Blog Archives
1 2

10 Encryption and Decryption interview Q&As

Q1. What do you understand by the terms encryption and decryption?
A1. Encryption is the process of converting clear data (e.g. …

Read more ›



12 Kerberos interview Q&As

Q1. What is kerberos? A1. Kerberos is a network authentication protocol designed to provide strong authentication for client/server applications by means … … Read more ›...



15 Security key area interview Q&A for Java developers

Q1. Can you provide a high level overview of the “access control security” in a recent application you had worked? A1.… … Read more ›...



6 Authentication Protocols Interview Q&As – LDAP, Kerberos, OAuth2 & SAML

Q1. Why are there so many security terminologies & standards compared to tradional security systems? A1. In traditional authentication (i.e. identify … … Read more ›...



6 LDAP Interview Q&As

Q1. What is an LDAP server? And what is it used for in an enterprise environment? A1. LDAP stands … … Read more ›...



AWS Web Application Security Q&As

Below questions are based on the above diagram, and extends AWS Q&As on VPC, Subnets, Availability Zones, VPN, Route tables, NACLs … … Read more ›...



Debugging java.security.cert.CertificateException: Certificates do not conform to algorithm constraints

Why? You may have a certificate with SHA1RSA key size less than 1024 bits or you have a certificate in your …

Read more ›



Debugging SSL issues in Java & tools to debug

Q1. What are some of the issues you encounter with SSL handshake? A1. Some of the issues you try to debug … … Read more ›...



HTTP Basic Authentication Interview Q&A for Java developers & architects

Q1. What do you understand by the term “HTTP Basic Authentication”? A1. HTTP Basic authentication is the simplest “access controls” technique … … Read more ›...



Injection attack prevention Q&A

Q1. What are the different types of injection security vulnerabilities? A1. SQL Injection, Log Injection, HTTP Response Splitting, XPath Query injection, … … Read more ›...



Preventing XSS attacks in Java

Cross Site Scripting (XSS) is one of the most common security problems in today’s web applications, and the second most common … … Read more ›...



Security holes & how to fix them interview Q&A

Security is of paramount importance to any application or website. Applications with security vulnerabilities can not only tarnish the reputation of … … Read more ›...



Session Hijacking prevention Questions & Answers

Q1. Does the following code pose any security risk? if yes, how will you fix it? A1. The above code is … … Read more ›...



1 2

Java & Big Data Categories

Top