Intermediate Level
Advanced networking and security questions and answers for experienced professionals.
Intermediate Level
This section covers advanced networking and security concepts commonly asked in interviews for experienced professionals.
🚀 Intermediate-Level Questions
What is Zero Trust Security?
Zero Trust is a security model that assumes no entity (inside or outside the network) is trusted by default.
What is the difference between symmetric and asymmetric encryption?
- Symmetric Encryption: Uses one key for encryption and decryption.
- Asymmetric Encryption: Uses a public-private key pair (e.g., RSA).
What is a CDN (Content Delivery Network)?
A CDN improves website speed and security by distributing content across multiple servers worldwide.
What is the difference between TCP and UDP?
- TCP: Reliable, connection-oriented, ensures data delivery.
- UDP: Faster, connectionless, best for real-time applications.
How does a reverse proxy improve security?
A reverse proxy sits between users and backend servers, protecting them from direct exposure and filtering malicious traffic.
What are the benefits of HTTPS over HTTP?
- Encryption
- Data integrity
- Authentication
How does multi-factor authentication (MFA) enhance security?
MFA adds an extra security layer by requiring multiple verification methods (e.g., password + OTP).
What is a bastion host?
A bastion host is a highly secured jump server used to access internal networks securely.
What is OSI Model and its layers?
The OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, Application.
What is a WAF (Web Application Firewall)?
A WAF protects web applications by filtering and blocking malicious HTTP traffic.
What is a honeypot in cybersecurity?
A honeypot is a security system designed to detect and study cyberattacks by mimicking real systems.
What is BGP (Border Gateway Protocol)?
BGP is a routing protocol used for exchanging routing information between networks on the internet.
What is DDoS, and how can it be mitigated?
A Distributed Denial-of-Service (DDoS) attack overwhelms a system. It can be mitigated using:
- Rate limiting
- Firewalls
- Cloud-based protection
What is the CIA Triad in security?
The CIA Triad stands for Confidentiality, Integrity, and Availability, which are fundamental security principles.
What is SSO (Single Sign-On)?
SSO allows users to log in to multiple applications using a single authentication process.
What is a security token?
A security token is a physical or digital device used for authentication.
What is an access control list (ACL)?
An ACL defines rules that allow or deny traffic based on IP, ports, or protocols.
What is a container network security concern?
Containers share OS kernels, so misconfigurations can expose services to security threats.
What is network segmentation?
It is dividing a network into smaller parts to improve security and performance.
What is the difference between active and passive reconnaissance?
- Active reconnaissance: Direct interaction with the target.
- Passive reconnaissance: Collecting data without direct interaction.
📢 Contribute & Stay Updated
💡 Want to contribute?
We welcome contributions! If you have insights, new tools, or improvements, feel free to submit a pull request.
📌 How to Contribute?
- Read the CONTRIBUTING.md guide.
- Fix errors, add missing topics, or suggest improvements.
- Submit a pull request with your updates.
🌍 Community & Support
🔗 GitHub: @NotHarshhaa
📝 Blog: ProDevOpsGuy
💬 Telegram Community: Join Here