Round 2: Technical 1.) How to mitigate DoS and DDos attacks 2.) Explain smurf, ping of death, SIEM 3.) What is BOT & BOTNET 4.) Explain denial of service mitigation using rate control techniques 5.) What are client reputation profiles based on IP address subnet behavior 6.) SQLi, Command Injection , Remote file inclusion, RFI, Local file inclusion , dictionary , brute force, SSRF, CSRF, XSS, XML entity attacks and prevention 7.) Explain DNS Resolution process explained in detail starting from how you hit a web domain in browser toll resolution to loading of webpage including TCP handshake and SSL handshake 8) Explain resource recordset, DNS security , DNS amplification attacks and mitigation s, DNS security , DNS spoofing attacks MITM etc 9.) Explain HTTP versions request response flow , status codes 2xx , 3xx, 4xx, 5xx how they are used 10 ) different types of HTTP request methods suchs as GET, HEAD, PUT, POST, OPTIONS, HTTPS 1.1 and 2.0 and 3.0 differences 11.) How SSL handshake works using encryption TLS versions 1.2 , 1.1 , 1.3

Be the first one to answer
Add answer anonymously...
Akamai Technologies Security Architect Interview Questions
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter