Cyberspace security is a must! Hundreds of [network security, penetration testing, security services] interview question bank (with answer analysis)

foreword

        It’s another year of gold medals, three silver medals and four silver medals. Has the goal set last year been achieved? Has the salary increased? Did you find your girlfriend ?

        Okay, let’s not poke everyone’s heart, let’s get to the point.

        Before entering the network security industry, you must at least know common attacks and defense measures. At this golden opportunity, in order to better help everyone get high-paying jobs, today I will share with you hundreds of interview questions for network security engineers. offer!

Network protocol

  1. What are symmetric and asymmetric encryption?
  2. What is the Same Origin Policy?
  3. Where do cookies exist? can I open this?
  4. How does xss steal cookies?
  5. Is it possible to log in without a username and password if there is a cookie in xss?
  6. How to defend against xss?
  7. SYN attack principle
  8. What is Phishing?
  9. What is DDOS?
  10. What is a CC attack?
  11. How to troubleshoot after the web server has been compromised?
  12. What does the dll file mean and what is it used for?
  13. The role of HTTPs

Network Security (High Frequency Questions)

  1. Protect against common web attacks
  2. Important protocol distribution layer
  3. How the arp protocol works
  4. What is the rip protocol?
  5. How rip works What is RARP?
  6. Working principle of OSPF protocol?
  7. How OSPF works
  8. The difference between TCP and UDP
  9. Summary What is three-way handshake and four-way handshake?
  10. Why does tcp need a three-way handshake?
  11. What is dns?
  12. how dns works
  13. A complete HTTP request process
  14. The difference between cookies and sessions
  15. The difference between GET and POST
  16. The difference between HTTPS and HTTP
  17. How does the session work?
  18. The difference between http long connection and short connection
  19. What are the seven layers of the OSI model?
  20. How does the session work?
  21. What is TCP sticky packet/unpacket? cause?
  22. Solution How does TCP ensure reliable transmission?
  23. Difference Between URI and URL What is SSL?
  24. How does htps ensure the security of data transmission (how does SSL work to ensure security? What are the common status codes of the application layer protocol corresponding to TCP and the application layer protocol corresponding to UDP?
  25. What is SQL injection attack

penetration testing 

  1. What is WebShell?
  2. What is Phishing?
  3. What are the ways you acquire network security knowledge?
  4. What is a CC attack?
  5. How to troubleshoot after the web server has been compromised?
  6. What does the dll file mean and what is it for? DLL hijacking principle
  7. What is a 0day vulnerability?
  8. What does rootkit mean?
  9. What is a honeypot?
  10. What is ssh?
  11. What is DDOS?
  12. What is Stuxnet?
  13. Trojan horse in one sentence
  14. What is the role of HTTPS?
  15. Tips for Manually Finding Backdoor Trojans
  16. Describe the seven-layer structure of OSI (Basic Reference Model for Open Systems Interconnection)
  17. The difference between TCP and UDP?
  18. What is shelling?
  19. What is "human flesh search"?
  20. Fundamentals of SYN Flood
  21. What is a phone "jailbreak"?
  22. The host is hacked, how will you deal with this matter and check the solution yourself?
  23. What is the NAT (Network Address Translation) protocol?
  24. What is intranet penetration?
  25. What is a Virtual Private Network?
  26. What is a Layer 2 switch?
  27. What is Routing Technology?
  28. What is a Layer 3 switch?
  29. IPv6 address representation?
  30. Get a station to be tested, what do you think should be done first?
  31. What is the difference between mysql website injection above 5.0 and below 5.0?
  32. During the infiltration process, what is the value to us of collecting the email address of the registrant of the target station?
  33. What is the significance of judging the CMS of the website for penetration?
  34. A mature and relatively safe CMS, what is the meaning of scanning the directory when infiltrating?
  35. Common web server containers?
  36. Mysql injection point, use tools to directly write a sentence to the target station, what conditions are required?
  37. Which versions of the container are currently known to have parsing vulnerabilities, specific examples?
  38. How to manually quickly judge whether the target station is a windows or a linux server?
  39. Why is there only one port 80 open for a mysql database station?
  40. How many situations can 3389 fail to connect?
  41. How to break out of characters being escaped when injecting?
  42. What should I do first when I see an editor on a background news editing interface?
  43. Get a webshell and find that there is a .htaccess file in the root directory of the website, what can we do?
  44. Injection vulnerability can only check the account password?
  45. Will Security Dogs track variables and find out that it is a one-sentence Trojan horse?
  46. access Scan out the database files with the suffix asp, and access garbled characters. How to achieve local utilization?
  47. Choose a readable and writable directory when escalating privileges, why try not to use directories with spaces?
  48. A server has site A and B, why add a test user in the background of A to access the background of B. Found that the test user was also added?
  49. Is it possible to directly order by to start injection without using and or or or xor when injecting?
  50. An anti-injection system will prompt when injecting: The system has detected that you have illegal injection behavior. Your ip xx.xx.xx.xx time has been recorded: 2016:01-23 Submit page: test.asp?id=15 Submit content: and 1=1 How to use this anti-injection system to get shell?
  51. What are the solutions when accessing garbled characters after uploading Malaysia?
  52. What's the point of inspecting elements of an upload point?
  53. The target site prohibits registered users, just enter the user name in the password recovery field and prompt: "This user does not exist", how do you think this is used?
  54. The target station found that the download address of a txt is http://www.test.com/down/down.php?file=/upwdown/1.txt, what do you think?
  55. A gives you a target station, and tells you that there is a /abc/ directory under the root directory, and there are editor and admin directories under this directory. What are your thoughts?
  56. In the case of a shell, how to use xss to achieve long-term control of the target station?
  57. In the place where the administrator password is changed in the background, the original password is displayed as *. How do you think it will be possible to read out the user's password?
  58. The target site has no protection, uploaded pictures can be accessed normally, but the uploaded script format access is 403. What is the reason?
  59. Censorship Elements How do you feel about knowing the protection software a website uses?
  60. What is the purpose of creating a .zhongzi folder in the win2003 server?

Net interview 

  1. The function name of the JNI function in java is com.didi.security.main. What is the function name in C?
  2. Frida and the Xposed framework?
  3. How to use SSRF?
  4. Macro virus?
  5. APP packing
  6. Characteristics of ransomware Wanacry? Worms, Zombies
  7. In ARM32-bit instructions, which register is the return value and return address stored in?
  8. What technologies are used in the HTTPS handshake process?
  9. In the PHP environment in Linux, it is known that disable_functions=exec, passthrupopen, proc_open, shell_exec, system, please write two possible ways to execute arbitrary commands?
  10. What are the general steps of Android APP reverse analysis?

​​​​​​​

I hope these interview questions can help you avoid some detours in the interview and get the offer faster! 

It is said that those who like it are people who will make a lot of progress in the future~

Guess you like

Origin blog.csdn.net/m8330466/article/details/129759282
Recommended