Dashboard

Learn faster. Build smarter.

Back to Categories
38 questions0 learned

Security

Secrets, least privilege, HTTPS, zero trust, and secure delivery.

Results: 38
Middle

Why is secret management important in DevOps?

Secret management protects credentials, tokens, and keys from exposure.

Junior

What is the principle of least privilege?

It means granting only the minimum permissions required to perform a task.

Senior

What is a zero trust security model?

Zero trust assumes no user or system is trusted automatically, even inside the network.

Middle

Why is secret rotation important?

Secret rotation reduces the risk of long-lived credentials being exposed or abused.

Middle

What does DevSecOps mean?

DevSecOps means integrating security into development, operations, and delivery workflows.

Junior

Why is HTTPS important?

HTTPS encrypts data in transit and protects against interception.

Junior

What is the difference between authentication and authorization?

Authentication verifies identity, while authorization determines access rights.

Middle

What is attack surface?

Attack surface is the total number of points where a system can be attacked.

Junior

What is information security?

Information security protects systems and data from unauthorized access, misuse, or damage.

Junior

What is the CIA triad?

The CIA triad stands for confidentiality, integrity, and availability.

Junior

What is encryption at rest?

Encryption at rest protects stored data by encrypting it on disk or in storage.

Junior

What is encryption in transit?

Encryption in transit protects data while it moves between systems.

Junior

What is hashing?

Hashing transforms data into a fixed-size value used for integrity checking or password storage.

Junior

Why is salt used with password hashing?

Salt makes identical passwords produce different hashes and helps resist precomputed attacks.

Junior

What is MFA?

MFA stands for Multi-Factor Authentication and requires more than one verification factor.

Junior

What is a vulnerability?

A vulnerability is a weakness that could be exploited to compromise a system.

Middle

Why is patch management important?

Patch management reduces exposure to known vulnerabilities.

Middle

What does a secrets manager do?

A secrets manager securely stores and controls access to credentials and sensitive values.

Middle

What is the difference between an API key and a token?

An API key is usually a static credential, while a token is often temporary and tied to identity or session context.

Middle

What is a JWT?

A JWT is a JSON Web Token used to represent identity or authorization claims.

Middle

What is RBAC?

RBAC stands for Role-Based Access Control.

Senior

What is ABAC?

ABAC stands for Attribute-Based Access Control and makes decisions using attributes and policies.

Middle

Why is the principle of least privilege important?

It reduces blast radius by limiting access to only what is necessary.

Middle

What is secret rotation policy?

A secret rotation policy defines how often credentials should be changed and how that process is managed.

Junior

Why are IAM roles often preferred over long-lived IAM users in cloud environments?

Roles reduce the need for static credentials and improve security.

Middle

What does shift-left security mean?

Shift-left means addressing security earlier in the software lifecycle.

Middle

What is SAST?

SAST is Static Application Security Testing.

Middle

What is DAST?

DAST is Dynamic Application Security Testing.

Middle

What is Software Composition Analysis (SCA)?

SCA scans third-party dependencies for known vulnerabilities and license issues.

Middle

Why scan container images?

Container scanning helps detect vulnerable packages, secrets, and insecure image configurations.

Middle

Why scan Infrastructure as Code?

IaC scanning detects insecure cloud or infrastructure configurations before they are deployed.

Senior

How do you reduce attack surface?

Reduce attack surface by removing unnecessary services, limiting access, and minimizing exposed functionality.

Middle

What are good practices for security group or firewall rules?

Use least privilege, narrow source ranges, document intent, and avoid overly broad access.

Middle

Why is audit logging important?

Audit logs help track who did what and support investigations and compliance.

Senior

What is threat modeling?

Threat modeling is the process of identifying risks, attack paths, and mitigations in a system design.

Senior

What is blast radius in security?

Blast radius is the extent of damage possible if a system, credential, or component is compromised.

Middle

What is a KMS?

A KMS is a Key Management Service used to create and manage encryption keys.

Senior

What is the difference between compliance and security?

Compliance means meeting required standards, while security means actually reducing risk.