Interviewing
BlogInterviewing GuideGovernance, Risk, and Compliance
  • Overview
  • Intro
    • General
      • Tell Me About Yourself
      • What are you looking for in a new role?
      • What is your greatest weakness?
      • What are your greatest strengths?
      • Describe Your Leadership Style?
    • Career
      • Elevator Pitch
      • Job History
    • Behavioral-Based
      • Time when you came up with a new approach to a problem.
      • Describe a project that required input from people at different levels in the organization.
      • Encountered a problem and how you resolved it.
      • Juggle multiple important projects.
      • Most innovative new idea that you have implemented?
      • What project have you done that you're most proud of?
  • AWS
    • General
      • Can you describe the different components of AWS security?
      • Ensure the security of its data centers?
      • Concept of least privilege and how it applies to AWS?
      • How does AWS implement network security?
      • Types of AWS Identity and Access Management (IAM) policies?
      • AWS Secure Sockets Layer (SSL) and Transport Layer Security (TLS) work?
      • AWS Security Groups and how they can be used to control inbound and outbound traffic
      • How does AWS implement encryption to protect data at rest and in transit?
      • Can you describe the different types of AWS firewalls (e.g. Network Firewall, Web Application Firewa
      • Enable secure access to resources using IAM roles and temporary credentials?
      • How does AWS enable secure data transfer using AWS Transfer Family (e.g. SFTP, FTPS)?
      • How does AWS enable secure application development using services such as AWS Secrets Manager and AW
      • Features of AWS Shield and how it can be used to protect against DDoS
      • Enable secure communication between services using VPC endpoints and AWS PrivateLink?
      • Can you describe the security features of AWS Direct Connect and how it can be used to establish a s
    • Securing
      • How can you secure access to S3 buckets?
      • What is AWS KMS and how can it be used to secure data?
      • Secure access to an AWS database
      • Secure an application running on an EC2 instance
      • Protect against security breaches on AWS?
      • Ensure the security of user data stored in AWS
      • Secure access to the AWS management console
      • Secure data stored in the AWS with encryption
      • Secure your AWS infrastructure from unauthorized access
      • Secure data in transit and at rest in AWS
      • Secure access to your Amazon Elastic Container Service (ECS) clusters
      • Using Amazon Virtual Private Cloud (VPC) to secure your resources
      • AWS WAF to protect against web-based attacks
      • AWS Certificate Manager (ACM) to secure your website and applications
    • S3
  • Security Domains & Technical Aptitude
    • General
      • Questions with Steps
        • What are the steps when securing a Linux server?
        • Explain what happens when you type domain in the browser and press enter
    • Security & Privacy Governance
    • Cloud Security
    • Compliance
      • Frameworks
        • SOC 2
        • ISO 27001
      • What are the steps to a SOC 2 Gap Analysis?
      • Auditing
      • Internal Audit
      • Internal Audit Program
      • What are the steps of of performing a tabletop exercise?
    • Cryptographic Protections
      • Cryptography
        • What is cryptography?
        • What are the different types of cryptographic algorithms?
        • What is the difference between symmetric and asymmetric cryptography?
        • What is a hashing algorithm?
        • What is public-key cryptography?
        • What is the purpose of digital signatures?
        • How are digital signatures authenticated?
        • What is the difference between encryption and hashing?
        • How does encryption ensure the confidentiality of data?
        • What is the difference between encryption and steganography?
        • What is the difference between a cipher and a code?
        • What is a one-time pad?
        • What is the difference between symmetric and asymmetric key sizes?
        • What is a key management system?
        • What is a digital certificate?
        • What is the difference between a digital signature and a hash?
        • What’s the difference between Diffie-Hellman and RSA?
        • What is Forward Secrecy?
        • What are block and stream ciphers?
        • What are some examples of symmetric encryption algorithms?
        • What are some examples of asymmetric encryption algorithms?
      • TLS
        • What is TLS?
        • What is the purpose of TLS?
        • How does TLS work?
        • What are the main components of TLS?
        • What are the benefits of using TLS?
        • What are the differences between TLS and SSL?
        • What are the key algorithms used in TLS?
        • What is a TLS certificate?
        • What are the different versions of TLS?
        • What are the common vulnerabilities of TLS?
        • What is a TLS handshake?
        • What is a TLS session?
        • What is a TLS tunnel?
        • How can I configure TLS on my server?
        • What is the difference between TLS and IPsec?
        • Does TLS use symmetric or asymmetric encryption?
        • Describe the process of a TLS session being set up when someone visits a secure website.
        • What’s more secure, SSL, TLS, or HTTPS?
    • Data Classification & Handling
      • DLP
        • Data Exfiltration
        • Data Leakage
      • Data at Rest
      • Data in Transit
        • How do you ensure data is encrypted when stored and transferred?
    • Identification & Authentication
      • SAML
      • MFA
      • SSO
      • IAM Questions
    • Network Security
      • General
      • DNS
        • What is DNS Resolution?
        • What is DNS?
        • What is a Name Server?
        • What is a DNS Record?
        • What is a A Record?
        • What is a AAAA Record?
        • What is a CNAME Record?
        • What is PTR Record?
        • What is a MX Record?
        • What is a ND Record?
        • Explain DNS Record TTL?
        • Is DNS using TCP or UDP?
        • What are the steps in a DNS lookup?
        • Why is DNS monitoring important?
      • Networking
        • What is the network layer?
        • What happens at the network layer?
        • What is a packet?
        • What is the OSI model?
        • What is the TCP/IP Model?
        • OSI model vs. TCP/IP model
        • What is the difference between the 'network' layer and the 'Internet' layer?
        • What protocols are used at the network layer?
        • How do these concepts relate to websites and applications users access over the Internet?
      • TCP/IP Model
    • Privacy
      • Data Privacy - General
        • Data Privacy (Facts)
          • 25 Data Privacy Questions
        • Data categorization
        • Data Anonymization
        • Data Classification
        • Data Inventory
      • HIPAA (Facts)
        • HIPAA Security Rule
          • 25 HIPAA Security Rule Questions
        • HIPAA Privacy Rule
          • 25 HIPAA Privacy Rule
        • Breach Notification Rule and Omnibus Rule of 2013
      • Business Associate Agreement (Facts)
        • 20 BAA Questions
      • Data Use Agreement (Facts)
        • Questions
      • GDPR (Facts)
        • Questions
        • What steps have you taken to protect customer data in light of GDPR?
        • How do you handle personal data requests from customers?
        • Are you aware of the rights customers have under GDPR?
        • How do you handle customer requests to delete their data?
        • Do you have procedures in place to report data breaches in light of GDPR?
        • How do you ensure that third-party vendors comply with GDPR?
        • How do you ensure compliance with GDPR?
    • Risk Management
      • Risk Management
        • Is there an acceptable level of risk?
        • How do you measure risk?
        • What’s the difference between a threat, vulnerability, and a risk?
        • What is the primary reason most companies haven’t fixed their vulnerabilities?
        • What’s the difference between a threat, vulnerability, and a risk?
      • Risk Assessment
        • Cyber Risk Assessment
          • Cyber Risk Assessment Steps
        • 30 Risk Assessment Questions
        • What are the steps of adding a risk to the Risk Register?
        • How do you perform risk assessments for threats?
        • How do you assess and manage third-party risk?
      • Business Impact Assessment
    • Mobile Device Management
      • How do you ensure that all mobile devices are compliant with corporate policies?
      • How do you handle mobile device security issues?
    • Third-Party Management
      • Vendor Risk
        • Vendor Risk Assessment Steps
        • Vendor Contract Reviews
        • Assessing Cloud Vendors
        • Third-Party Data Protection
        • Review of Security Requirements for Contracts
        • Vendor Management Tasks
        • Questions
          • How do you ensure that vendor data is properly secured and protected?
          • What measures do you take to ensure the vendor risk assessment is accurate and up to date?
          • Describe the process you use to conduct a vendor risk assessment?
          • What criteria do you use to evaluate the risks associated with a vendor?
          • How do you monitor and assess a vendor's performance?
          • How do you handle vendor disputes?
          • What is your experience in developing vendor risk assessment policies?
          • How do you ensure that all vendors comply with your risk assessment policy?
          • How do you determine the level of risk associated with a vendor?
          • What steps do you take to ensure the security of vendor data?
          • How do you respond to a potential vendor risk incident?
          • What measures do you take to ensure the accuracy of vendor data?
          • What types of control activities do you perform to mitigate vendor risk?
    • Web Security
      • What measures do you take to ensure the security of a web application?
  • Project Coordination & Collaboration
    • Project Management
      • What challenges have you faced in project management and how did you overcome them?
      • How do you measure the success of a project?
      • What are the proper steps to managing a project from start to finish?
  • Not Ready
    • Vulnerability & Patch Management (Empty)
    • Threat Management (Empty)
    • Security Awareness & Training (Empty)
    • Security Operations (Empty)
    • Secure Engineering & Architecture (Empty)
    • Information Assurance (Empty)
    • Incident Response (Empty)
    • Endpoint Security (Empty)
    • Continuous Monitoring (Empty)
    • Configuration Management (Empty)
    • Asset Management (Empty)
    • Change Management (Empty)
    • Business Continuity & Disaster Recovery (Empty)
Powered by GitBook
On this page
  1. Security Domains & Technical Aptitude
  2. Network Security

Networking

  1. What is networking? Answer: Networking is the practice of connecting computers and other electronic devices together to share data and resources.

  2. What is a network protocol? Answer: A network protocol is a set of rules that govern communication between computers on a network.

  3. What is a LAN? Answer: A LAN (local area network) is a network that spans a relatively small area, such as a single building or campus.

  4. What is a WAN? Answer: A WAN (wide area network) is a network that spans a large geographic area, such as multiple cities or countries.

  5. What is a router? Answer: A router is a device that forwards data packets between two or more networks.

  6. What is a switch? Answer: A switch is a device that connects multiple devices together on a single network.

  7. What is a hub? Answer: A hub is a device that connects multiple devices together on a single network.

  8. What is a gateway? Answer: A gateway is a device that acts as a bridge between two networks and forwards data packets between them.

  9. What is VLAN? Answer: VLAN (Virtual Local Area Network) is a technology that allows you to logically segment a single physical network into multiple virtual networks.

  10. What is a bridge? Answer: A bridge is a device that connects two or more networks together, allowing them to communicate with each other.

  11. What is IP addressing? Answer: IP addressing is the process of assigning a unique identifier to each device on a network, so that they can be identified and communicated with.

  12. What is an IP address? Answer: An IP address is a unique identifier assigned to each device on a network. It is used to identify and communicate with devices on the network.

  13. What is a subnet mask? Answer: A subnet mask is a number used to identify a specific network on a larger network. It is used to determine which part of an IP address is the network address and which part is the host address.

  14. What is a network topology? Answer: A network topology is the physical and logical layout of a network, including the nodes and the connections between them.

  15. What is the difference between a router and a switch? Answer: A router is a device that forwards data packets between two or more networks, while a switch is a device that connects multiple devices together on a single network.

  16. What is a firewall? Answer: A firewall is a security system that monitors and controls incoming and outgoing network traffic, based on a set of predetermined rules.

  17. What is the Open Systems Interconnection (OSI) model? Answer: The Open Systems Interconnection (OSI) model is a conceptual framework that describes the functions of a communication system at seven layers.

  18. What is a network security policy? Answer: A network security policy is a document that outlines the rules and guidelines for how a network should be managed and used. It is designed to protect the network from threats and unauthorized access.

  19. What is a virtual private network (VPN)? Answer: A virtual private network (VPN) is a private network that is created over a public network. It is used to securely connect remote users to the corporate network.

  20. What is ARP? Answer: ARP (Address Resolution Protocol) is a protocol used to map IP addresses to physical addresses on a network.

  21. What is NAT? Answer: NAT (Network Address Translation) is a method of using a single public IP address to hide the IP addresses of multiple devices on a private network.

  22. What is a proxy server? Answer: A proxy server is a computer that acts as a gateway between a local network and the Internet. It is used to provide access to the Internet while protecting the local network from malicious traffic.

  23. What is a VPN tunnel? Answer: A VPN tunnel is a secure connection between two points over a public network. It is used to securely connect remote users to the corporate network.

  24. What is a DHCP server? Answer: A DHCP server is a computer that provides automatic configuration of IP addresses for computers on a network.

  25. What is a DNS server? Answer: A DNS server is a computer that resolves domain names to IP addresses.

  26. What is a WAP? Answer: A WAP (Wireless Access Point) is a device that provides wireless network access to devices on a network.

  27. What is an access point? Answer: An access point is a device that provides wireless network access to devices on a network.

  28. What is a modem? Answer: A modem is a device that converts digital signals from computers into analog signals so that they can be transmitted over telephone lines.

  29. What is a bridge mode? Answer: Bridge mode is a mode of operation for a network device that allows it to act as a bridge between two or more networks.

  30. What is Quality of Service (QoS)? Answer: Quality of Service (QoS) is a set of techniques used to prioritize network traffic, so that certain types of traffic can be given higher priority than others.

  31. What is a Network Interface Card (NIC)? Answer: A Network Interface Card (NIC) is a device that connects a computer to a network.

  32. What is a network address translation (NAT)? Answer: Network address translation (NAT) is a method of using a single public IP address to hide the IP addresses of multiple devices on a private network.

  33. What is a Domain Name System (DNS)? Answer: The Domain Name System (DNS) is a distributed database that maps domain names to IP addresses.

  34. What is a virtual LAN (VLAN)? Answer: A virtual LAN (VLAN) is a technology that allows you to logically segment a single physical network into multiple virtual networks.

  35. What is a wireless access point (WAP)? Answer: A wireless access point (WAP) is a device that provides wireless network access to devices on a network.

PreviousWhy is DNS monitoring important?NextWhat is the network layer?

Last updated 2 years ago