Security Engineer

100+ Security Engineer Interview Questions and Answers

Updated 15 Feb 2025

Q51. what is oX in nmap?

Ans.

oX in nmap is used to specify the IP protocol number to use for scanning.

  • oX is followed by the protocol number (e.g. oX1 for ICMP protocol)

  • It can be used with other nmap options like -sS or -sU

  • It is useful for scanning non-standard protocols

Q52. How would you triage a security incident?

Ans.

Triage a security incident by assessing severity, containing the threat, and investigating the root cause.

  • Assess the severity of the incident based on impact and likelihood of exploitation.

  • Contain the threat by isolating affected systems, changing credentials, or blocking malicious traffic.

  • Investigate the root cause by analyzing logs, conducting forensics, and identifying vulnerabilities.

  • Prioritize response actions based on criticality and potential impact on the organization...read more

Q53. MDM tools and it's characteristics?

Ans.

MDM tools are used to manage and secure mobile devices in an organization.

  • MDM stands for Mobile Device Management.

  • These tools allow organizations to remotely manage and control mobile devices.

  • Characteristics of MDM tools include device enrollment, policy enforcement, app management, and remote wipe.

  • Examples of MDM tools include Microsoft Intune, VMware AirWatch, and MobileIron.

Q54. How Siem works Mitre attack framework Cyber kill chain Different types of attack

Ans.

SIEM works by collecting and analyzing security data to detect and respond to cyber threats. Mitre attack framework and Cyber kill chain are used to categorize and analyze attacks.

  • SIEM collects security data from various sources like logs, network traffic, and endpoints for analysis.

  • Mitre attack framework provides a structured way to categorize and analyze cyber threats based on tactics and techniques used by attackers.

  • Cyber kill chain breaks down the stages of a cyber attack...read more

Are these interview questions helpful?

Q55. List all the security solutions you are familiar with ?

Ans.

I am familiar with a variety of security solutions including firewalls, antivirus software, intrusion detection systems, encryption tools, and security information and event management (SIEM) systems.

  • Firewalls

  • Antivirus software

  • Intrusion detection systems

  • Encryption tools

  • Security information and event management (SIEM) systems

Q56. what is HTTP smuggling and how it works

Ans.

HTTP smuggling is a technique used to bypass security measures by manipulating the way HTTP requests are interpreted by intermediaries.

  • HTTP smuggling involves sending specially crafted HTTP requests that can be interpreted differently by different components in the communication chain

  • It can be used to bypass firewalls, web application firewalls, and other security measures

  • One example of HTTP smuggling is HTTP request smuggling, where an attacker sends a request that can be in...read more

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q57. Do you know Dynatrace, sumologic tools?

Ans.

Yes, I am familiar with Dynatrace and Sumo Logic tools.

  • I have experience using Dynatrace for application performance monitoring and management.

  • I have used Sumo Logic for log management and analytics.

  • I am proficient in setting up alerts, dashboards, and troubleshooting issues using these tools.

Q58. Lfi vs Rfi difference

Ans.

LFI allows an attacker to include files on a server through the web browser, while RFI allows an attacker to execute arbitrary code on a server.

  • LFI stands for Local File Inclusion, where an attacker can include files on a server using a vulnerable script.

  • RFI stands for Remote File Inclusion, where an attacker can execute arbitrary code on a server by including a remote file.

  • LFI is limited to files that are already present on the server, while RFI allows for remote code execut...read more

Security Engineer Jobs

Security Engineer, Application Security 2-3 years
Amazon India Software Dev Centre Pvt Ltd
4.1
Bangalore / Bengaluru
Engineer II - Security Engineering 3-6 years
Verizon Data Services India Pvt.Ltd
4.1
Chennai
RSM- Security Engineering 7-12 years
Foxconn
3.9
₹ 7 L/yr - ₹ 9 L/yr
Chennai

Q59. what are different types of protocols

Ans.

Protocols are a set of rules that govern the communication between devices or systems.

  • Transport Layer Protocols: TCP, UDP

  • Internet Layer Protocols: IP, ICMP

  • Application Layer Protocols: HTTP, FTP, SMTP

  • Routing Protocols: OSPF, BGP

  • Security Protocols: SSL/TLS, IPSec

Q60. How does dns works and different stages

Ans.

DNS translates domain names to IP addresses and vice versa.

  • DNS stands for Domain Name System.

  • It works by translating domain names to IP addresses and vice versa.

  • DNS has several stages including recursive and iterative queries, caching, and authoritative servers.

  • Recursive queries start at the root server and work their way down to the authoritative server for the domain.

  • Iterative queries start at the local DNS server and work their way up to the root server if necessary.

  • Cachin...read more

Q61. what are the types of cspm posture you worked

Ans.

I have worked with various types of CSPM postures including preventive, detective, corrective, and responsive.

  • Preventive CSPM posture focuses on proactively identifying and mitigating security risks before they occur.

  • Detective CSPM posture involves monitoring and detecting security incidents as they happen.

  • Corrective CSPM posture involves responding to security incidents and implementing necessary fixes.

  • Responsive CSPM posture focuses on recovering from security incidents and...read more

Q62. how to configure firewall from scratch

Ans.

To configure a firewall from scratch, you need to define rules, set up access control lists, configure NAT, and monitor traffic.

  • Define the purpose of the firewall and the network topology

  • Create rules to allow or block specific traffic based on IP addresses, ports, protocols, etc.

  • Set up access control lists to control traffic flow within the network

  • Configure Network Address Translation (NAT) to map internal IP addresses to external ones

  • Monitor firewall logs and traffic to ensu...read more

Q63. All bugs type and how to find them

Ans.

Various types of bugs and methods to find them

  • Common bugs include logic errors, syntax errors, and security vulnerabilities

  • Use debugging tools like breakpoints and logging to find bugs

  • Perform code reviews and testing to catch bugs early

  • Examples: buffer overflow, SQL injection, cross-site scripting

Q64. Practical pentest of vulnerable web application.

Ans.

Practical pentest involves identifying vulnerabilities in a web application and exploiting them to gain unauthorized access.

  • Conduct a thorough reconnaissance of the target application

  • Identify potential vulnerabilities such as SQL injection, cross-site scripting, and file inclusion

  • Exploit the vulnerabilities using tools such as Burp Suite and Metasploit

  • Document the findings and provide recommendations for remediation

  • Re-test the application after remediation to ensure all vulne...read more

Q65. What is sp3 architecture

Ans.

SP3 architecture is a security architecture designed to protect against malware attacks.

  • SP3 stands for Security Platform 3

  • It is a hardware-based security architecture

  • It is designed to protect against malware attacks by isolating critical system components

  • It is used in some Intel processors, such as the Intel Core i7

  • It provides a secure execution environment for sensitive applications

Q66. 1)Explain about pacli in Cyberark ?

Ans.

PACLI is a command-line interface tool provided by CyberArk to manage privileged accounts and credentials.

  • PACLI stands for Privileged Account Command Line Interface.

  • It allows users to perform various tasks related to privileged accounts and credentials such as adding, modifying, and deleting them.

  • PACLI can also be used to retrieve account information, generate reports, and perform password rotations.

  • It is a powerful tool that can be integrated with other CyberArk solutions su...read more

Q67. 2) How to on-board applications?

Ans.

Applications can be onboarded by following a structured process that includes identifying requirements, testing, and deployment.

  • Identify the requirements of the application and ensure that it meets the security standards.

  • Test the application thoroughly to identify any vulnerabilities or weaknesses.

  • Deploy the application in a controlled environment and monitor its performance.

  • Ensure that the application is integrated with the existing security infrastructure.

  • Provide training a...read more

Q68. What are the python libraries you use

Ans.

I primarily use the following Python libraries: requests, BeautifulSoup, pandas, numpy, scikit-learn, matplotlib.

  • requests: for making HTTP requests

  • BeautifulSoup: for web scraping

  • pandas: for data manipulation and analysis

  • numpy: for numerical computing

  • scikit-learn: for machine learning

  • matplotlib: for data visualization

Q69. Explain difference between router and switch

Ans.

Routers connect multiple networks together, while switches connect devices within a single network.

  • Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).

  • Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.

  • Routers are typically used to connect different networks, such as a home network to the internet, while switches are used to connect de...read more

Q70. Explain the concept of XSS.

Ans.

XSS stands for Cross-Site Scripting. It is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

  • XSS attacks can be used to steal sensitive information, such as login credentials or personal data.

  • Attackers can also use XSS to hijack user sessions, redirect users to malicious websites, or deface web pages.

  • XSS vulnerabilities can be prevented by properly sanitizing user input and using output encoding to prevent ...read more

Q71. What is subnetting, please explain

Ans.

Subnetting is the process of dividing a network into smaller subnetworks.

  • Subnetting helps in efficient utilization of IP addresses

  • It improves network performance and security

  • Subnetting is done by borrowing bits from the host portion of an IP address

  • Example: 192.168.1.0/24 can be subnetted into 192.168.1.0/25 and 192.168.1.128/25

Q72. Tell about you cspm tools you used

Ans.

I have experience with several CSPM tools.

  • I have used AWS Config to monitor and assess the configuration of AWS resources.

  • I am familiar with Azure Security Center, which provides continuous monitoring and threat detection for Azure resources.

  • I have worked with Google Cloud Security Command Center to gain visibility into security risks and vulnerabilities in Google Cloud Platform.

  • I have also used tools like CloudCheckr and Dome9 for multi-cloud security management and complian...read more

Q73. how to manipule two number

Ans.

Two numbers can be manipulated using mathematical operations such as addition, subtraction, multiplication, and division.

  • Addition: add the two numbers together

  • Subtraction: subtract one number from the other

  • Multiplication: multiply the two numbers together

  • Division: divide one number by the other

  • Modulo: find the remainder when one number is divided by the other

Q74. What is vulnerability management

Ans.

Vulnerability management is the practice of identifying, classifying, prioritizing, and mitigating security vulnerabilities in systems and software.

  • Identifying vulnerabilities in systems and software

  • Classifying vulnerabilities based on severity

  • Prioritizing vulnerabilities based on risk level

  • Mitigating vulnerabilities through patches or other security measures

Q75. how to multiply two number

Ans.

To multiply two numbers, you can use the multiplication operator (*) in most programming languages.

  • In Python: num1 * num2

  • In Java: num1 * num2

  • In JavaScript: num1 * num2

  • In C++: num1 * num2

  • In Ruby: num1 * num2

Q76. different stages of attack vectors

Ans.

Attack vectors have three stages: pre-attack, attack, and post-attack.

  • Pre-attack stage involves reconnaissance and gathering information about the target.

  • Attack stage involves exploiting vulnerabilities and gaining access to the target system.

  • Post-attack stage involves maintaining access, covering tracks, and exfiltrating data.

  • Examples of attack vectors include phishing, malware, social engineering, and physical attacks.

Q77. What is Routing please explain

Ans.

Routing is the process of selecting the best path for network traffic to travel from one network to another.

  • Routing involves analyzing network topology and determining the most efficient path for data to travel

  • Routing protocols such as OSPF and BGP are used to exchange routing information between routers

  • Routing tables are used to store information about network destinations and the best path to reach them

  • Routing can be static or dynamic, with dynamic routing adjusting to chan...read more

Q78. what is ssrf and csrf

Ans.

SSRF is a server-side attack that allows an attacker to make requests from the server. CSRF is a client-side attack that tricks a user into performing an action on a website.

  • SSRF stands for Server-Side Request Forgery

  • It allows an attacker to send requests from the server to other servers

  • This can be used to access internal systems or perform actions on behalf of the server

  • CSRF stands for Cross-Site Request Forgery

  • It tricks a user into performing an action on a website without ...read more

Q79. Different functionality of Burpsuite.

Ans.

Burpsuite is a web application security testing tool used for scanning, analyzing, and exploiting web applications.

  • Burpsuite can intercept and modify HTTP/S requests and responses

  • It can be used for scanning web applications for vulnerabilities

  • Burpsuite includes tools for spidering, scanning, and intruder attacks

  • It has a repeater tool for manually manipulating and re-sending requests

  • Burpsuite can be used for session handling and authentication testing

Q80. What is JWT and OAuth

Ans.

JWT is a compact, self-contained way to transmit information between parties as a JSON object. OAuth is an open standard for access delegation.

  • JWT stands for JSON Web Token and is used for securely transmitting information between parties as a JSON object.

  • JWTs consist of three parts: a header, a payload, and a signature.

  • OAuth is an open standard for access delegation, commonly used for authorization and authentication.

  • OAuth allows a user to grant a third-party application acc...read more

Q81. What is SCIM and OpenID

Ans.

SCIM is System for Cross-domain Identity Management and OpenID is an open standard for authentication.

  • SCIM is a protocol that allows for the automation of user provisioning and deprovisioning across different systems.

  • OpenID is a decentralized authentication protocol that allows users to log into multiple websites using a single set of credentials.

  • SCIM and OpenID are commonly used in identity and access management systems to streamline user management and authentication proces...read more

Q82. How does Firewall work

Ans.

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  • Acts as a barrier between a trusted internal network and untrusted external network

  • Filters traffic based on rules set by network administrators

  • Can be hardware-based or software-based

  • Can block or allow traffic based on IP addresses, ports, protocols, etc.

  • Examples include Cisco ASA, Palo Alto Networks, and pfSense

Q83. What is SAML flow?

Ans.

SAML flow is a process for exchanging authentication and authorization data between identity providers and service providers.

  • SAML flow involves the exchange of XML-based security assertions.

  • It typically includes steps such as authentication request, response, and validation.

  • SAML flow can be initiated by a user trying to access a service that requires authentication.

  • It helps establish trust between different systems by securely exchanging identity information.

Q84. BGP attributes and explain them

Ans.

BGP attributes are used to make routing decisions in Border Gateway Protocol.

  • AS_PATH: Lists the autonomous systems a route has passed through.

  • NEXT_HOP: Specifies the next hop IP address for a route.

  • LOCAL_PREF: Used to influence outbound traffic from an AS.

  • ORIGIN: Indicates how a route was learned (IGP, EGP, or Incomplete).

Q85. why cyber security?

Ans.

Passion for protecting data and systems from cyber threats.

  • Fascination with technology and computers from a young age

  • Desire to make a positive impact by safeguarding sensitive information

  • Constantly evolving field with new challenges and opportunities

  • Examples: Preventing data breaches, defending against malware attacks

Q86. Explain network subnetting with explain

Ans.

Subnetting is the process of dividing a network into smaller subnetworks to improve performance and security.

  • Subnetting involves creating multiple smaller networks within a larger network by dividing the IP address range.

  • It helps in reducing network congestion, improving security by isolating different departments or functions, and optimizing network performance.

  • Subnet masks are used to determine which part of an IP address belongs to the network and which part belongs to the...read more

Q87. What is threat modelling

Ans.

Threat modelling is a structured approach to identifying and prioritizing potential security threats to a system.

  • Involves identifying potential threats to a system

  • Prioritizing threats based on likelihood and impact

  • Helps in designing appropriate security controls

  • Common methodologies include STRIDE and DREAD

  • Example: Identifying potential threats to a web application such as SQL injection, cross-site scripting, etc.

Q88. Explain TCP three-way handshake method

Ans.

TCP three-way handshake is a method used to establish a connection between a client and a server in a TCP/IP network.

  • Client sends a SYN packet to the server to initiate the connection

  • Server responds with a SYN-ACK packet to acknowledge the request

  • Client sends an ACK packet back to the server to confirm the connection

  • Connection is now established and data transfer can begin

Q89. OWASP top 10 with mitigation

Ans.

OWASP top 10 is a list of common web application vulnerabilities. Mitigation involves implementing security controls to prevent or reduce the impact of these vulnerabilities.

  • Injection attacks can be mitigated by input validation and parameterized queries

  • Cross-site scripting (XSS) can be mitigated by input validation and output encoding

  • Broken authentication and session management can be mitigated by implementing strong password policies and session timeouts

  • Insecure direct obje...read more

Q90. Explain flows in OAUTH?

Ans.

OAUTH flows are different ways in which a client application can obtain authorization to access resources on behalf of a user.

  • Authorization Code Flow: Client exchanges an authorization code for an access token.

  • Implicit Flow: Client receives access token directly.

  • Client Credentials Flow: Client uses its own credentials to authenticate and receive access token.

  • Resource Owner Password Credentials Flow: Client collects user's credentials and exchanges them for access token.

Q91. Qualys API and usage of python

Ans.

Qualys API allows for automated security assessments and reporting, and can be accessed using Python for scripting and automation.

  • Qualys API provides endpoints for scanning, reporting, asset management, and more.

  • Python can be used to interact with the Qualys API by sending HTTP requests and handling responses.

  • Examples of using Qualys API with Python include automating vulnerability scans, retrieving scan reports, and managing assets.

Q92. Phase 1 msgs in ipsec

Ans.

Phase 1 messages in IPsec establish a secure channel for further communication.

  • Phase 1 negotiates the security parameters for the IPsec tunnel.

  • It establishes a secure channel using the Internet Key Exchange (IKE) protocol.

  • Phase 1 messages include SA proposal, key exchange, and authentication.

  • The negotiation process involves exchanging messages between the two endpoints.

  • Once Phase 1 is complete, Phase 2 can begin for actual data transmission.

Q93. Expectations from Wipro

Ans.

Expectations from Wipro include strong technical skills, ability to work in a team, adaptability to new technologies, and commitment to security best practices.

  • Strong technical skills in areas such as network security, cryptography, and secure coding practices

  • Ability to work effectively in a team environment, collaborating with colleagues and stakeholders

  • Adaptability to new technologies and willingness to continuously learn and improve

  • Commitment to security best practices, in...read more

Q94. What is DDos attack

Ans.

DDoS attack is a malicious attempt to disrupt normal traffic of a targeted server or network by overwhelming it with a flood of internet traffic.

  • DDoS stands for Distributed Denial of Service

  • Attackers use multiple compromised systems to flood the target with traffic

  • Goal is to make the target server or network unavailable to legitimate users

  • Common types include UDP flood, SYN flood, and HTTP flood

  • Examples: Mirai botnet attack on Dyn DNS in 2016, GitHub DDoS attack in 2018

Q95. What is sast dast

Ans.

SAST stands for Static Application Security Testing and DAST stands for Dynamic Application Security Testing.

  • SAST involves analyzing the application's source code for security vulnerabilities before it is compiled and deployed.

  • DAST involves testing the application while it is running to identify vulnerabilities from the outside.

  • SAST is more focused on finding potential security issues in the code itself, while DAST is more focused on identifying vulnerabilities in the running...read more

Q96. OSI Model and examples.

Ans.

The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

  • Layer 1 - Physical layer: Deals with physical connections and data transmission.

  • Layer 2 - Data link layer: Manages data frames and error detection.

  • Layer 3 - Network layer: Handles routing and logical addressing.

  • Layer 4 - Transport layer: Ensures end-to-end communication and error recovery.

  • Layer 5 - Session layer: Manages sessions between applica...read more

Q97. Networks ctf using nmap

Ans.

Networks CTF using Nmap involves using the Nmap tool to scan and analyze networks for vulnerabilities.

  • Use Nmap to scan for open ports, services running, and potential vulnerabilities on target machines.

  • Analyze the results of the Nmap scan to identify potential entry points for exploitation.

  • Utilize Nmap scripts and plugins to automate tasks and gather more detailed information about the network.

  • Practice on CTF platforms like Hack The Box or TryHackMe to improve your skills in ...read more

Q98. All the bugs classes

Ans.

There are various classes of bugs that can affect software security.

  • Buffer overflow

  • SQL injection

  • Cross-site scripting

  • Denial of service

  • Privilege escalation

Q99. Explain OS layer

Ans.

The OS layer is the software layer that manages hardware resources and provides a platform for running applications.

  • Manages hardware resources such as CPU, memory, and storage

  • Provides a platform for running applications and managing processes

  • Handles input/output operations and communication between hardware and software

  • Examples include Windows, macOS, Linux, iOS, Android

Q100. Explain Natting

Ans.

Natting stands for Network Address Translation, a process used to modify network address information in packet headers while in transit.

  • Natting allows multiple devices on a local network to share a single public IP address

  • Types of Natting include Static NAT, Dynamic NAT, and Port Address Translation (PAT)

  • Natting helps improve security by hiding internal IP addresses from external networks

  • Example: A company uses NAT to allow multiple internal devices to access the internet usi...read more

Previous
1
2
3
Next
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Interview experiences of popular companies

3.7
 • 10.4k Interviews
3.8
 • 8.1k Interviews
3.6
 • 7.5k Interviews
3.7
 • 5.6k Interviews
4.1
 • 5k Interviews
3.7
 • 328 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Security Engineer Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter