Cloud Security Engineer Interview Questions
The definitive database for Cloud Security Professionals, covering Cloud Fundamentals, AWS/Azure/GCP Security, IAM, Network Security, Container Security (Kubernetes), and Incident Response.
Total Questions:580
Difficulty Levels:
BeginnerIntermediateAdvanced
0%
Overall Progress
0/580
Status
Problem
Level
2.What is the Shared Responsibility Model in cloud security?Easy
2.What is the Shared Responsibility Model in cloud security?
Easy
3.What is the difference between IaaS, PaaS, and SaaS security responsibilities?Easy
3.What is the difference between IaaS, PaaS, and SaaS security responsibilities?
Easy
4.What are the main cloud security challenges?Medium
4.What are the main cloud security challenges?
Medium
5.What is the CIA Triad in cloud security?Easy
5.What is the CIA Triad in cloud security?
Easy
6.What is Defense in Depth strategy?Medium
6.What is Defense in Depth strategy?
Medium
7.What is the principle of Least Privilege (PoLP)?Easy
7.What is the principle of Least Privilege (PoLP)?
Easy
8.What is Zero Trust Architecture?Hard
8.What is Zero Trust Architecture?
Hard
9.What is the difference between on-premise and cloud security?Medium
9.What is the difference between on-premise and cloud security?
Medium
10.What are the OWASP Cloud Top 10 risks?Hard
10.What are the OWASP Cloud Top 10 risks?
Hard
11.What is Cloud Security Posture Management (CSPM)?Medium
11.What is Cloud Security Posture Management (CSPM)?
Medium
12.What is Cloud Workload Protection Platform (CWPP)?Medium
12.What is Cloud Workload Protection Platform (CWPP)?
Medium
13.What is Cloud Access Security Broker (CASB)?Hard
13.What is Cloud Access Security Broker (CASB)?
Hard
14.What is the difference between CSPM and CWPP?Hard
14.What is the difference between CSPM and CWPP?
Hard
15.What is multi-cloud security strategy?Medium
15.What is multi-cloud security strategy?
Medium
16.What is hybrid cloud security?Medium
16.What is hybrid cloud security?
Medium
17.What is shadow IT and how do you detect it?Easy
17.What is shadow IT and how do you detect it?
Easy
18.What is cloud security compliance?Easy
18.What is cloud security compliance?
Easy
19.What are major compliance frameworks (SOC 2, ISO 27001, PCI-DSS)?Medium
19.What are major compliance frameworks (SOC 2, ISO 27001, PCI-DSS)?
Medium
20.What is GDPR and its impact on cloud security?Medium
20.What is GDPR and its impact on cloud security?
Medium
21.What is HIPAA compliance in cloud?Medium
21.What is HIPAA compliance in cloud?
Medium
22.What is data residency and sovereignty?Hard
22.What is data residency and sovereignty?
Hard
23.What is cloud security audit?Easy
23.What is cloud security audit?
Easy
24.What is penetration testing in cloud environments?Medium
24.What is penetration testing in cloud environments?
Medium
25.What is vulnerability management in cloud?Easy
25.What is vulnerability management in cloud?
Easy
26.What is cloud incident response?Medium
26.What is cloud incident response?
Medium
27.What is disaster recovery in cloud?Medium
27.What is disaster recovery in cloud?
Medium
28.What is business continuity planning for cloud?Hard
28.What is business continuity planning for cloud?
Hard
29.What is cloud backup strategy?Easy
29.What is cloud backup strategy?
Easy
30.What is immutable infrastructure?Hard
30.What is immutable infrastructure?
Hard
31.What is AWS Identity and Access Management (IAM)?Easy
31.What is AWS Identity and Access Management (IAM)?
Easy
32.What are IAM users, groups, and roles?Easy
32.What are IAM users, groups, and roles?
Easy
33.What is the difference between IAM user and IAM role?Medium
33.What is the difference between IAM user and IAM role?
Medium
34.What is IAM policy and its structure?Medium
34.What is IAM policy and its structure?
Medium
35.What is the difference between inline and managed policies?Medium
35.What is the difference between inline and managed policies?
Medium
36.What is AWS managed policy vs customer managed policy?Easy
36.What is AWS managed policy vs customer managed policy?
Easy
37.What is IAM policy evaluation logic?Hard
37.What is IAM policy evaluation logic?
Hard
38.What is explicit deny vs implicit deny?Medium
38.What is explicit deny vs implicit deny?
Medium
39.What is IAM permission boundary?Hard
39.What is IAM permission boundary?
Hard
40.What is service control policy (SCP) in AWS Organizations?Hard
40.What is service control policy (SCP) in AWS Organizations?
Hard
41.What is the difference between IAM policy and SCP?Hard
41.What is the difference between IAM policy and SCP?
Hard
42.What is cross-account access in AWS?Medium
42.What is cross-account access in AWS?
Medium
43.What is assume role in AWS?Medium
43.What is assume role in AWS?
Medium
44.What is IAM Access Analyzer?Medium
44.What is IAM Access Analyzer?
Medium
45.What is AWS Security Token Service (STS)?Medium
45.What is AWS Security Token Service (STS)?
Medium
46.What is temporary security credentials?Easy
46.What is temporary security credentials?
Easy
47.What is MFA (Multi-Factor Authentication) in AWS?Easy
47.What is MFA (Multi-Factor Authentication) in AWS?
Easy
48.What is IAM credential report?Easy
48.What is IAM credential report?
Easy
49.What is AWS Secrets Manager?Medium
49.What is AWS Secrets Manager?
Medium
50.What is AWS Systems Manager Parameter Store?Medium
50.What is AWS Systems Manager Parameter Store?
Medium
51.What is the difference between Secrets Manager and Parameter Store?Medium
51.What is the difference between Secrets Manager and Parameter Store?
Medium
52.What is AWS Key Management Service (KMS)?Easy
52.What is AWS Key Management Service (KMS)?
Easy
53.What is Customer Master Key (CMK)?Medium
53.What is Customer Master Key (CMK)?
Medium
54.What is the difference between AWS managed and customer managed keys?Medium
54.What is the difference between AWS managed and customer managed keys?
Medium
55.What is envelope encryption in AWS?Hard
55.What is envelope encryption in AWS?
Hard
56.What is KMS key rotation?Medium
56.What is KMS key rotation?
Medium
57.What is AWS CloudHSM?Hard
57.What is AWS CloudHSM?
Hard
58.What is the difference between KMS and CloudHSM?Hard
58.What is the difference between KMS and CloudHSM?
Hard
59.What is AWS Certificate Manager (ACM)?Easy
59.What is AWS Certificate Manager (ACM)?
Easy
60.What is AWS Security Hub?Medium
60.What is AWS Security Hub?
Medium
61.What is AWS GuardDuty?Medium
61.What is AWS GuardDuty?
Medium
62.What is AWS Macie?Medium
62.What is AWS Macie?
Medium
63.What is AWS Inspector?Medium
63.What is AWS Inspector?
Medium
64.What is the difference between GuardDuty and Inspector?Medium
64.What is the difference between GuardDuty and Inspector?
Medium
65.What is AWS Detective?Hard
65.What is AWS Detective?
Hard
66.What is AWS Config?Medium
66.What is AWS Config?
Medium
67.What is AWS Config Rules?Medium
67.What is AWS Config Rules?
Medium
68.What is AWS CloudTrail?Easy
68.What is AWS CloudTrail?
Easy
69.What is CloudTrail event history vs trail?Medium
69.What is CloudTrail event history vs trail?
Medium
70.What is CloudTrail Insights?Hard
70.What is CloudTrail Insights?
Hard
71.What is VPC (Virtual Private Cloud)?Easy
71.What is VPC (Virtual Private Cloud)?
Easy
72.What is subnet (public vs private)?Easy
72.What is subnet (public vs private)?
Easy
73.What is Internet Gateway vs NAT Gateway?Medium
73.What is Internet Gateway vs NAT Gateway?
Medium
74.What is Security Group in AWS?Easy
74.What is Security Group in AWS?
Easy
75.What is Network ACL (NACL)?Medium
75.What is Network ACL (NACL)?
Medium
76.What is the difference between Security Group and NACL?Medium
76.What is the difference between Security Group and NACL?
Medium
77.What is VPC Flow Logs?Medium
77.What is VPC Flow Logs?
Medium
78.What is VPC Peering?Medium
78.What is VPC Peering?
Medium
79.What is AWS Transit Gateway?Hard
79.What is AWS Transit Gateway?
Hard
80.What is AWS PrivateLink?Hard
80.What is AWS PrivateLink?
Hard
81.What is VPC Endpoint?Medium
81.What is VPC Endpoint?
Medium
82.What is the difference between Gateway Endpoint and Interface Endpoint?Hard
82.What is the difference between Gateway Endpoint and Interface Endpoint?
Hard
83.What is AWS WAF (Web Application Firewall)?Medium
83.What is AWS WAF (Web Application Firewall)?
Medium
84.What is AWS Shield (Standard vs Advanced)?Medium
84.What is AWS Shield (Standard vs Advanced)?
Medium
85.What is DDoS attack and how does Shield protect?Easy
85.What is DDoS attack and how does Shield protect?
Easy
86.What is AWS Firewall Manager?Hard
86.What is AWS Firewall Manager?
Hard
87.What is AWS Network Firewall?Hard
87.What is AWS Network Firewall?
Hard
88.What is S3 bucket security?Easy
88.What is S3 bucket security?
Easy
89.What is S3 encryption at rest?Easy
89.What is S3 encryption at rest?
Easy
90.What is S3 bucket policy vs IAM policy?Medium
90.What is S3 bucket policy vs IAM policy?
Medium
91.What is S3 bucket ACL?Easy
91.What is S3 bucket ACL?
Easy
92.What is S3 Block Public Access?Easy
92.What is S3 Block Public Access?
Easy
93.What is S3 encryption (SSE-S3, SSE-KMS, SSE-C)?Medium
93.What is S3 encryption (SSE-S3, SSE-KMS, SSE-C)?
Medium
94.What is S3 versioning for security?Easy
94.What is S3 versioning for security?
Easy
95.What is S3 MFA Delete?Medium
95.What is S3 MFA Delete?
Medium
96.What is S3 Object Lock?Hard
96.What is S3 Object Lock?
Hard
97.What is S3 Access Points?Hard
97.What is S3 Access Points?
Hard
98.What is S3 bucket logging?Easy
98.What is S3 bucket logging?
Easy
99.What is CloudFront security?Medium
99.What is CloudFront security?
Medium
100.What is Origin Access Identity (OAI)?Medium
100.What is Origin Access Identity (OAI)?
Medium
101.What is AWS Lambda security best practices?Medium
101.What is AWS Lambda security best practices?
Medium
102.What is Lambda execution role?Easy
102.What is Lambda execution role?
Easy
103.What is Lambda resource-based policy?Medium
103.What is Lambda resource-based policy?
Medium
104.What is Lambda environment variable encryption?Medium
104.What is Lambda environment variable encryption?
Medium
105.What is ECS/EKS security?Medium
105.What is ECS/EKS security?
Medium
106.What is ECR image scanning?Easy
106.What is ECR image scanning?
Easy
107.What is Kubernetes RBAC in EKS?Hard
107.What is Kubernetes RBAC in EKS?
Hard
108.What is pod security policy?Hard
108.What is pod security policy?
Hard
109.What is RDS security?Easy
109.What is RDS security?
Easy
110.What is RDS encryption at rest?Easy
110.What is RDS encryption at rest?
Easy
111.What is RDS encryption in transit?Medium
111.What is RDS encryption in transit?
Medium
112.What is RDS IAM authentication?Medium
112.What is RDS IAM authentication?
Medium
113.What is RDS automated backups encryption?Easy
113.What is RDS automated backups encryption?
Easy
114.What is DynamoDB encryption?Easy
114.What is DynamoDB encryption?
Easy
115.What is DynamoDB fine-grained access control?Hard
115.What is DynamoDB fine-grained access control?
Hard
116.What is AWS Cognito for authentication?Medium
116.What is AWS Cognito for authentication?
Medium
117.What is Cognito User Pool vs Identity Pool?Medium
117.What is Cognito User Pool vs Identity Pool?
Medium
118.What is AWS Single Sign-On (SSO)?Easy
118.What is AWS Single Sign-On (SSO)?
Easy
119.What is AWS Directory Service?Medium
119.What is AWS Directory Service?
Medium
120.What is AWS Resource Access Manager (RAM)?Medium
120.What is AWS Resource Access Manager (RAM)?
Medium
121.What is AWS Control Tower?Hard
121.What is AWS Control Tower?
Hard
122.What is AWS Landing Zone?Hard
122.What is AWS Landing Zone?
Hard
123.What is AWS Well-Architected Framework security pillar?Easy
123.What is AWS Well-Architected Framework security pillar?
Easy
124.What is AWS Trusted Advisor security checks?Easy
124.What is AWS Trusted Advisor security checks?
Easy
125.What is AWS Audit Manager?Medium
125.What is AWS Audit Manager?
Medium
126.What is AWS Artifact for compliance?Easy
126.What is AWS Artifact for compliance?
Easy
127.What is VPC Traffic Mirroring?Hard
127.What is VPC Traffic Mirroring?
Hard
128.What is AWS Systems Manager Session Manager?Medium
128.What is AWS Systems Manager Session Manager?
Medium
129.What is bastion host vs Session Manager?Medium
129.What is bastion host vs Session Manager?
Medium
130.What is IMDSv2 (Instance Metadata Service v2)?Hard
130.What is IMDSv2 (Instance Metadata Service v2)?
Hard
131.What is Azure Active Directory (Azure AD)?Easy
131.What is Azure Active Directory (Azure AD)?
Easy
132.What is the difference between Azure AD and on-premise AD?Medium
132.What is the difference between Azure AD and on-premise AD?
Medium
133.What is Azure AD tenant?Easy
133.What is Azure AD tenant?
Easy
134.What is Azure AD user vs service principal vs managed identity?Medium
134.What is Azure AD user vs service principal vs managed identity?
Medium
135.What is Azure RBAC (Role-Based Access Control)?Easy
135.What is Azure RBAC (Role-Based Access Control)?
Easy
136.What is the difference between Azure RBAC and Azure AD roles?Medium
136.What is the difference between Azure RBAC and Azure AD roles?
Medium
137.What is custom role in Azure?Medium
137.What is custom role in Azure?
Medium
138.What is Azure AD Conditional Access?Hard
138.What is Azure AD Conditional Access?
Hard
139.What is Azure AD Identity Protection?Hard
139.What is Azure AD Identity Protection?
Hard
140.What is Azure AD Privileged Identity Management (PIM)?Hard
140.What is Azure AD Privileged Identity Management (PIM)?
Hard
141.What is just-in-time (JIT) access in Azure?Medium
141.What is just-in-time (JIT) access in Azure?
Medium
142.What is Azure MFA (Multi-Factor Authentication)?Easy
142.What is Azure MFA (Multi-Factor Authentication)?
Easy
143.What is Azure AD B2B vs B2C?Medium
143.What is Azure AD B2B vs B2C?
Medium
144.What is Azure Key Vault?Easy
144.What is Azure Key Vault?
Easy
145.What is Key Vault secrets, keys, and certificates?Easy
145.What is Key Vault secrets, keys, and certificates?
Easy
146.What is Key Vault access policies vs RBAC?Medium
146.What is Key Vault access policies vs RBAC?
Medium
147.What is Azure Managed Identity?Medium
147.What is Azure Managed Identity?
Medium
148.What is system-assigned vs user-assigned managed identity?Medium
148.What is system-assigned vs user-assigned managed identity?
Medium
149.What is Azure Storage security?Medium
149.What is Azure Storage security?
Medium
150.What is Azure Storage Account access keys?Easy
150.What is Azure Storage Account access keys?
Easy
151.What is Shared Access Signature (SAS)?Medium
151.What is Shared Access Signature (SAS)?
Medium
152.What is service SAS vs account SAS vs user delegation SAS?Hard
152.What is service SAS vs account SAS vs user delegation SAS?
Hard
153.What is Azure Storage encryption?Easy
153.What is Azure Storage encryption?
Easy
154.What is customer-managed keys (CMK) in Azure?Medium
154.What is customer-managed keys (CMK) in Azure?
Medium
155.What is Azure Storage Firewall?Easy
155.What is Azure Storage Firewall?
Easy
156.What is Azure Private Endpoint?Medium
156.What is Azure Private Endpoint?
Medium
157.What is Azure Virtual Network (VNet)?Easy
157.What is Azure Virtual Network (VNet)?
Easy
158.What is Network Security Group (NSG)?Easy
158.What is Network Security Group (NSG)?
Easy
159.What is Application Security Group (ASG)?Medium
159.What is Application Security Group (ASG)?
Medium
160.What is Azure Firewall?Medium
160.What is Azure Firewall?
Medium
161.What is Azure Web Application Firewall (WAF)?Medium
161.What is Azure Web Application Firewall (WAF)?
Medium
162.What is Azure DDoS Protection?Easy
162.What is Azure DDoS Protection?
Easy
163.What is Azure Bastion?Easy
163.What is Azure Bastion?
Easy
164.What is Azure VPN Gateway?Medium
164.What is Azure VPN Gateway?
Medium
165.What is Azure ExpressRoute?Hard
165.What is Azure ExpressRoute?
Hard
166.What is VNet peering?Easy
166.What is VNet peering?
Easy
167.What is Service Endpoint vs Private Endpoint?Hard
167.What is Service Endpoint vs Private Endpoint?
Hard
168.What is Azure Security Center (Defender for Cloud)?Easy
168.What is Azure Security Center (Defender for Cloud)?
Easy
169.What is Microsoft Defender for Cloud?Medium
169.What is Microsoft Defender for Cloud?
Medium
170.What is Defender for Cloud security posture management?Easy
170.What is Defender for Cloud security posture management?
Easy
171.What is Defender for Cloud workload protection?Medium
171.What is Defender for Cloud workload protection?
Medium
172.What is secure score in Defender for Cloud?Easy
172.What is secure score in Defender for Cloud?
Easy
173.What is Azure Sentinel?Hard
173.What is Azure Sentinel?
Hard
174.What is SIEM vs SOAR?Hard
174.What is SIEM vs SOAR?
Hard
175.What is Azure Monitor and Log Analytics?Medium
175.What is Azure Monitor and Log Analytics?
Medium
176.What is Azure Policy?Medium
176.What is Azure Policy?
Medium
177.What is Azure Blueprint?Hard
177.What is Azure Blueprint?
Hard
178.What is Azure Compliance Manager?Medium
178.What is Azure Compliance Manager?
Medium
179.What is Azure Information Protection (AIP)?Hard
179.What is Azure Information Protection (AIP)?
Hard
180.What is data classification in Azure?Medium
180.What is data classification in Azure?
Medium
181.What is Google Cloud IAM?Easy
181.What is Google Cloud IAM?
Easy
182.What is GCP identity (user, service account, group)?Easy
182.What is GCP identity (user, service account, group)?
Easy
183.What is GCP role (primitive, predefined, custom)?Medium
183.What is GCP role (primitive, predefined, custom)?
Medium
184.What is the difference between primitive and predefined roles?Easy
184.What is the difference between primitive and predefined roles?
Easy
185.What is IAM policy in GCP?Medium
185.What is IAM policy in GCP?
Medium
186.What is IAM conditions?Hard
186.What is IAM conditions?
Hard
187.What is service account in GCP?Easy
187.What is service account in GCP?
Easy
188.What is service account keys vs impersonation?Hard
188.What is service account keys vs impersonation?
Hard
189.What is workload identity in GKE?Hard
189.What is workload identity in GKE?
Hard
190.What is Google Cloud Identity?Easy
190.What is Google Cloud Identity?
Easy
191.What is Context-Aware Access?Hard
191.What is Context-Aware Access?
Hard
192.What is Cloud KMS (Key Management Service)?Easy
192.What is Cloud KMS (Key Management Service)?
Easy
193.What is Cloud HSM in GCP?Hard
193.What is Cloud HSM in GCP?
Hard
194.What is Secret Manager in GCP?Easy
194.What is Secret Manager in GCP?
Easy
195.What is VPC in GCP?Medium
195.What is VPC in GCP?
Medium
196.What is GCP Firewall Rules?Easy
196.What is GCP Firewall Rules?
Easy
197.What is VPC Service Controls?Hard
197.What is VPC Service Controls?
Hard
198.What is Private Google Access?Medium
198.What is Private Google Access?
Medium
199.What is Cloud NAT?Easy
199.What is Cloud NAT?
Easy
200.What is Cloud VPN vs Cloud Interconnect?Medium
200.What is Cloud VPN vs Cloud Interconnect?
Medium
201.What is Cloud Armor (DDoS and WAF)?Medium
201.What is Cloud Armor (DDoS and WAF)?
Medium
202.What is Cloud CDN security?Medium
202.What is Cloud CDN security?
Medium
203.What is Identity-Aware Proxy (IAP)?Hard
203.What is Identity-Aware Proxy (IAP)?
Hard
204.What is Binary Authorization?Hard
204.What is Binary Authorization?
Hard
205.What is Container Analysis?Medium
205.What is Container Analysis?
Medium
206.What is GKE security best practices?Medium
206.What is GKE security best practices?
Medium
207.What is Shielded GKE Nodes?Medium
207.What is Shielded GKE Nodes?
Medium
208.What is Cloud Security Command Center (SCC)?Medium
208.What is Cloud Security Command Center (SCC)?
Medium
209.What is Security Health Analytics?Medium
209.What is Security Health Analytics?
Medium
210.What is Event Threat Detection?Hard
210.What is Event Threat Detection?
Hard
211.What is Web Security Scanner?Easy
211.What is Web Security Scanner?
Easy
212.What is Cloud DLP (Data Loss Prevention)?Medium
212.What is Cloud DLP (Data Loss Prevention)?
Medium
213.What is Cloud Logging (formerly Stackdriver)?Easy
213.What is Cloud Logging (formerly Stackdriver)?
Easy
214.What is Cloud Audit Logs?Medium
214.What is Cloud Audit Logs?
Medium
215.What is Access Transparency?Hard
215.What is Access Transparency?
Hard
216.What is Identity and Access Management (IAM)?Easy
216.What is Identity and Access Management (IAM)?
Easy
217.What is authentication vs authorization?Easy
217.What is authentication vs authorization?
Easy
218.What is Single Sign-On (SSO)?Easy
218.What is Single Sign-On (SSO)?
Easy
219.What is SAML (Security Assertion Markup Language)?Medium
219.What is SAML (Security Assertion Markup Language)?
Medium
220.What is OAuth 2.0?Medium
220.What is OAuth 2.0?
Medium
221.What is OpenID Connect (OIDC)?Medium
221.What is OpenID Connect (OIDC)?
Medium
222.What is the difference between OAuth and OIDC?Hard
222.What is the difference between OAuth and OIDC?
Hard
223.What is JWT (JSON Web Token)?Medium
223.What is JWT (JSON Web Token)?
Medium
224.What is federated identity?Medium
224.What is federated identity?
Medium
225.What is identity provider (IdP)?Easy
225.What is identity provider (IdP)?
Easy
226.What is multi-factor authentication (MFA)?Easy
226.What is multi-factor authentication (MFA)?
Easy
227.What are MFA methods (SMS, authenticator app, hardware token)?Easy
227.What are MFA methods (SMS, authenticator app, hardware token)?
Easy
228.What is passwordless authentication?Medium
228.What is passwordless authentication?
Medium
229.What is certificate-based authentication?Medium
229.What is certificate-based authentication?
Medium
230.What is role-based access control (RBAC)?Easy
230.What is role-based access control (RBAC)?
Easy
231.What is attribute-based access control (ABAC)?Hard
231.What is attribute-based access control (ABAC)?
Hard
232.What is policy-based access control (PBAC)?Hard
232.What is policy-based access control (PBAC)?
Hard
233.What is privileged access management (PAM)?Medium
233.What is privileged access management (PAM)?
Medium
234.What is credential rotation?Easy
234.What is credential rotation?
Easy
235.What is access review and certification?Medium
235.What is access review and certification?
Medium
236.What is orphaned account detection?Medium
236.What is orphaned account detection?
Medium
237.What is service account management?Medium
237.What is service account management?
Medium
238.What is API key management?Easy
238.What is API key management?
Easy
239.What is secrets management?Easy
239.What is secrets management?
Easy
240.What is HashiCorp Vault?Hard
240.What is HashiCorp Vault?
Hard
241.What is CyberArk for PAM?Hard
241.What is CyberArk for PAM?
Hard
242.What is Okta for identity management?Easy
242.What is Okta for identity management?
Easy
243.What is Azure AD vs Okta?Medium
243.What is Azure AD vs Okta?
Medium
244.What is network segmentation?Easy
244.What is network segmentation?
Easy
245.What is micro-segmentation?Hard
245.What is micro-segmentation?
Hard
246.What is East-West vs North-South traffic?Medium
246.What is East-West vs North-South traffic?
Medium
247.What is subnet isolation?Easy
247.What is subnet isolation?
Easy
248.What is VLAN in cloud context?Easy
248.What is VLAN in cloud context?
Easy
249.What is firewall in cloud?Easy
249.What is firewall in cloud?
Easy
250.What is stateful vs stateless firewall?Medium
250.What is stateful vs stateless firewall?
Medium
251.What is next-generation firewall (NGFW)?Medium
251.What is next-generation firewall (NGFW)?
Medium
252.What is intrusion detection system (IDS)?Easy
252.What is intrusion detection system (IDS)?
Easy
253.What is intrusion prevention system (IPS)?Medium
253.What is intrusion prevention system (IPS)?
Medium
254.What is the difference between IDS and IPS?Easy
254.What is the difference between IDS and IPS?
Easy
255.What is network-based IDS (NIDS) vs host-based IDS (HIDS)?Medium
255.What is network-based IDS (NIDS) vs host-based IDS (HIDS)?
Medium
256.What is Snort IDS?Medium
256.What is Snort IDS?
Medium
257.What is Suricata IDS?Hard
257.What is Suricata IDS?
Hard
258.What is web application firewall (WAF)?Easy
258.What is web application firewall (WAF)?
Easy
259.What is ModSecurity?Medium
259.What is ModSecurity?
Medium
260.What is OWASP Core Rule Set (CRS)?Medium
260.What is OWASP Core Rule Set (CRS)?
Medium
261.What is DDoS attack and types?Easy
261.What is DDoS attack and types?
Easy
262.What is volumetric attack?Medium
262.What is volumetric attack?
Medium
263.What is protocol attack?Hard
263.What is protocol attack?
Hard
264.What is application layer attack?Hard
264.What is application layer attack?
Hard
265.What is rate limiting?Easy
265.What is rate limiting?
Easy
266.What is geo-blocking?Easy
266.What is geo-blocking?
Easy
267.What is IP whitelisting vs blacklisting?Easy
267.What is IP whitelisting vs blacklisting?
Easy
268.What is CDN security?Medium
268.What is CDN security?
Medium
269.What is DNS security?Medium
269.What is DNS security?
Medium
270.What is DNSSEC?Hard
270.What is DNSSEC?
Hard
271.What is DNS over HTTPS (DoH)?Hard
271.What is DNS over HTTPS (DoH)?
Hard
272.What is DNS tunneling attack?Hard
272.What is DNS tunneling attack?
Hard
273.What is VPN (Virtual Private Network)?Easy
273.What is VPN (Virtual Private Network)?
Easy
274.What is site-to-site VPN vs client VPN?Medium
274.What is site-to-site VPN vs client VPN?
Medium
275.What is IPsec VPN?Medium
275.What is IPsec VPN?
Medium
276.What is SSL/TLS VPN?Medium
276.What is SSL/TLS VPN?
Medium
277.What is WireGuard VPN?Medium
277.What is WireGuard VPN?
Medium
278.What is VPN split tunneling?Medium
278.What is VPN split tunneling?
Medium
279.What is SD-WAN security?Hard
279.What is SD-WAN security?
Hard
280.What is network traffic analysis (NTA)?Medium
280.What is network traffic analysis (NTA)?
Medium
281.What is packet capture and analysis?Medium
281.What is packet capture and analysis?
Medium
282.What is Wireshark?Easy
282.What is Wireshark?
Easy
283.What is tcpdump?Easy
283.What is tcpdump?
Easy
284.What is NetFlow vs sFlow?Hard
284.What is NetFlow vs sFlow?
Hard
285.What is network anomaly detection?Medium
285.What is network anomaly detection?
Medium
286.What is lateral movement detection?Hard
286.What is lateral movement detection?
Hard
287.What is command and control (C2) detection?Hard
287.What is command and control (C2) detection?
Hard
288.What is network access control (NAC)?Medium
288.What is network access control (NAC)?
Medium
289.What is 802.1X authentication?Hard
289.What is 802.1X authentication?
Hard
290.What is port security?Easy
290.What is port security?
Easy
291.What is MAC address filtering?Easy
291.What is MAC address filtering?
Easy
292.What is ARP spoofing and prevention?Hard
292.What is ARP spoofing and prevention?
Hard
293.What is VLAN hopping attack?Hard
293.What is VLAN hopping attack?
Hard
294.What is data at rest encryption?Easy
294.What is data at rest encryption?
Easy
295.What is data in transit encryption?Easy
295.What is data in transit encryption?
Easy
296.What is data in use encryption?Hard
296.What is data in use encryption?
Hard
297.What is symmetric encryption vs asymmetric encryption?Medium
297.What is symmetric encryption vs asymmetric encryption?
Medium
298.What is AES encryption?Easy
298.What is AES encryption?
Easy
299.What is RSA encryption?Medium
299.What is RSA encryption?
Medium
300.What is encryption key size (128-bit, 256-bit)?Easy
300.What is encryption key size (128-bit, 256-bit)?
Easy
301.What is encryption algorithm (AES-128, AES-256)?Medium
301.What is encryption algorithm (AES-128, AES-256)?
Medium
302.What is TLS/SSL protocol?Easy
302.What is TLS/SSL protocol?
Easy
303.What is TLS 1.2 vs TLS 1.3?Medium
303.What is TLS 1.2 vs TLS 1.3?
Medium
304.What is SSL/TLS certificate?Easy
304.What is SSL/TLS certificate?
Easy
305.What is public key infrastructure (PKI)?Hard
305.What is public key infrastructure (PKI)?
Hard
306.What is certificate authority (CA)?Easy
306.What is certificate authority (CA)?
Easy
307.What is self-signed certificate vs CA-signed certificate?Easy
307.What is self-signed certificate vs CA-signed certificate?
Easy
308.What is certificate chain of trust?Medium
308.What is certificate chain of trust?
Medium
309.What is certificate revocation (CRL, OCSP)?Hard
309.What is certificate revocation (CRL, OCSP)?
Hard
310.What is certificate pinning?Hard
310.What is certificate pinning?
Hard
311.What is perfect forward secrecy (PFS)?Hard
311.What is perfect forward secrecy (PFS)?
Hard
312.What is hashing vs encryption?Easy
312.What is hashing vs encryption?
Easy
313.What is SHA-256, SHA-384, SHA-512?Easy
313.What is SHA-256, SHA-384, SHA-512?
Easy
314.What is MD5 and why is it insecure?Easy
314.What is MD5 and why is it insecure?
Easy
315.What is salted hash?Medium
315.What is salted hash?
Medium
316.What is HMAC (Hash-based Message Authentication Code)?Hard
316.What is HMAC (Hash-based Message Authentication Code)?
Hard
317.What is digital signature?Medium
317.What is digital signature?
Medium
318.What is code signing certificate?Medium
318.What is code signing certificate?
Medium
319.What is tokenization?Medium
319.What is tokenization?
Medium
320.What is data masking?Easy
320.What is data masking?
Easy
321.What is data anonymization vs pseudonymization?Medium
321.What is data anonymization vs pseudonymization?
Medium
322.What is PII (Personally Identifiable Information)?Easy
322.What is PII (Personally Identifiable Information)?
Easy
323.What is PHI (Protected Health Information)?Easy
323.What is PHI (Protected Health Information)?
Easy
324.What is PCI-DSS data protection requirements?Medium
324.What is PCI-DSS data protection requirements?
Medium
325.What is key management lifecycle?Medium
325.What is key management lifecycle?
Medium
326.What is key generation?Easy
326.What is key generation?
Easy
327.What is key storage security?Medium
327.What is key storage security?
Medium
328.What is key rotation?Easy
328.What is key rotation?
Easy
329.What is key destruction?Medium
329.What is key destruction?
Medium
330.What is bring your own key (BYOK)?Hard
330.What is bring your own key (BYOK)?
Hard
331.What is hold your own key (HYOK)?Hard
331.What is hold your own key (HYOK)?
Hard
332.What is customer-managed encryption key (CMEK)?Medium
332.What is customer-managed encryption key (CMEK)?
Medium
333.What is envelope encryption?Hard
333.What is envelope encryption?
Hard
334.What is database encryption (TDE)?Medium
334.What is database encryption (TDE)?
Medium
335.What is column-level encryption?Medium
335.What is column-level encryption?
Medium
336.What is field-level encryption?Hard
336.What is field-level encryption?
Hard
337.What is application-level encryption?Hard
337.What is application-level encryption?
Hard
338.What is end-to-end encryption?Medium
338.What is end-to-end encryption?
Medium
339.What is email encryption (S/MIME, PGP)?Medium
339.What is email encryption (S/MIME, PGP)?
Medium
340.What is full disk encryption?Easy
340.What is full disk encryption?
Easy
341.What is file-level encryption?Easy
341.What is file-level encryption?
Easy
342.What is encrypted backup?Easy
342.What is encrypted backup?
Easy
343.What is secure key exchange (Diffie-Hellman)?Hard
343.What is secure key exchange (Diffie-Hellman)?
Hard
344.What is container security?Easy
344.What is container security?
Easy
345.What is Docker security best practices?Medium
345.What is Docker security best practices?
Medium
346.What is container image scanning?Easy
346.What is container image scanning?
Easy
347.What is vulnerability scanning for containers?Easy
347.What is vulnerability scanning for containers?
Easy
348.What is Trivy for container scanning?Medium
348.What is Trivy for container scanning?
Medium
349.What is Clair for image scanning?Medium
349.What is Clair for image scanning?
Medium
350.What is Anchore for container security?Medium
350.What is Anchore for container security?
Medium
351.What is base image security?Easy
351.What is base image security?
Easy
352.What is minimal base image (distroless, Alpine)?Medium
352.What is minimal base image (distroless, Alpine)?
Medium
353.What is container registry security?Easy
353.What is container registry security?
Easy
354.What is private container registry?Easy
354.What is private container registry?
Easy
355.What is container image signing?Medium
355.What is container image signing?
Medium
356.What is Docker Content Trust?Medium
356.What is Docker Content Trust?
Medium
357.What is container runtime security?Hard
357.What is container runtime security?
Hard
358.What is container isolation?Medium
358.What is container isolation?
Medium
359.What is container escape attack?Hard
359.What is container escape attack?
Hard
360.What is privileged container risk?Medium
360.What is privileged container risk?
Medium
361.What is container capabilities?Hard
361.What is container capabilities?
Hard
362.What is seccomp profile?Hard
362.What is seccomp profile?
Hard
363.What is AppArmor for containers?Medium
363.What is AppArmor for containers?
Medium
364.What is SELinux for containers?Hard
364.What is SELinux for containers?
Hard
365.What is Kubernetes security architecture?Medium
365.What is Kubernetes security architecture?
Medium
366.What is Kubernetes RBAC?Medium
366.What is Kubernetes RBAC?
Medium
367.What is Kubernetes service account?Easy
367.What is Kubernetes service account?
Easy
368.What is Kubernetes namespace isolation?Easy
368.What is Kubernetes namespace isolation?
Easy
369.What is Kubernetes network policy?Medium
369.What is Kubernetes network policy?
Medium
370.What is pod security policy (PSP)?Medium
370.What is pod security policy (PSP)?
Medium
371.What is pod security standards (baseline, restricted)?Medium
371.What is pod security standards (baseline, restricted)?
Medium
372.What is pod security admission controller?Hard
372.What is pod security admission controller?
Hard
373.What is Kubernetes secrets management?Easy
373.What is Kubernetes secrets management?
Easy
374.What is external secrets operator?Hard
374.What is external secrets operator?
Hard
375.What is Kubernetes API server security?Hard
375.What is Kubernetes API server security?
Hard
376.What is admission controller in Kubernetes?Hard
376.What is admission controller in Kubernetes?
Hard
377.What is validating admission webhook?Hard
377.What is validating admission webhook?
Hard
378.What is mutating admission webhook?Hard
378.What is mutating admission webhook?
Hard
379.What is OPA (Open Policy Agent) Gatekeeper?Hard
379.What is OPA (Open Policy Agent) Gatekeeper?
Hard
380.What is Kyverno for Kubernetes?Hard
380.What is Kyverno for Kubernetes?
Hard
381.What is Falco for runtime security?Hard
381.What is Falco for runtime security?
Hard
382.What is Kubernetes audit logging?Medium
382.What is Kubernetes audit logging?
Medium
383.What is Kubernetes security scanning?Medium
383.What is Kubernetes security scanning?
Medium
384.What is kube-bench for CIS benchmarks?Medium
384.What is kube-bench for CIS benchmarks?
Medium
385.What is kube-hunter for penetration testing?Hard
385.What is kube-hunter for penetration testing?
Hard
386.What is service mesh security?Medium
386.What is service mesh security?
Medium
387.What is Istio security features?Hard
387.What is Istio security features?
Hard
388.What is mutual TLS (mTLS) in service mesh?Medium
388.What is mutual TLS (mTLS) in service mesh?
Medium
389.What is Linkerd security?Medium
389.What is Linkerd security?
Medium
390.What is ingress controller security?Medium
390.What is ingress controller security?
Medium
391.What is egress filtering in Kubernetes?Hard
391.What is egress filtering in Kubernetes?
Hard
392.What is Kubernetes threat modeling?Hard
392.What is Kubernetes threat modeling?
Hard
393.What is supply chain security for Kubernetes?Hard
393.What is supply chain security for Kubernetes?
Hard
394.What is Security Information and Event Management (SIEM)?Easy
394.What is Security Information and Event Management (SIEM)?
Easy
395.What is Security Orchestration, Automation and Response (SOAR)?Hard
395.What is Security Orchestration, Automation and Response (SOAR)?
Hard
396.What is the difference between SIEM and SOAR?Medium
396.What is the difference between SIEM and SOAR?
Medium
397.What is log aggregation?Easy
397.What is log aggregation?
Easy
398.What is log correlation?Medium
398.What is log correlation?
Medium
399.What is security event monitoring?Easy
399.What is security event monitoring?
Easy
400.What is threat intelligence?Medium
400.What is threat intelligence?
Medium
401.What is indicators of compromise (IOC)?Easy
401.What is indicators of compromise (IOC)?
Easy
402.What is threat hunting?Hard
402.What is threat hunting?
Hard
403.What is user and entity behavior analytics (UEBA)?Hard
403.What is user and entity behavior analytics (UEBA)?
Hard
404.What is anomaly detection?Medium
404.What is anomaly detection?
Medium
405.What is baseline security monitoring?Easy
405.What is baseline security monitoring?
Easy
406.What is security alerting?Easy
406.What is security alerting?
Easy
407.What is alert fatigue and how to reduce it?Medium
407.What is alert fatigue and how to reduce it?
Medium
408.What is alert tuning?Medium
408.What is alert tuning?
Medium
409.What is false positive vs false negative?Easy
409.What is false positive vs false negative?
Easy
410.What is security incident?Easy
410.What is security incident?
Easy
411.What is security event vs incident?Medium
411.What is security event vs incident?
Medium
412.What is incident severity classification?Easy
412.What is incident severity classification?
Easy
413.What is incident response plan (IRP)?Easy
413.What is incident response plan (IRP)?
Easy
414.What is incident response lifecycle (NIST framework)?Medium
414.What is incident response lifecycle (NIST framework)?
Medium
415.What is preparation phase in incident response?Medium
415.What is preparation phase in incident response?
Medium
416.What is detection and analysis phase?Medium
416.What is detection and analysis phase?
Medium
417.What is containment phase?Medium
417.What is containment phase?
Medium
418.What is eradication phase?Medium
418.What is eradication phase?
Medium
419.What is recovery phase?Medium
419.What is recovery phase?
Medium
420.What is post-incident activity (lessons learned)?Easy
420.What is post-incident activity (lessons learned)?
Easy
421.What is incident response team roles?Medium
421.What is incident response team roles?
Medium
422.What is security playbook?Easy
422.What is security playbook?
Easy
423.What is runbook for security incidents?Medium
423.What is runbook for security incidents?
Medium
424.What is security incident communication plan?Hard
424.What is security incident communication plan?
Hard
425.What is breach notification requirements?Medium
425.What is breach notification requirements?
Medium
426.What is forensics investigation?Hard
426.What is forensics investigation?
Hard
427.What is chain of custody?Hard
427.What is chain of custody?
Hard
428.What is evidence preservation?Medium
428.What is evidence preservation?
Medium
429.What is memory forensics?Hard
429.What is memory forensics?
Hard
430.What is disk forensics?Medium
430.What is disk forensics?
Medium
431.What is network forensics?Medium
431.What is network forensics?
Medium
432.What is cloud forensics challenges?Hard
432.What is cloud forensics challenges?
Hard
433.What is malware analysis?Medium
433.What is malware analysis?
Medium
434.What is static analysis vs dynamic analysis?Medium
434.What is static analysis vs dynamic analysis?
Medium
435.What is sandbox for malware analysis?Easy
435.What is sandbox for malware analysis?
Easy
436.What is reverse engineering?Hard
436.What is reverse engineering?
Hard
437.What is threat intelligence platforms (TIP)?Medium
437.What is threat intelligence platforms (TIP)?
Medium
438.What is MITRE ATT&CK framework?Hard
438.What is MITRE ATT&CK framework?
Hard
439.What is kill chain model?Medium
439.What is kill chain model?
Medium
440.What is diamond model of intrusion analysis?Hard
440.What is diamond model of intrusion analysis?
Hard
441.What is security compliance?Easy
441.What is security compliance?
Easy
442.What is compliance framework?Easy
442.What is compliance framework?
Easy
443.What is SOC 2 Type I vs Type II?Medium
443.What is SOC 2 Type I vs Type II?
Medium
444.What is ISO 27001 certification?Medium
444.What is ISO 27001 certification?
Medium
445.What is NIST Cybersecurity Framework (CSF)?Medium
445.What is NIST Cybersecurity Framework (CSF)?
Medium
446.What is CIS Controls?Easy
446.What is CIS Controls?
Easy
447.What is PCI-DSS compliance requirements?Medium
447.What is PCI-DSS compliance requirements?
Medium
448.What is HIPAA Security Rule?Medium
448.What is HIPAA Security Rule?
Medium
449.What is GDPR data protection requirements?Hard
449.What is GDPR data protection requirements?
Hard
450.What is CCPA (California Consumer Privacy Act)?Medium
450.What is CCPA (California Consumer Privacy Act)?
Medium
451.What is FedRAMP for government cloud?Hard
451.What is FedRAMP for government cloud?
Hard
452.What is FISMA compliance?Hard
452.What is FISMA compliance?
Hard
453.What is compliance as code?Medium
453.What is compliance as code?
Medium
454.What is policy as code?Medium
454.What is policy as code?
Medium
455.What is security baseline?Easy
455.What is security baseline?
Easy
456.What is CIS benchmarks for cloud?Medium
456.What is CIS benchmarks for cloud?
Medium
457.What is hardening guidelines?Easy
457.What is hardening guidelines?
Easy
458.What is configuration management database (CMDB)?Medium
458.What is configuration management database (CMDB)?
Medium
459.What is asset inventory?Easy
459.What is asset inventory?
Easy
460.What is vulnerability management program?Medium
460.What is vulnerability management program?
Medium
461.What is patch management?Easy
461.What is patch management?
Easy
462.What is vulnerability scanning?Easy
462.What is vulnerability scanning?
Easy
463.What is penetration testing vs vulnerability assessment?Medium
463.What is penetration testing vs vulnerability assessment?
Medium
464.What is red team vs blue team?Medium
464.What is red team vs blue team?
Medium
465.What is purple team?Hard
465.What is purple team?
Hard
466.What is DevSecOps?Easy
466.What is DevSecOps?
Easy
467.What is shift-left security?Medium
467.What is shift-left security?
Medium
468.What is security in CI/CD pipeline?Medium
468.What is security in CI/CD pipeline?
Medium
469.What is SAST (Static Application Security Testing)?Medium
469.What is SAST (Static Application Security Testing)?
Medium
470.What is DAST (Dynamic Application Security Testing)?Medium
470.What is DAST (Dynamic Application Security Testing)?
Medium
471.What is SCA (Software Composition Analysis)?Medium
471.What is SCA (Software Composition Analysis)?
Medium
472.What is dependency scanning?Easy
472.What is dependency scanning?
Easy
473.What is license compliance scanning?Medium
473.What is license compliance scanning?
Medium
474.What is infrastructure as code (IaC) security?Medium
474.What is infrastructure as code (IaC) security?
Medium
475.What is Terraform security scanning?Medium
475.What is Terraform security scanning?
Medium
476.What is CloudFormation security?Medium
476.What is CloudFormation security?
Medium
477.What is security testing automation?Easy
477.What is security testing automation?
Easy
478.What is threat modeling?Medium
478.What is threat modeling?
Medium
479.What is STRIDE threat model?Hard
479.What is STRIDE threat model?
Hard
480.What is risk assessment?Easy
480.What is risk assessment?
Easy
481.What is risk register?Medium
481.What is risk register?
Medium
482.What is risk mitigation strategies?Medium
482.What is risk mitigation strategies?
Medium
483.How would you secure a multi-tier web application in AWS?Medium
483.How would you secure a multi-tier web application in AWS?
Medium
484.How do you implement least privilege access for 1000+ users?Hard
484.How do you implement least privilege access for 1000+ users?
Hard
485.Design a secure CI/CD pipeline for containerized applicationsHard
485.Design a secure CI/CD pipeline for containerized applications
Hard
486.How would you detect and respond to a data breach in cloud?Hard
486.How would you detect and respond to a data breach in cloud?
Hard
487.How do you secure microservices communication?Medium
487.How do you secure microservices communication?
Medium
488.Design disaster recovery plan for mission-critical cloud workloadsHard
488.Design disaster recovery plan for mission-critical cloud workloads
Hard
489.How would you implement zero trust network in cloud?Hard
489.How would you implement zero trust network in cloud?
Hard
490.How do you secure serverless applications (Lambda)?Medium
490.How do you secure serverless applications (Lambda)?
Medium
491.Design encryption strategy for sensitive data in cloudHard
491.Design encryption strategy for sensitive data in cloud
Hard
492.How would you handle a ransomware attack in cloud environment?Hard
492.How would you handle a ransomware attack in cloud environment?
Hard
493.How do you secure API Gateway endpoints?Medium
493.How do you secure API Gateway endpoints?
Medium
494.Design network architecture for PCI-DSS complianceHard
494.Design network architecture for PCI-DSS compliance
Hard
495.How would you implement security monitoring for Kubernetes cluster?Medium
495.How would you implement security monitoring for Kubernetes cluster?
Medium
496.How do you secure data transfer between on-premise and cloud?Medium
496.How do you secure data transfer between on-premise and cloud?
Medium
497.Design identity federation for multi-cloud environmentHard
497.Design identity federation for multi-cloud environment
Hard
498.How would you investigate suspicious IAM activity?Medium
498.How would you investigate suspicious IAM activity?
Medium
499.How do you implement automated security compliance checks?Hard
499.How do you implement automated security compliance checks?
Hard
500.Design backup and recovery strategy with encryptionMedium
500.Design backup and recovery strategy with encryption
Medium
501.How would you secure IoT devices connecting to cloud?Hard
501.How would you secure IoT devices connecting to cloud?
Hard
502.How do you implement security for big data analytics in cloud?Hard
502.How do you implement security for big data analytics in cloud?
Hard
503.Design incident response plan for cloud infrastructureMedium
503.Design incident response plan for cloud infrastructure
Medium
504.How would you prevent privilege escalation attacks?Hard
504.How would you prevent privilege escalation attacks?
Hard
505.How do you secure machine learning models and data?Hard
505.How do you secure machine learning models and data?
Hard
506.Design security architecture for SaaS applicationHard
506.Design security architecture for SaaS application
Hard
507.How would you implement container security at scale?Medium
507.How would you implement container security at scale?
Medium
508.How do you handle secrets rotation in production?Medium
508.How do you handle secrets rotation in production?
Medium
509.Design multi-region disaster recovery with securityHard
509.Design multi-region disaster recovery with security
Hard
510.How would you secure GraphQL APIs?Hard
510.How would you secure GraphQL APIs?
Hard
511.How does Netflix secure its AWS infrastructure?Hard
511.How does Netflix secure its AWS infrastructure?
Hard
512.Design security architecture for video streaming platform on AWSHard
512.Design security architecture for video streaming platform on AWS
Hard
513.How would you implement AWS Security Hub for enterprise?Medium
513.How would you implement AWS Security Hub for enterprise?
Medium
514.Explain Amazon's approach to cloud securityMedium
514.Explain Amazon's approach to cloud security
Medium
515.How does Airbnb secure customer data in AWS?Hard
515.How does Airbnb secure customer data in AWS?
Hard
516.Design GuardDuty deployment for multi-account organizationMedium
516.Design GuardDuty deployment for multi-account organization
Medium
517.How would you implement AWS Control Tower for security?Hard
517.How would you implement AWS Control Tower for security?
Hard
518.Explain Capital One cloud security breach - lessons learnedHard
518.Explain Capital One cloud security breach - lessons learned
Hard
519.How does Lyft implement zero trust on AWS?Hard
519.How does Lyft implement zero trust on AWS?
Hard
520.Design automated compliance monitoring using AWS ConfigMedium
520.Design automated compliance monitoring using AWS Config
Medium
521.How does Microsoft secure Azure infrastructure itself?Medium
521.How does Microsoft secure Azure infrastructure itself?
Medium
522.Design security for Azure Kubernetes Service (AKS) at scaleHard
522.Design security for Azure Kubernetes Service (AKS) at scale
Hard
523.How would you implement Azure Sentinel for SOC?Hard
523.How would you implement Azure Sentinel for SOC?
Hard
524.Explain Xbox Live security architecture on AzureMedium
524.Explain Xbox Live security architecture on Azure
Medium
525.How does Walmart secure retail applications on Azure?Hard
525.How does Walmart secure retail applications on Azure?
Hard
526.Design Defender for Cloud deployment for enterpriseMedium
526.Design Defender for Cloud deployment for enterprise
Medium
527.How would you implement Azure Arc for hybrid security?Hard
527.How would you implement Azure Arc for hybrid security?
Hard
528.Explain BMW's approach to Azure security for connected carsHard
528.Explain BMW's approach to Azure security for connected cars
Hard
529.How does KPMG implement compliance monitoring on Azure?Hard
529.How does KPMG implement compliance monitoring on Azure?
Hard
530.Design multi-region security architecture on AzureHard
530.Design multi-region security architecture on Azure
Hard
531.How does Google secure its own cloud infrastructure?Medium
531.How does Google secure its own cloud infrastructure?
Medium
532.Design security for Google Kubernetes Engine (GKE) workloadsHard
532.Design security for Google Kubernetes Engine (GKE) workloads
Hard
533.How would you implement VPC Service Controls for data protection?Hard
533.How would you implement VPC Service Controls for data protection?
Hard
534.Explain Spotify's security architecture on GCPHard
534.Explain Spotify's security architecture on GCP
Hard
535.How does Twitter secure tweet data on GCP?Hard
535.How does Twitter secure tweet data on GCP?
Hard
536.Design Security Command Center implementationMedium
536.Design Security Command Center implementation
Medium
537.How would you implement Binary Authorization for containers?Hard
537.How would you implement Binary Authorization for containers?
Hard
538.Explain Snap's approach to GCP securityHard
538.Explain Snap's approach to GCP security
Hard
539.How does Target secure e-commerce on GCP?Medium
539.How does Target secure e-commerce on GCP?
Medium
540.Design zero trust implementation using BeyondCorpHard
540.Design zero trust implementation using BeyondCorp
Hard
541.How does IBM secure multi-cloud deployments?Medium
541.How does IBM secure multi-cloud deployments?
Medium
542.Design security architecture spanning AWS, Azure, and GCPHard
542.Design security architecture spanning AWS, Azure, and GCP
Hard
543.How would you implement unified identity across clouds?Medium
543.How would you implement unified identity across clouds?
Medium
544.Explain Siemens' approach to industrial IoT cloud securityHard
544.Explain Siemens' approach to industrial IoT cloud security
Hard
545.How does Accenture manage client cloud security?Hard
545.How does Accenture manage client cloud security?
Hard
546.Design CASB implementation for multi-cloudHard
546.Design CASB implementation for multi-cloud
Hard
547.How would you implement consistent security policies across clouds?Hard
547.How would you implement consistent security policies across clouds?
Hard
548.Explain Deutsche Bank's cloud security governanceHard
548.Explain Deutsche Bank's cloud security governance
Hard
549.How does Cisco secure SD-WAN for cloud connectivity?Medium
549.How does Cisco secure SD-WAN for cloud connectivity?
Medium
550.Design cloud security operations center (CloudSOC)Hard
550.Design cloud security operations center (CloudSOC)
Hard
551.What is the importance of 'Root' user security?Easy
551.What is the importance of 'Root' user security?
Easy
552.What is a 'Break-glass' account?Medium
552.What is a 'Break-glass' account?
Medium
553.What is the difference between encryption and tokenization?Medium
553.What is the difference between encryption and tokenization?
Medium
554.Explain 'Serverless' security risksMedium
554.Explain 'Serverless' security risks
Medium
555.What is 'Config Drift' and how to stop it?Medium
555.What is 'Config Drift' and how to stop it?
Medium
556.How do you secure a 'S3-based' Data Lake?Medium
556.How do you secure a 'S3-based' Data Lake?
Medium
557.What is 'Blast Radius' in cloud security?Easy
557.What is 'Blast Radius' in cloud security?
Easy
558.How do you handle 'Security vs. Agility'?Easy
558.How do you handle 'Security vs. Agility'?
Easy
559.What is 'Attestation' in container security?Hard
559.What is 'Attestation' in container security?
Hard
560.What are 'Sticky Sessions' and security implications?Medium
560.What are 'Sticky Sessions' and security implications?
Medium
561.What is 'Golden Image' strategy?Easy
561.What is 'Golden Image' strategy?
Easy
562.Explain 'Secret Zero' problemHard
562.Explain 'Secret Zero' problem
Hard
563.What is 'Dynamic Secrets'?Hard
563.What is 'Dynamic Secrets'?
Hard
564.How do you secure 'CI/CD' runners?Medium
564.How do you secure 'CI/CD' runners?
Medium
565.What is 'WAF-on-the-Edge'?Medium
565.What is 'WAF-on-the-Edge'?
Medium
566.Explain 'Side-channel' attacks in cloudHard
566.Explain 'Side-channel' attacks in cloud
Hard
567.What is 'Data Sovereignty'?Medium
567.What is 'Data Sovereignty'?
Medium
568.What is 'Crypto-shredding'?Medium
568.What is 'Crypto-shredding'?
Medium
569.How to secure 'Websockets'?Hard
569.How to secure 'Websockets'?
Hard
570.What is 'Cold vs Warm' backups for security?Easy
570.What is 'Cold vs Warm' backups for security?
Easy
571.How do you secure 'Lambda-to-Database' access?Medium
571.How do you secure 'Lambda-to-Database' access?
Medium
572.Explain 'OIDC' for CI/CD authenticationHard
572.Explain 'OIDC' for CI/CD authentication
Hard
573.What is 'IAM Social Engineering'?Easy
573.What is 'IAM Social Engineering'?
Easy
574.What is 'Privileged Session Management' (PSM)?Hard
574.What is 'Privileged Session Management' (PSM)?
Hard
575.Explain 'WAF False Positives'Medium
575.Explain 'WAF False Positives'
Medium
576.What is 'Security-as-a-Service'?Easy
576.What is 'Security-as-a-Service'?
Easy
577.How to secure 'API Webhooks'?Hard
577.How to secure 'API Webhooks'?
Hard
578.Explain 'DNS-layer' securityMedium
578.Explain 'DNS-layer' security
Medium
579.What is 'JIT' for Cloud VMs?Medium
579.What is 'JIT' for Cloud VMs?
Medium
580.What is the role of a Cloud Security Engineer in 2026?Easy
580.What is the role of a Cloud Security Engineer in 2026?
Easy