What are the different types of JSON web token attacks?
How to perform reconnaissance on a web application? Explain the methodology of tools you use to perform reconnaissance?
How is VAPT different for Cloud than Data centers?
What is the importance of configuration reviews and how can one practice configuration reviews ?
How and where can one practice vulnerability assessment and which open source tools can be downloaded and used?
What is an IPS and what role does it play in Cyber security for network or end point?
What is DLP software and what role does it play in Cyber security?
What are some of the recent high profile cyber attacks that all freshers should know and what are the details of these attacks?
What is threat intelligence and how can one gather threat intelligence and what role does it play in an organization?
What are IOCs and what role do they play in Security operations / Cyber security?