Interviewing
BlogInterviewing GuideGovernance, Risk, and Compliance
  • Overview
  • Intro
    • General
      • Tell Me About Yourself
      • What are you looking for in a new role?
      • What is your greatest weakness?
      • What are your greatest strengths?
      • Describe Your Leadership Style?
    • Career
      • Elevator Pitch
      • Job History
    • Behavioral-Based
      • Time when you came up with a new approach to a problem.
      • Describe a project that required input from people at different levels in the organization.
      • Encountered a problem and how you resolved it.
      • Juggle multiple important projects.
      • Most innovative new idea that you have implemented?
      • What project have you done that you're most proud of?
  • AWS
    • General
      • Can you describe the different components of AWS security?
      • Ensure the security of its data centers?
      • Concept of least privilege and how it applies to AWS?
      • How does AWS implement network security?
      • Types of AWS Identity and Access Management (IAM) policies?
      • AWS Secure Sockets Layer (SSL) and Transport Layer Security (TLS) work?
      • AWS Security Groups and how they can be used to control inbound and outbound traffic
      • How does AWS implement encryption to protect data at rest and in transit?
      • Can you describe the different types of AWS firewalls (e.g. Network Firewall, Web Application Firewa
      • Enable secure access to resources using IAM roles and temporary credentials?
      • How does AWS enable secure data transfer using AWS Transfer Family (e.g. SFTP, FTPS)?
      • How does AWS enable secure application development using services such as AWS Secrets Manager and AW
      • Features of AWS Shield and how it can be used to protect against DDoS
      • Enable secure communication between services using VPC endpoints and AWS PrivateLink?
      • Can you describe the security features of AWS Direct Connect and how it can be used to establish a s
    • Securing
      • How can you secure access to S3 buckets?
      • What is AWS KMS and how can it be used to secure data?
      • Secure access to an AWS database
      • Secure an application running on an EC2 instance
      • Protect against security breaches on AWS?
      • Ensure the security of user data stored in AWS
      • Secure access to the AWS management console
      • Secure data stored in the AWS with encryption
      • Secure your AWS infrastructure from unauthorized access
      • Secure data in transit and at rest in AWS
      • Secure access to your Amazon Elastic Container Service (ECS) clusters
      • Using Amazon Virtual Private Cloud (VPC) to secure your resources
      • AWS WAF to protect against web-based attacks
      • AWS Certificate Manager (ACM) to secure your website and applications
    • S3
  • Security Domains & Technical Aptitude
    • General
      • Questions with Steps
        • What are the steps when securing a Linux server?
        • Explain what happens when you type domain in the browser and press enter
    • Security & Privacy Governance
    • Cloud Security
    • Compliance
      • Frameworks
        • SOC 2
        • ISO 27001
      • What are the steps to a SOC 2 Gap Analysis?
      • Auditing
      • Internal Audit
      • Internal Audit Program
      • What are the steps of of performing a tabletop exercise?
    • Cryptographic Protections
      • Cryptography
        • What is cryptography?
        • What are the different types of cryptographic algorithms?
        • What is the difference between symmetric and asymmetric cryptography?
        • What is a hashing algorithm?
        • What is public-key cryptography?
        • What is the purpose of digital signatures?
        • How are digital signatures authenticated?
        • What is the difference between encryption and hashing?
        • How does encryption ensure the confidentiality of data?
        • What is the difference between encryption and steganography?
        • What is the difference between a cipher and a code?
        • What is a one-time pad?
        • What is the difference between symmetric and asymmetric key sizes?
        • What is a key management system?
        • What is a digital certificate?
        • What is the difference between a digital signature and a hash?
        • What’s the difference between Diffie-Hellman and RSA?
        • What is Forward Secrecy?
        • What are block and stream ciphers?
        • What are some examples of symmetric encryption algorithms?
        • What are some examples of asymmetric encryption algorithms?
      • TLS
        • What is TLS?
        • What is the purpose of TLS?
        • How does TLS work?
        • What are the main components of TLS?
        • What are the benefits of using TLS?
        • What are the differences between TLS and SSL?
        • What are the key algorithms used in TLS?
        • What is a TLS certificate?
        • What are the different versions of TLS?
        • What are the common vulnerabilities of TLS?
        • What is a TLS handshake?
        • What is a TLS session?
        • What is a TLS tunnel?
        • How can I configure TLS on my server?
        • What is the difference between TLS and IPsec?
        • Does TLS use symmetric or asymmetric encryption?
        • Describe the process of a TLS session being set up when someone visits a secure website.
        • What’s more secure, SSL, TLS, or HTTPS?
    • Data Classification & Handling
      • DLP
        • Data Exfiltration
        • Data Leakage
      • Data at Rest
      • Data in Transit
        • How do you ensure data is encrypted when stored and transferred?
    • Identification & Authentication
      • SAML
      • MFA
      • SSO
      • IAM Questions
    • Network Security
      • General
      • DNS
        • What is DNS Resolution?
        • What is DNS?
        • What is a Name Server?
        • What is a DNS Record?
        • What is a A Record?
        • What is a AAAA Record?
        • What is a CNAME Record?
        • What is PTR Record?
        • What is a MX Record?
        • What is a ND Record?
        • Explain DNS Record TTL?
        • Is DNS using TCP or UDP?
        • What are the steps in a DNS lookup?
        • Why is DNS monitoring important?
      • Networking
        • What is the network layer?
        • What happens at the network layer?
        • What is a packet?
        • What is the OSI model?
        • What is the TCP/IP Model?
        • OSI model vs. TCP/IP model
        • What is the difference between the 'network' layer and the 'Internet' layer?
        • What protocols are used at the network layer?
        • How do these concepts relate to websites and applications users access over the Internet?
      • TCP/IP Model
    • Privacy
      • Data Privacy - General
        • Data Privacy (Facts)
          • 25 Data Privacy Questions
        • Data categorization
        • Data Anonymization
        • Data Classification
        • Data Inventory
      • HIPAA (Facts)
        • HIPAA Security Rule
          • 25 HIPAA Security Rule Questions
        • HIPAA Privacy Rule
          • 25 HIPAA Privacy Rule
        • Breach Notification Rule and Omnibus Rule of 2013
      • Business Associate Agreement (Facts)
        • 20 BAA Questions
      • Data Use Agreement (Facts)
        • Questions
      • GDPR (Facts)
        • Questions
        • What steps have you taken to protect customer data in light of GDPR?
        • How do you handle personal data requests from customers?
        • Are you aware of the rights customers have under GDPR?
        • How do you handle customer requests to delete their data?
        • Do you have procedures in place to report data breaches in light of GDPR?
        • How do you ensure that third-party vendors comply with GDPR?
        • How do you ensure compliance with GDPR?
    • Risk Management
      • Risk Management
        • Is there an acceptable level of risk?
        • How do you measure risk?
        • What’s the difference between a threat, vulnerability, and a risk?
        • What is the primary reason most companies haven’t fixed their vulnerabilities?
        • What’s the difference between a threat, vulnerability, and a risk?
      • Risk Assessment
        • Cyber Risk Assessment
          • Cyber Risk Assessment Steps
        • 30 Risk Assessment Questions
        • What are the steps of adding a risk to the Risk Register?
        • How do you perform risk assessments for threats?
        • How do you assess and manage third-party risk?
      • Business Impact Assessment
    • Mobile Device Management
      • How do you ensure that all mobile devices are compliant with corporate policies?
      • How do you handle mobile device security issues?
    • Third-Party Management
      • Vendor Risk
        • Vendor Risk Assessment Steps
        • Vendor Contract Reviews
        • Assessing Cloud Vendors
        • Third-Party Data Protection
        • Review of Security Requirements for Contracts
        • Vendor Management Tasks
        • Questions
          • How do you ensure that vendor data is properly secured and protected?
          • What measures do you take to ensure the vendor risk assessment is accurate and up to date?
          • Describe the process you use to conduct a vendor risk assessment?
          • What criteria do you use to evaluate the risks associated with a vendor?
          • How do you monitor and assess a vendor's performance?
          • How do you handle vendor disputes?
          • What is your experience in developing vendor risk assessment policies?
          • How do you ensure that all vendors comply with your risk assessment policy?
          • How do you determine the level of risk associated with a vendor?
          • What steps do you take to ensure the security of vendor data?
          • How do you respond to a potential vendor risk incident?
          • What measures do you take to ensure the accuracy of vendor data?
          • What types of control activities do you perform to mitigate vendor risk?
    • Web Security
      • What measures do you take to ensure the security of a web application?
  • Project Coordination & Collaboration
    • Project Management
      • What challenges have you faced in project management and how did you overcome them?
      • How do you measure the success of a project?
      • What are the proper steps to managing a project from start to finish?
  • Not Ready
    • Vulnerability & Patch Management (Empty)
    • Threat Management (Empty)
    • Security Awareness & Training (Empty)
    • Security Operations (Empty)
    • Secure Engineering & Architecture (Empty)
    • Information Assurance (Empty)
    • Incident Response (Empty)
    • Endpoint Security (Empty)
    • Continuous Monitoring (Empty)
    • Configuration Management (Empty)
    • Asset Management (Empty)
    • Change Management (Empty)
    • Business Continuity & Disaster Recovery (Empty)
Powered by GitBook
On this page
  • What is the General Data Protection Regulation (GDPR)?
  • What is the purpose of the GDPR?
  • Who does the GDPR apply to?
  • What are the key principles of the GDPR?
  • What are the rights of individuals under the GDPR?
  • What are the penalties for non-compliance with the GDPR?
  • How long do companies have to comply with the GDPR?
  • What is the role of a Data Protection Officer (DPO)?
  • What are the requirements for data security under the GDPR?
  • How should companies handle data breaches under the GDPR?
  • What are the requirements for obtaining consent under the GDPR?
  • What is the right to be forgotten?
  • What is the Privacy by Design principle?
  • What is the role of the Data Protection Authority (DPA)?
  • What is a data processor?
  • What is the role of a data controller?
  • What is the purpose of a data processing agreement?
  • What is pseudonymisation?
  • What is the purpose of a data protection impact assessment (DPIA)?
  • What are the requirements for transferring data outside the EU?
  • What is the purpose of the GDPR’s accountability principle?
  • What is the role of a supervisory authority?
  • What is the ePrivacy Directive?
  1. Security Domains & Technical Aptitude
  2. Privacy
  3. GDPR (Facts)

Questions

What is the General Data Protection Regulation (GDPR)?

The General Data Protection Regulation (GDPR) is a comprehensive data privacy law that regulates the collection, storage, and use of personal data of EU citizens. It came into effect on May 25, 2018, and applies to all companies that collect and process personal data of EU citizens.

What is the purpose of the GDPR?

The purpose of the GDPR is to ensure that the personal data of EU citizens is protected and to give them control over how their data is used. It also sets out rules for how companies should handle, process, and protect personal data.

Who does the GDPR apply to?

The GDPR applies to all companies that collect and process the personal data of EU citizens, regardless of where they are located.

What are the key principles of the GDPR?

The key principles of the GDPR are transparency, fairness, and accountability. Companies must be clear and transparent about how they are collecting and using personal data, they must handle it fairly and securely, and they must be accountable for their actions.

What are the rights of individuals under the GDPR?

Under the GDPR, individuals have the right to access, rectify, or erase their personal data, the right to object to the processing of their data, the right to restrict the processing of their data, and the right to data portability.

What are the penalties for non-compliance with the GDPR?

Companies that fail to comply with the GDPR can be subject to fines of up to 4% of their annual global turnover or €20 million, whichever is greater.

How long do companies have to comply with the GDPR?

Companies must be fully compliant with the GDPR by May 25, 2018.

What is the role of a Data Protection Officer (DPO)?

The role of a Data Protection Officer (DPO) is to ensure that a company is in compliance with the GDPR. The DPO is responsible for monitoring compliance, educating staff, and responding to inquiries from individuals about their personal data.

What are the requirements for data security under the GDPR?

Under the GDPR, companies must implement appropriate technical and organizational measures to ensure the security of personal data. This includes measures such as encryption, access control, and regular security assessments.

How should companies handle data breaches under the GDPR?

Companies must report any data breaches to the relevant supervisory authority within 72 hours of becoming aware of the breach. They must also notify the individuals affected by the breach without undue delay.

What are the requirements for obtaining consent under the GDPR?

Companies must obtain clear and informed consent from individuals before collecting, processing, or using their personal data. Consent must be freely given, specific, and informed, and must be revocable at any time.

What is the right to be forgotten?

The right to be forgotten is the right of individuals to have their personal data erased, or to have their data rectified if it is inaccurate.

What is the Privacy by Design principle?

The Privacy by Design principle is the idea that privacy should be built into products and services from the beginning. Companies should consider privacy when designing, developing, and implementing new services and features.

What is the role of the Data Protection Authority (DPA)?

The Data Protection Authority (DPA) is responsible for enforcing the GDPR. The DPA has the power to investigate companies, issue fines, and order them to take corrective action.

What is a data processor?

A data processor is a third-party entity that processes personal data on behalf of a controller. They must ensure that they are compliant with the GDPR and must adhere to any instructions given by the controller.

What is the role of a data controller?

A data controller is the entity that determines the purpose and means of processing personal data. They must ensure that their data processing activities are compliant with the GDPR and must take appropriate security measures to protect personal data.

What is the purpose of a data processing agreement?

A data processing agreement is a contract between a controller and a processor that outlines their respective roles and responsibilities in processing personal data. It must include provisions on security, data retention, and data subject rights.

What is pseudonymisation?

Pseudonymisation is the process of replacing identifying data in a dataset with unique identifiers. It can help to reduce the risk of a data breach and makes it harder to identify individuals in a dataset.

What is the purpose of a data protection impact assessment (DPIA)?

A data protection impact assessment (DPIA) is an assessment of the potential risks associated with a data processing activity. It helps companies to identify and mitigate any risks to the rights and freedoms of individuals.

What are the requirements for transferring data outside the EU?

Companies must ensure that any data transferred outside of the EU is protected in a way that is equivalent to the protection provided by the GDPR. They must also take appropriate security measures and enter into a data processing agreement with the recipient.

What is the purpose of the GDPR’s accountability principle?

The accountability principle requires companies to demonstrate that they are complying with the GDPR. Companies must be able to show that they are taking appropriate measures to protect the privacy of individuals and that they are handling their data in a secure and responsible manner.

What is the role of a supervisory authority?

Supervisory authorities are responsible for ensuring that companies comply with the GDPR. They have the power to investigate companies, issue fines, and order them to take corrective action.

What is the ePrivacy Directive?

The ePrivacy Directive is a European law that regulates the use of electronic communications services, such as email and instant messaging. It complements the GDPR and applies to any company that provides electronic communication services.

What is a data protection audit?

A data protection audit is an assessment of a company’s compliance with the GDPR. It involves a review of a company’s data processing activities, security measures, and policies and procedures.

PreviousGDPR (Facts)NextWhat steps have you taken to protect customer data in light of GDPR?

Last updated 2 years ago