Interviewing
BlogInterviewing GuideGovernance, Risk, and Compliance
  • Overview
  • Intro
    • General
      • Tell Me About Yourself
      • What are you looking for in a new role?
      • What is your greatest weakness?
      • What are your greatest strengths?
      • Describe Your Leadership Style?
    • Career
      • Elevator Pitch
      • Job History
    • Behavioral-Based
      • Time when you came up with a new approach to a problem.
      • Describe a project that required input from people at different levels in the organization.
      • Encountered a problem and how you resolved it.
      • Juggle multiple important projects.
      • Most innovative new idea that you have implemented?
      • What project have you done that you're most proud of?
  • AWS
    • General
      • Can you describe the different components of AWS security?
      • Ensure the security of its data centers?
      • Concept of least privilege and how it applies to AWS?
      • How does AWS implement network security?
      • Types of AWS Identity and Access Management (IAM) policies?
      • AWS Secure Sockets Layer (SSL) and Transport Layer Security (TLS) work?
      • AWS Security Groups and how they can be used to control inbound and outbound traffic
      • How does AWS implement encryption to protect data at rest and in transit?
      • Can you describe the different types of AWS firewalls (e.g. Network Firewall, Web Application Firewa
      • Enable secure access to resources using IAM roles and temporary credentials?
      • How does AWS enable secure data transfer using AWS Transfer Family (e.g. SFTP, FTPS)?
      • How does AWS enable secure application development using services such as AWS Secrets Manager and AW
      • Features of AWS Shield and how it can be used to protect against DDoS
      • Enable secure communication between services using VPC endpoints and AWS PrivateLink?
      • Can you describe the security features of AWS Direct Connect and how it can be used to establish a s
    • Securing
      • How can you secure access to S3 buckets?
      • What is AWS KMS and how can it be used to secure data?
      • Secure access to an AWS database
      • Secure an application running on an EC2 instance
      • Protect against security breaches on AWS?
      • Ensure the security of user data stored in AWS
      • Secure access to the AWS management console
      • Secure data stored in the AWS with encryption
      • Secure your AWS infrastructure from unauthorized access
      • Secure data in transit and at rest in AWS
      • Secure access to your Amazon Elastic Container Service (ECS) clusters
      • Using Amazon Virtual Private Cloud (VPC) to secure your resources
      • AWS WAF to protect against web-based attacks
      • AWS Certificate Manager (ACM) to secure your website and applications
    • S3
  • Security Domains & Technical Aptitude
    • General
      • Questions with Steps
        • What are the steps when securing a Linux server?
        • Explain what happens when you type domain in the browser and press enter
    • Security & Privacy Governance
    • Cloud Security
    • Compliance
      • Frameworks
        • SOC 2
        • ISO 27001
      • What are the steps to a SOC 2 Gap Analysis?
      • Auditing
      • Internal Audit
      • Internal Audit Program
      • What are the steps of of performing a tabletop exercise?
    • Cryptographic Protections
      • Cryptography
        • What is cryptography?
        • What are the different types of cryptographic algorithms?
        • What is the difference between symmetric and asymmetric cryptography?
        • What is a hashing algorithm?
        • What is public-key cryptography?
        • What is the purpose of digital signatures?
        • How are digital signatures authenticated?
        • What is the difference between encryption and hashing?
        • How does encryption ensure the confidentiality of data?
        • What is the difference between encryption and steganography?
        • What is the difference between a cipher and a code?
        • What is a one-time pad?
        • What is the difference between symmetric and asymmetric key sizes?
        • What is a key management system?
        • What is a digital certificate?
        • What is the difference between a digital signature and a hash?
        • What’s the difference between Diffie-Hellman and RSA?
        • What is Forward Secrecy?
        • What are block and stream ciphers?
        • What are some examples of symmetric encryption algorithms?
        • What are some examples of asymmetric encryption algorithms?
      • TLS
        • What is TLS?
        • What is the purpose of TLS?
        • How does TLS work?
        • What are the main components of TLS?
        • What are the benefits of using TLS?
        • What are the differences between TLS and SSL?
        • What are the key algorithms used in TLS?
        • What is a TLS certificate?
        • What are the different versions of TLS?
        • What are the common vulnerabilities of TLS?
        • What is a TLS handshake?
        • What is a TLS session?
        • What is a TLS tunnel?
        • How can I configure TLS on my server?
        • What is the difference between TLS and IPsec?
        • Does TLS use symmetric or asymmetric encryption?
        • Describe the process of a TLS session being set up when someone visits a secure website.
        • What’s more secure, SSL, TLS, or HTTPS?
    • Data Classification & Handling
      • DLP
        • Data Exfiltration
        • Data Leakage
      • Data at Rest
      • Data in Transit
        • How do you ensure data is encrypted when stored and transferred?
    • Identification & Authentication
      • SAML
      • MFA
      • SSO
      • IAM Questions
    • Network Security
      • General
      • DNS
        • What is DNS Resolution?
        • What is DNS?
        • What is a Name Server?
        • What is a DNS Record?
        • What is a A Record?
        • What is a AAAA Record?
        • What is a CNAME Record?
        • What is PTR Record?
        • What is a MX Record?
        • What is a ND Record?
        • Explain DNS Record TTL?
        • Is DNS using TCP or UDP?
        • What are the steps in a DNS lookup?
        • Why is DNS monitoring important?
      • Networking
        • What is the network layer?
        • What happens at the network layer?
        • What is a packet?
        • What is the OSI model?
        • What is the TCP/IP Model?
        • OSI model vs. TCP/IP model
        • What is the difference between the 'network' layer and the 'Internet' layer?
        • What protocols are used at the network layer?
        • How do these concepts relate to websites and applications users access over the Internet?
      • TCP/IP Model
    • Privacy
      • Data Privacy - General
        • Data Privacy (Facts)
          • 25 Data Privacy Questions
        • Data categorization
        • Data Anonymization
        • Data Classification
        • Data Inventory
      • HIPAA (Facts)
        • HIPAA Security Rule
          • 25 HIPAA Security Rule Questions
        • HIPAA Privacy Rule
          • 25 HIPAA Privacy Rule
        • Breach Notification Rule and Omnibus Rule of 2013
      • Business Associate Agreement (Facts)
        • 20 BAA Questions
      • Data Use Agreement (Facts)
        • Questions
      • GDPR (Facts)
        • Questions
        • What steps have you taken to protect customer data in light of GDPR?
        • How do you handle personal data requests from customers?
        • Are you aware of the rights customers have under GDPR?
        • How do you handle customer requests to delete their data?
        • Do you have procedures in place to report data breaches in light of GDPR?
        • How do you ensure that third-party vendors comply with GDPR?
        • How do you ensure compliance with GDPR?
    • Risk Management
      • Risk Management
        • Is there an acceptable level of risk?
        • How do you measure risk?
        • What’s the difference between a threat, vulnerability, and a risk?
        • What is the primary reason most companies haven’t fixed their vulnerabilities?
        • What’s the difference between a threat, vulnerability, and a risk?
      • Risk Assessment
        • Cyber Risk Assessment
          • Cyber Risk Assessment Steps
        • 30 Risk Assessment Questions
        • What are the steps of adding a risk to the Risk Register?
        • How do you perform risk assessments for threats?
        • How do you assess and manage third-party risk?
      • Business Impact Assessment
    • Mobile Device Management
      • How do you ensure that all mobile devices are compliant with corporate policies?
      • How do you handle mobile device security issues?
    • Third-Party Management
      • Vendor Risk
        • Vendor Risk Assessment Steps
        • Vendor Contract Reviews
        • Assessing Cloud Vendors
        • Third-Party Data Protection
        • Review of Security Requirements for Contracts
        • Vendor Management Tasks
        • Questions
          • How do you ensure that vendor data is properly secured and protected?
          • What measures do you take to ensure the vendor risk assessment is accurate and up to date?
          • Describe the process you use to conduct a vendor risk assessment?
          • What criteria do you use to evaluate the risks associated with a vendor?
          • How do you monitor and assess a vendor's performance?
          • How do you handle vendor disputes?
          • What is your experience in developing vendor risk assessment policies?
          • How do you ensure that all vendors comply with your risk assessment policy?
          • How do you determine the level of risk associated with a vendor?
          • What steps do you take to ensure the security of vendor data?
          • How do you respond to a potential vendor risk incident?
          • What measures do you take to ensure the accuracy of vendor data?
          • What types of control activities do you perform to mitigate vendor risk?
    • Web Security
      • What measures do you take to ensure the security of a web application?
  • Project Coordination & Collaboration
    • Project Management
      • What challenges have you faced in project management and how did you overcome them?
      • How do you measure the success of a project?
      • What are the proper steps to managing a project from start to finish?
  • Not Ready
    • Vulnerability & Patch Management (Empty)
    • Threat Management (Empty)
    • Security Awareness & Training (Empty)
    • Security Operations (Empty)
    • Secure Engineering & Architecture (Empty)
    • Information Assurance (Empty)
    • Incident Response (Empty)
    • Endpoint Security (Empty)
    • Continuous Monitoring (Empty)
    • Configuration Management (Empty)
    • Asset Management (Empty)
    • Change Management (Empty)
    • Business Continuity & Disaster Recovery (Empty)
Powered by GitBook
On this page
  1. Security Domains & Technical Aptitude

General

How do IDS and IPS differ from one another?

The administrator must stop incursion once the IDS, or intrusion detection system, discovers them. Contrarily, in an IPS (intrusion prevention system), the system not only detects the intrusion but also addresses it.

How is encryption different from hashing?

Hashing and encryption change one type of data into another. Encrypted data can be decrypted and converted to the original, while hashed data cannot be reconverted.

Why do organizations use firewalls? What does it do?

A firewall is a type of network security device installed on a system or network perimeter. It monitors and manages network traffic. They also allow you to block content filtering and remote access.

Describe the 3-way handshake.

A three-way handshake is a procedure used in a TCP/IP network to establish a client-host connection and exchange packets. Here’s the three-step procedure: \

  • The client sends an SYN (synchronization) to check for available ports and whether the server is online.

  • If the client has open ports, the server will send an SYN-ACK message.

  • The client acknowledges the message and returns an ACK(Acknowledgment) packet to the server.

What distinguishes HIDS and NIDS from one another?

Both HIDS (Host IDS) and NIDS (Network IDS) are intrusion detection systems that find intrusions. Programmers employ the HIDS on a specific host or device — the only distinction. It keeps an eye on a device’s suspicious system activity and traffic. However, NIDS is configured on a network. It keeps track of every network device’s traffic.

What are the possible response codes for a web application?
  • Informational responses

  • Server-side error

  • Redirection

  • Client-side error

  • Success

What distinguishes penetration testing (PT) from vulnerability assessment (VA)?

Vulnerability assessment is a process for finding target faults. In this case, the organization is aware that its systems or networks have defects or weaknesses, and they want to identify these flaws and prioritize them.

Meanwhile, penetration testing is a process for finding vulnerabilities. In this scenario, the firm would have installed all security precautions they could think of and would wish to investigate any more vulnerabilities in their network or system.\

What procedures are involved in installing a firewall?

Here are the steps to install a firewall:

  • Username/password: Change a firewall device's default password

  • Remote administration: Turn off the remote administration feature.

  • Port forwarding:Set up the proper port forwarding to ensure applications like a web or FTP server function properly.

  • DHCP server:Disable the firewall’s DHCP server to ensure no conflict.

  • Logging:Enable logging and learn how to view logs to fix firewall problems or potential assaults.

  • Security policies: Establish strong, enforceable security policies for your firewall.

How does the SSL protocol guarantee network security?

The SSL (Secure Sockets Layer) authenticates the sender and establishes secure connections between the browser and web server. Still, it does not offer security once the data has been sent to the server. That’s why server-side encryption and hashing are necessary to guard against data breaches. \

Establishing an SSL connection:
  • A browser tries to establish a connection with an SSL-secured web server.

  • A copy of the browser's SSL certificate is sent to the browser.

  • The browser verifies the SSL certificate's trustworthiness.

  • If it is reliable, the browser notifies the web server that it wants to create an encrypted connection.The web server transmits an acknowledgment to create an SSL-encrypted connection.

  • The web server and browser communicate using SSL encryption.

How can you secure a server?

Secure servers encrypt and decode data using the Secure Sockets Layer (SSL) protocol to prevent unauthorized access to it. Here are four fast ways to safeguard a server:

  • Step 1:Make sure your root and administrator account passwords are safe.

  • Step 2:Create new users to manage the system.

  • Step 3: Ensure the root and administrator accounts cannot access the internet by default.

  • Step 4: Configure your firewall rules for remote access.

What do you know about data leakage?

Data leakage is a purposeful or unintentional transmission of data (private information from within the company to an unapproved outside location (unauthorized party). Based on how it occurs, we can split data leakage into three categories:

  • Accidental Breach:When an organization accidentally sends information to a third party due to a mistake or error.

  • Intentional Breach:When an authorized entity sends data to an unauthorized party on purpose.

  • System hack:A hacker accesses private data.

You can stop data leakage with DLP (Data Leakage Prevention) tools, software, and techniques.\

What is a brute force attack? What can you do to stop it?

Brute force is a method for accessing credentials by trial and error — continually attempting all possible combinations of credentials until you hit the right one. Here’s how you can avoid brute force attacks:

  • Maximum Length Password:Specify the maximum length of a password, so it becomes harder to find the right combination.

  • Password Complexity:Requiring many character types in the password makes brute force attacks more difficult. You might establish requirements for special characters, upper- and lower-case letters, and numbers.\

  • Limiting Login Attempts:Establish a cap on failed login attempts, which makes it impossible to try all possible password combinations.

Why do ports get scanned?

Port scanning is a technique to determine a host’s available and open ports. Hackers use it to exploit vulnerabilities, while administrators use it to check the network's security procedures. Common methods for port scanning include:

  • Ping Scan

  • TCP Half-Open

  • TCP Connect

  • UDP

  • Stealth Scanning

What are the OSI model layers?

The OSI layers are as follows:

  • Physical layer:Digital data transmission from sender to receiver via a communication medium.

  • Data Link Layer:Encodes and decodes data bits and controls data transfer to and from the physical link.

  • Network Layer:Forwards packets and offers routing channels for network communication.

  • Transport Layer:Ensures end-to-end network connection by dividing the data from the layer above, sending it to the network layer, and verifying the recipient received all the data.

  • Session Layer:Establishes and manages a session-layer connection between the sender and the recipient. In addition to starting, halting, and controlling the session, it is responsible for establishing, maintaining, and synchronizing contact between the sender and the receiver.

  • Presentation Layer:Displays the data in a suitable manner and structure.

  • Application Layer:Interface between the network and the application, emphasizing process communication on a communication interface.

PreviousS3NextQuestions with Steps

Last updated 2 years ago