?

 A)Date and time.

·         HTTP protocol version.

·         HTTP request method.

·         Content type.

·         User agent.

·         HTTP referer.

·         Length of the content response.

·         Authenticated username of the client.

 

 

What is spf soft fail and hard fail

A)any servers not listed in this SPF record should be treated as a "softfail", ie. mail can be allowed through but should

be tagged as spam or suspiciou

  A) any senders not listed in this SPF record should be treated as a "hardfail", ie. they are unauthorised and emails from them should

be discarded

 

If I am the attacker how will u take password of public wifi?

If u r the attacker how can u do the mitm attack?

What is ssl & tsl

Difference between encryption & hashing & digital signature

What is a smurf malware?

sWhat is lateral movement?

 

 

 

 

Comments

Popular posts from this blog

Brute force attack investigation

Which tools and software do we need?

Packet drafting for IDS_IPS