Information security specialist Interview Questions

2K

Information Security Specialist interview questions shared by candidates

Top Interview Questions

Sort: Relevance|Popular|Date
Google
Information Security Analyst was asked...21 January 2021

Fale da sua experiência

6 Answers

Tenho algumas experiências com vendas e preciso de um emprego

Tenho experiência com venda online,e gostaria muito de trabalhar nessa empresa

Tenho experiência em postagem de publicidade, informações e comunicação social.

Show More Responses
Frontline Education

How many years of formal CISO title do you have?

4 Answers

More than enough to call out a lazy leader

I think nothing will change if all recruiters in the world are fired.

Finally, we hired somebody after 6 months. With COVID-19, we will fire him soon. Seems like a looser who will not survive Less

Show More Responses
Somos

what is an advantage of a domain?

4 Answers

Central management and organization of a group of devices, users, and resources.

This question was obviously asked by someone who knows nothing about security. What is an advantage of a domain? What type of domain were they asking about? Physical? The name in a DNS? A logically separated environment? You are lucky you were not hired. The VP in charge is unethical and intolerable. Most people there don't like or trust him but he is protected by the COO. Less

On the contrary, that question can only be understood by an applicant who knows that “Domain” here refers to applying the ISO 27001 standard. It has nothing to do with your website. Less

Show More Responses
Onduo

General and quality was directly proportional to the recruiters experience

3 Answers

And the role reports to a VP, customer success. What a joke and looks like they need a glorified secretary and a throat to choke Less

They will ask for your salary range and if you ask the range on their end they will say they don’t know yet Less

They hired somebody for cheap. With probably very minimal HIPAA knowledge and an expired CISSP credential. Less

TraceSecurity

The analyst was the one who asked serious questions about my experience and skills, but nothing that can't be answered. Some details about metasploit (very simple indeed) , basic networking and TCP/IP.

2 Answers

Does TraceSecurity require you to work in Baton Rouge while not on site with a client? Or do they have telecommuting options? Less

No telecommuting options

Mobily

What is the best anti-virus software

3 Answers

Bit Defender is the best as far as I know

Trend micro. And right now you need to look further for EDR solution

Icare

Qseap

Aptitude question were very easy and u have to only apply simple logic. For instance; A C F K? Find the next word?

3 Answers

So the answer is R

how ans will be R ?

Answer will be p

Costco Wholesale

Do you have experience writing Policies?

2 Answers

This would be a C level/senior management level task - so no, I didn't just forget to add that level position to my CV. Less

I have considerable experience not only at IBM but working with JDE clients including Councils and pharma both UK and abroad Less

Costco Wholesale

Most programmers and security personnel leave a back door or something open for future. If you had to choose one company or job that "if you suddenly turned evil" you would go back to and use that knowledge for profit or gain. Where would it be and what would you do?

2 Answers

Sounds like a honeypot question to ask ☺

This is what gets most people so be prepared to answer it.

IG

TCP IP: what are common protocols that operate at each layer

2 Answers

TLS / SSL: what is it and what does it do

TCP IP is a representation of suite of protocols for Open Systems Interconnection (OSI Model) At layer 7 - eg SFTP, Https, SSH for secured services At layer 6 - Session layer: port numbers At layer 5 - presentation eg ascii, mpeg, jpeg, etc At layer 4- Transmission Layer TCP Secure connection for encryption eg. AES, SHA 256 and higher algorithm and UDP protocols which are generally unreliable Layer 3- IP protocol network layer Layer 2 - Datagram layer eg. Mac address , ARP RARP Layer 1 - Physical Layer, Cat 5, Cat6, Cat 7, etc Less

Viewing 1 - 10 of 2,053 Interview Questions