Interview kitsBlog

Your dream job? Lets Git IT.
Interactive technical interview preparation platform designed for modern developers.

XGitHub

Platform

  • Categories

Resources

  • Blog
  • About the app
  • FAQ
  • Feedback

Legal

  • Privacy Policy
  • Terms of Service

© 2026 LetsGit.IT. All rights reserved.

Security

Recruitment and knowledge question base. Filter, search and test your knowledge.

Topics

What is threat modeling, and how do you run a lightweight threat model for a feature?

mediumthreat-modelingrisksecurity
Open question

Answer

Threat modeling is a structured way to identify assets, threats, and mitigations by mapping actors, entry points, and trust boundaries. A lightweight model uses a quick data-flow diagram, lists likely threats (e.g., STRIDE), and prioritizes mitigations by risk.

Authentication vs authorization — what’s the difference, with examples?

easyauthnauthzsecurity
Open question

Answer

Authentication proves who the user is (e.g., password, OAuth, MFA). Authorization decides what they can do (e.g., role can edit invoices). AuthN comes before AuthZ.

Explain XSS, CSRF, and SSRF, and one mitigation for each.

mediumxsscsrfssrf+1
Open question

Answer

XSS injects scripts into a page; mitigate with output encoding and CSP. CSRF tricks a browser into sending a trusted request; mitigate with CSRF tokens and SameSite cookies. SSRF makes a server request internal resources; mitigate with allowlists and network egress controls.

How should passwords be stored securely?

mediumpasswordshashingsecurity
Open question

Answer

Store passwords as salted, slow hashes (Argon2id, bcrypt, or scrypt). Never store plaintext or reversible encryption. Use per-user salts, optional pepper, and enforce strong password policies.

What does least privilege mean in practice (IAM/roles)?

easyiamleast-privilegeroles
Open question

Answer

Least privilege means granting only the minimum permissions needed for a task and for the shortest time. In IAM it means scoped roles, separate accounts for services, and avoiding wildcard permissions.

How do you manage secrets in CI/CD and production?

mediumsecretsci-cdvault
Open question

Answer

Store secrets in a dedicated secrets manager (e.g., Vault, AWS Secrets Manager), inject them at runtime, and rotate regularly. Avoid hardcoding, keep least-privilege access, and audit secret usage in CI/CD logs.

JWT pitfalls: when should you use JWTs vs server-side sessions?

mediumjwtsessionsauth
Open question

Answer

JWTs are good for stateless APIs and service-to-service auth, but they’re hard to revoke and can grow large. Server-side sessions allow easy revocation and rotation and are better for web apps where you need control and short session lifetimes.

How do you protect a public API from abuse?

mediumrate-limitingabuseapi
Open question

Answer

Use authentication, rate limits, quotas, and abuse detection (IP reputation, anomaly detection). Add request validation, WAF rules, and backpressure, plus monitoring and alerting for spikes.

What is software supply-chain risk and how do you mitigate it?

hardsupply-chaindependenciesslsa
Open question

Answer

Supply-chain risk is the chance that dependencies, build steps, or artifacts are tampered with. Mitigations include pinning versions, using SBOMs, verifying signatures, least-privilege CI, and monitoring for vulnerable dependencies.

What security signals should you log and monitor, and why?

mediumloggingmonitoringsecurity-events
Open question

Answer

Log auth events (login failures, MFA changes), privilege changes, access to sensitive data, and unusual traffic patterns. Monitor for spikes, geo-anomalies, and failed actions to detect abuse early and support incident response.