Creative Technology
Services
Managed IT Services
Service Tiers
Service Enhancements
Managed Endpoint Support
Managed Infrastructure Support
Managed Network Services
Network Management & Monitoring
Total Network Security Services
Managed Wired & Wireless Networks
Dedicated Connectivity Services
Managed Infrastructure Services
Hybrid Cloud Infrastructure
Data Security & Storage
Software as a Service
Unified Communication
Cyber Security Services
Cyber Awareness and Training
Identity and Access Management
Intrusion Detection and Prevention
Threat Detection and Response
Professional Services
Infrastructure Audit & Gap Analysis
Disaster Recovery & Business Continuity
Digital Transformation
Advisory & Architecture
Managed IT Services
Service Desk
Onsite Support
Infrastructure Monitoring
Client Relationship Management
Managed IT Services
Managed Network Services
Network Management & Monitoring
Total Network Security Services
Managed Wired & Wireless Networks
Dedicated Connectivity Services
Managed Network Services
Managed Infrastructure Services
Hybrid Cloud Infrastructure
Data Security & Storage
Software as a Service
Unified Communication
Managed Infrastructure Services
Cyber Security Services
Cyber Awareness and Training
Identity and Access Management
Intrusion Detection and Prevention
Threat Detection and Response
Cyber Security Services
Professional Services
Infrastructure Audit & Gap Analysis
Disaster Recovery & Business Continuity
Digital Transformation
Advisory & Architecture
Professional Services
Why Lyon
Why Lyon
Team
Careers
Case Studies
News
Resources
News
Guides
Connect
Contact Us
Menu
Services
Managed IT Services
Service Tiers
Service Enhancements
Managed Endpoint Support
Managed Infrastructure Support
Managed Network Services
Network Management & Monitoring
Total Network Security Services
Managed Wired & Wireless Networks
Dedicated Connectivity Services
Managed Infrastructure Services
Hybrid Cloud Infrastructure
Data Security & Storage
Software as a Service
Unified Communication
Cyber Security Services
Cyber Awareness and Training
Identity and Access Management
Intrusion Detection and Prevention
Threat Detection and Response
Professional Services
Infrastructure Audit & Gap Analysis
Disaster Recovery & Business Continuity
Digital Transformation
Advisory & Architecture
Why Lyon
Why Lyon
Team
Career
Case Studies
Resources
News
In-depth guides
News
Connect
Contact Us
Solutions Engineer L2 - Security
Solutions Engineer L2 - Security
Your questions below
Home
Interview
questions
Client Success Manager
-
Technical Assessment
Service Desk Engineer L0
-
Technical Assessment
Service Desk Engineer L1
-
Technical Assessment
Service Desk Engineer L2 - Apple
-
Technical Assessment
Solutions Engineer L2 - Network
-
Technical Assessment
Solutions Engineer L1 - Infrastructure
-
Technical Assessment
Solutions Engineer L2 - Security
-
Technical Assessment
Solutions Engineer L2 - Cloud
-
Technical Assessment
Solutions Engineer L2 - Infrastructure
-
Technical Assessment
Basic Info
Full Name
Email
Mobile Number
Questions
1- Explain the difference between stateless and stateful firewall filtering. Give an example of a traffic flow that would be allowed by stateful but blocked by stateless.
2- What are the key differences between EDR (Endpoint Detection & Response) and EPP (Endpoint Protection Platform)? Name 3 EDR platforms and their primary detection methods.
3- Describe how TLS 1.2 handshake works. What security improvements does TLS 1.3 provide over TLS 1.2?
4- Explain the difference between symmetric and asymmetric encryption. When would you use each, and give a real-world example for each?
5- A client's firewall rules include: "Allow all outbound traffic," "Allow RDP from anywhere," "Block HTTPS inbound." Identify the security issues and what you'd change.
6- What is DNS spoofing and DNS tunneling? How would you detect and prevent each using technical controls?
7- Explain how DNSSEC works. What does it protect against, and what doesn't it protect against?
8- What are the top 3 OWASP Top 10 vulnerabilities (2021)? For each, explain the technical vulnerability and a code-level mitigation.
9- Explain how NTLM authentication works vs. Kerberos. What are the security weaknesses in NTLM, and why is Kerberos preferred?
10- What is a pass-the-hash attack? How does it work technically, and what technical controls would prevent it?
11- Explain the difference between RBAC (Role-Based Access Control), ABAC (Attribute-Based Access Control), and ACL (Access Control Lists). When would you use each?
12- What is a SIEM and what are its core functions? Name 2 SIEM platforms and describe their correlation engine capabilities.
13- Explain how SQL injection works and provide a vulnerable code example. What are 3 technical methods to prevent it?
14- What is the difference between DLP (Data Loss Prevention) and CASB (Cloud Access Security Broker)? What specific technical controls does each provide?
15- Explain how multi-factor authentication (MFA) works. Compare SMS-based, TOTP (Time-based One-Time Password), and hardware token-based MFA in terms of security.
16- What is network segmentation? Explain VLANs, subnetting, and microsegmentation. What security problems does each solve?
17- Describe how public key infrastructure (PKI) works. What is the role of a Certificate Authority (CA), and how are certificates validated?
18- What is a man-in-the-middle (MITM) attack? Explain 2 types of MITM attacks and the technical controls that prevent each.
19- Explain how IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) differ. What are signature-based vs. anomaly-based detection?
20- What is a Distributed Denial of Service (DDoS) attack? Name 3 types (volumetric, protocol, application-layer) and the technical mitigation for each.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Write to us,
we will get back to you soon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.