Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
8 views2 pages

Inter

The document provides a comprehensive overview of Application Security, including definitions of key concepts such as S-SDLC, Threat Modeling, and common vulnerabilities. It covers various levels of questions from basic to advanced, addressing topics like API security testing, DevSecOps, and the STRIDE model. Additionally, it discusses the importance of certifications like OSCP and CISSP, as well as procedures for handling vulnerabilities and conducting penetration tests.

Uploaded by

bugtest89
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views2 pages

Inter

The document provides a comprehensive overview of Application Security, including definitions of key concepts such as S-SDLC, Threat Modeling, and common vulnerabilities. It covers various levels of questions from basic to advanced, addressing topics like API security testing, DevSecOps, and the STRIDE model. Additionally, it discusses the importance of certifications like OSCP and CISSP, as well as procedures for handling vulnerabilities and conducting penetration tests.

Uploaded by

bugtest89
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Basic Questions:

1. What is Application Security?


• Application Security ensures applications are secure from vulnerabilities through
processes like secure coding, testing, and threat mitigation.
2. What is S-SDLC?
• Secure Software Development Life Cycle integrates security practices into each phase of
the software development process.
3. What is Threat Modeling?
• Threat Modeling identifies, evaluates, and mitigates potential security threats to an
application.
4. What is the purpose of a Code Review in AppSec?
• To detect and fix security vulnerabilities in the source code.
5. Name some common web application vulnerabilities.
• SQL Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF),
Insecure Direct Object References.

Intermediate Questions:
6. How do you perform API security testing?
• Validate endpoints, authentication, rate limiting, and identify issues like Broken Object
Level Authorization (BOLA) or excessive data exposure.
7. What is DevSecOps?
• The practice of integrating security into DevOps to ensure security checks are automated
and continuous throughout the CI/CD pipeline.
8. How do you assess mobile application security?
• Analyze the APK/IPA, perform reverse engineering, memory analysis, and check for
insecure storage, weak encryption, and insecure communication.
9. What is the use of tools like Checkmarx or Fortify?
• They are Static Application Security Testing (SAST) tools to identify vulnerabilities in
source code.
10.What is the difference between SAST and DAST?
• SAST analyzes code statically (without execution), while DAST identifies
vulnerabilities dynamically during runtime.

Advanced Questions:
11.Explain the STRIDE model in Threat Modeling.
• STRIDE identifies six threat categories: Spoofing, Tampering, Repudiation, Information
Disclosure, Denial of Service, and Elevation of Privilege.
12.How do you integrate security in CI/CD pipelines?
• Automate security tests (SAST, DAST), use tools like Checkmarx or Veracode, and
ensure early feedback during development.
13.How would you assess firmware security?
• Extract firmware, analyze binaries for backdoors, hardcoded credentials, and perform
fuzzing or static analysis.
14.What is a vulnerability assessment?
• A systematic review of security weaknesses in an application or system to prioritize
remediation.
15.How do you handle independent AppSec delivery for global clients?
• Gather requirements, plan and execute security assessments, provide actionable
remediation, and conduct detailed reporting.

Certification and Scenario-Based Questions:


16.Why is OSCP or CISSP valuable in AppSec?
• OSCP proves penetration testing skills; CISSP validates overall security expertise.
17.How would you handle an RFP for an AppSec project?
• Understand client requirements, estimate scope, propose technical solutions, and draft a
compelling response.
18.What steps would you take if a critical vulnerability is found in production?
• Notify stakeholders, assess impact, apply a hotfix or patch, and ensure remediation is
tested and validated.
19.Explain how Black Duck helps in security.
• It identifies and manages open-source vulnerabilities and license compliance issues.
20.How would you conduct a penetration test for a web application?
• Enumerate endpoints, exploit vulnerabilities (e.g., injection, XSS), and provide a
detailed report with recommendations.

You might also like