Advanced Level
Expert-level networking and security questions and answers for senior professionals.
Advanced Level
This section covers expert-level networking and security concepts commonly asked in interviews for senior professionals.
What is mutual TLS (mTLS), and why is it used?
Mutual TLS (mTLS) ensures both client and server authenticate each other before communication, enhancing security in microservices and API interactions.
What is the difference between L3, L4, and L7 firewalls?
- L3 Firewall (Network Layer): Filters traffic based on IP addresses.
- L4 Firewall (Transport Layer): Filters based on ports and TCP/UDP protocols.
- L7 Firewall (Application Layer): Filters based on application-specific data (e.g., HTTP, FTP).
How does AWS Security Groups differ from Network ACLs?
- Security Groups: Act as virtual firewalls at the instance level, stateful.
- Network ACLs: Act at the subnet level, stateless.
What is a SIEM (Security Information and Event Management) system?
SIEM aggregates security data from multiple sources to detect, analyze, and respond to threats.
What is a threat model in security?
Threat modeling identifies potential threats and vulnerabilities in a system to proactively mitigate risks.
What is an ephemeral port, and how is it used?
Ephemeral ports (e.g., 49152-65535) are temporary ports used by client applications for outbound connections.
How does DNSSEC enhance DNS security?
DNSSEC (DNS Security Extensions) prevents DNS spoofing by adding cryptographic signatures to DNS records.
What are the different types of VPNs?
- Remote Access VPN (for individuals connecting to a network remotely).
- Site-to-Site VPN (connects entire networks).
How does a service mesh improve security in Kubernetes?
A service mesh (e.g., Istio, Linkerd) provides mTLS, authentication, and observability for secure communication between microservices.
What are some common OWASP Top 10 security risks?
- Injection (e.g., SQL injection)
- Broken Authentication
- Sensitive Data Exposure
- XML External Entities (XXE)
- Broken Access Control
- Security Misconfiguration
- Cross-Site Scripting (XSS)
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Insufficient Logging & Monitoring
How do WebSockets handle security concerns?
WebSockets require authentication, encryption (WSS), and proper origin checks to prevent attacks.
What is an SSRF (Server-Side Request Forgery) attack?
An SSRF attack tricks a server into making requests to internal services, leading to data leaks or system compromise.
How does an AWS WAF protect applications?
AWS WAF filters web traffic based on rules, rate limiting, and bot mitigation to prevent common attacks like SQL injection and XSS.
How does Kubernetes RBAC (Role-Based Access Control) work?
Kubernetes RBAC grants permissions based on Roles, RoleBindings, ClusterRoles, and ClusterRoleBindings, restricting access to resources.
What is a MAC address, and how does MAC filtering enhance security?
A MAC address is a unique identifier for network interfaces. MAC filtering allows or denies network access based on these addresses.
How does DNS poisoning work, and how can it be prevented?
DNS poisoning tricks users into visiting malicious sites by altering DNS records. Prevention includes DNSSEC, monitoring, and secure DNS resolvers.
What is a federated identity in security?
Federated identity allows users to authenticate across multiple applications using a single set of credentials (e.g., Google or Microsoft sign-in).
How does Kubernetes Network Policy improve security?
Kubernetes Network Policies define rules for pod communication, restricting traffic based on namespaces, labels, and IP ranges.
What is the principle of least privilege (PoLP)?
PoLP ensures users and applications only have the minimum access needed to perform their tasks, reducing security risks.
How do HSTS (HTTP Strict Transport Security) and CSP (Content Security Policy) improve web security?
- HSTS: Forces HTTPS connections to prevent downgrade attacks.
- CSP: Restricts allowed content sources to prevent XSS attacks.
📢 Contribute & Stay Updated
💡 Want to contribute?
We welcome contributions! If you have insights, new tools, or improvements, feel free to submit a pull request.
📌 How to Contribute?
- Read the CONTRIBUTING.md guide.
- Fix errors, add missing topics, or suggest improvements.
- Submit a pull request with your updates.
🌍 Community & Support
🔗 GitHub: @NotHarshhaa
📝 Blog: ProDevOpsGuy
💬 Telegram Community: Join Here