🧩 1. General Cybersecurity Fundamentals
- What is the difference between a threat, a vulnerability, and a risk?
- Explain the CIA triad and how each element is applied in practice.
- What are the main types of security controls (preventive, detective, corrective)?
- What’s the difference between information security and cybersecurity?
- Explain the concept of defense in depth.
- What are zero-day vulnerabilities?
- What is the principle of least privilege (PoLP) and why is it important?
- What is the difference between authentication, authorization, and accounting (AAA)?
- Define security through obscurity — and is it a valid defense strategy?
- What’s the difference between active and passive reconnaissance?
🌐 2. Network Security
- How does a firewall work? Explain stateful vs stateless firewalls.
- What are the differences between IDS, IPS, and SIEM systems?
- What is port scanning and which tools are commonly used?
- What is ARP spoofing and how can it be prevented?
- How does DNS tunneling work and how can it be detected?
- Explain SSL/TLS handshake in detail.
- What is a VPN, and how does it secure data transmission?
- Describe TCP three-way handshake and its role in network security.
- What are SYN flood attacks and how can they be mitigated?
- How can you detect and prevent packet sniffing in a LAN?
💻 3. Application & Web Security
- What is the OWASP Top 10 and why is it important?
- Explain SQL Injection with an example payload.
- How does Cross-Site Scripting (XSS) work? What types exist?
- Explain Cross-Site Request Forgery (CSRF) and how to prevent it.
- What are HTTP security headers, and name five important ones.
- What are common session management vulnerabilities?
- How would you test for insecure direct object references (IDOR)?
- What is SSRF (Server-Side Request Forgery)?
- What’s the difference between CSP and CORS?
- How can Content Security Policy (CSP) mitigate XSS?
🔐 4. Cryptography
- What’s the difference between symmetric and asymmetric encryption?
- Explain how RSA encryption works at a high level.
- What is hashing and how does it differ from encryption?
- Why is salting important when storing passwords?
- Compare SHA-1, SHA-256, and bcrypt.
- What is digital signing and how is it verified?
- Explain the concept of Perfect Forward Secrecy (PFS).
- What’s the purpose of a certificate authority (CA)?
- How are SSL certificates validated in a browser?
- What is a man-in-the-middle attack in the context of TLS?
☁️ 5. Cloud, Containers, and DevSecOps
- What are shared responsibility models in cloud security?
- How do you secure Docker containers and Kubernetes clusters?
- What are IAM roles and policies in AWS?
- What’s the difference between security groups and NACLs in AWS?
- What are common misconfigurations in S3 buckets and their risks?
- What is runtime security in containers?
- How would you perform vulnerability scanning in CI/CD pipelines?
- What are secrets managers (like HashiCorp Vault or AWS Secrets Manager)?
- How can you prevent privilege escalation in Kubernetes?
- Explain how cloud workload protection platforms (CWPP) work.