Security

All interview questions related to Security

42 Questions
5 Categories
4 Beginner10 Intermediate28 Advanced
Advertisement
📞 Phone Screen
SSL vs TLS
Beginner

What is the difference between SSL and TLS, and why is TLS preferred today?

2 minPhone
View Question
📞 Phone Screen
SSH Keys vs Password Authentication
Beginner

Why are SSH key pairs generally preferred over passwords for server access?

1 minPhone
View Question
📞 Phone Screen
Secrets Management in CI/CD
Intermediate

What are best practices for managing secrets (API keys, tokens) in CI/CD pipelines?

2 minPhone
View Question
📞 Phone Screen
Linux File Permissions Basics
Beginner

Explain the meaning of rwx for user, group, and others, and how chmod/chown modify permissions.

2 minPhone
View Question
📞 Phone Screen
Cloud Shared Responsibility Model
Intermediate

What is the cloud shared responsibility model and how do responsibilities differ between IaaS and SaaS?

2 minPhone
View Question
📞 Phone Screen
ConfigMap vs Secret in Kubernetes
Intermediate

What is the difference between a ConfigMap and a Secret in Kubernetes, and when do you use each?

2 minPhone
View Question
📞 Phone Screen
TLS Handshake Basics
Intermediate

Briefly describe the TLS handshake steps and how the client verifies the server.

2 minPhone
View Question
📞 Phone Screen
API Rate Limiting Basics
Intermediate

What is API rate limiting, why is it important, and how is it commonly implemented?

2 minPhone
View Question
📞 Phone Screen
OAuth2 vs SAML
Intermediate

Compare OAuth2 and SAML for authentication and authorization scenarios.

2 minPhone
View Question
🔬 Technical Deep Dive
Designing IAM Policies with Least Privilege in AWS
Advanced

Explain your approach for designing secure IAM policies following least-privilege principles. How would you audit and enforce them in production?

5 minTechnical
View Question
🔬 Technical Deep Dive
Securing CI/CD Pipelines for Production
Advanced

Explain how you would secure a CI/CD pipeline to protect against supply chain attacks and credential leaks.

5 minTechnical
View Question
🔬 Technical Deep Dive
Securing Container Runtimes
Advanced

How would you secure container runtimes (e.g., Docker, containerd) in production environments?

5 minTechnical
View Question
🔬 Technical Deep Dive
Multi-Tenant Architecture Design
Advanced

How would you design a secure and scalable multi-tenant SaaS application?

5 minTechnical
View Question
🔬 Technical Deep Dive
Securing Secrets in Cloud Environments
Advanced

How would you securely store and access application secrets in a cloud-native environment?

5 minTechnical
View Question
🔬 Technical Deep Dive
Securing Multi-Tenant Kubernetes Namespaces
Advanced

Design a secure multi-tenant Kubernetes setup. How do you isolate workloads and enforce policy across namespaces?

5 minTechnical
View Question
🔬 Technical Deep Dive
KMS and Envelope Encryption Design
Advanced

Explain how you would design application-layer encryption using a cloud KMS and envelope encryption for sensitive data.

5 minTechnical
View Question
🔬 Technical Deep Dive
Designing Secure Egress in Cloud VPCs
Advanced

How do you design outbound (egress) controls for workloads in private subnets without public IPs while maintaining least privilege?

5 minTechnical
View Question
🔬 Technical Deep Dive
eBPF-Based Observability and Security
Advanced

Describe how you would leverage eBPF for deep observability and runtime security in production Linux systems.

5 minTechnical
View Question
🔬 Technical Deep Dive
API Rate Limiting Strategy
Advanced

Describe how you would implement rate limiting in a large-scale API to protect against abuse while ensuring fairness.

5 minTechnical
View Question
🏗️ System Design
Design a URL Shortener (TinyURL)
Advanced

Design a globally available URL shortener like TinyURL/Bitly. Cover API design, key generation, storage, redirects, analytics, abuse prevention, and scalability.

45 minSystem-Design
View Question
🏗️ System Design
Design a Cloud File Storage Service (Dropbox-like)
Advanced

Design a secure cloud file storage and sync service with versioning, sharing, offline sync, and deduplication.

45 minSystem-Design
View Question
🏗️ System Design
Design a Video Streaming Platform
Advanced

Design a video streaming platform supporting uploads, transcoding, adaptive bitrate streaming (ABR), DRM, and global delivery.

45 minSystem-Design
View Question
🏗️ System Design
Design a Payment Processing Gateway
Advanced

Design a payment gateway supporting multiple processors, 3-D Secure, refunds, settlements, and PCI concerns.

45 minSystem-Design
View Question
🏗️ System Design
Design a Feature Flag Service
Intermediate

Design a low-latency feature flag platform with targeting rules, audit logs, and mobile/edge delivery.

30 minSystem-Design
View Question
🏗️ System Design
Design a GraphQL Gateway at Scale
Intermediate

Design a federated GraphQL gateway that composes multiple subgraphs, with caching, authorization, and schema evolution.

30 minSystem-Design
View Question
🏗️ System Design
Design an Online Code Execution Sandbox
Advanced

Design a judge/sandbox to safely compile and run untrusted code in multiple languages with resource limits and scaling.

45 minSystem-Design
View Question
🏗️ System Design
Design a Multi-Tenant SaaS Platform
Advanced

Design a SaaS platform with tenant isolation, noisy-neighbor controls, per-tenant config, and usage-based billing.

45 minSystem-Design
View Question
🏗️ System Design
Design an API Gateway / Edge Layer
Advanced

Design a multi-tenant API gateway that handles routing, auth, rate limiting, request/response transformations, canarying, and observability across regions.

45 minSystem-Design
View Question
🏗️ System Design
Design an IoT Telemetry Ingestion Platform
Advanced

Design a platform to ingest telemetry from millions of devices with intermittent connectivity, command/control, and fleet management.

45 minSystem-Design
View Question
🏗️ System Design
Design a Secrets Management & KMS Service
Advanced

Design a system for storing secrets and managing encryption keys with rotation, auditing, and fine-grained access control.

45 minSystem-Design
View Question
🏗️ System Design
Design a Blockchain Ledger System
Advanced

Design a blockchain ledger for financial transactions with consensus, immutability, and efficient query capabilities.

45 minSystem-Design
View Question
🏗️ System Design
Design a Content Delivery Network (CDN)
Advanced

Design a global CDN for static and dynamic content delivery, cache invalidation, SSL termination, and DDoS protection.

45 minSystem-Design
View Question
🏗️ System Design
Design a Healthcare Records System
Advanced

Design a HIPAA-compliant healthcare records platform with fine-grained access control, audit logs, and interoperability (HL7/FHIR).

45 minSystem-Design
View Question
🏗️ System Design
Design a Fraud Detection System
Advanced

Design a fraud detection system for online payments with real-time scoring, feature pipelines, and explainability.

45 minSystem-Design
View Question
🏗️ System Design
Design a Video Conferencing Platform
Advanced

Design a scalable video conferencing service like Zoom with low latency, adaptive quality, and security.

45 minSystem-Design
View Question
🏗️ System Design
Design an Online Gaming Platform
Advanced

Design a multiplayer online gaming platform with matchmaking, anti-cheat, and real-time state sync.

45 minSystem-Design
View Question
🔧 Troubleshooting Scenarios
Expired SSL Certificate
Beginner

Your production website is suddenly showing SSL errors for users. How do you troubleshoot and fix this?

5 minScenario
View Question
🔧 Troubleshooting Scenarios
Intermittent 401s Due to JWT/Clock Skew
Intermediate

Clients intermittently receive 401 Unauthorized even with valid JWTs. Walk through diagnosing and fixing the issue.

10 minScenario
View Question
🔧 Troubleshooting Scenarios
Service Mesh mTLS Certificate Rotation Failure
Advanced

After a certificate rotation, services in the mesh begin failing with 503s. How do you diagnose and restore traffic?

15 minScenario
View Question
🔧 Troubleshooting Scenarios
TLS Handshake Failures from Cipher Mismatch
Intermediate

After tightening TLS settings, some clients fail during handshake. How do you triage and restore compatibility without weakening security?

10 minScenario
View Question
🔧 Troubleshooting Scenarios
DNS Amplification DDoS Attack
Advanced

Your DNS servers are overloaded with suspicious traffic patterns resembling amplification. How do you detect, mitigate, and protect?

15 minScenario
View Question
🤝 Behavioral & Leadership
Coordinating During a Security Incident
Advanced

Tell me about a time you were involved in a security incident. How did you contain, communicate, and coordinate?

6 minBehavioral
View Question
Advertisement