Find jobs for cyber security consultant

Cyber security consultant Interview Questions

2K

Cyber Security Consultant interview questions shared by candidates

Top Interview Questions

Sort: Relevance|Popular|Date
American Institutes for Research
Senior Cyber Security Engineer was asked...July 28, 2015

What sort of anomalies would you look for to identify a compromised system?

1 Answers

I used a whiteboard to draw out a basic network architecture including security technologies like IPS/IDS, Firewalls, AV, etc, and described the type of traffic and logs I could use to identify a compromised system. Less

Thermo Fisher Scientific

Tell me about​ yourself?

7 Answers

I’m a fantastic person looking to pay my bills

I am a hairdresser for 23 years looking for different opportunities with benefits Less

I am a hairdresser for 23 years looking for different opportunities with benefits Less

Show More Responses
US Air Force

Do you have a high school diploma?

4 Answers

Yes

Yes. Here it is.

Yes

Show More Responses
VDart

What is your availability and ability to get the job done

3 Answers

I am available 24/7 whenever wherever

Asap

I am available full time

Deloitte

What is the CIA Triad?

3 Answers

Confidentiality, Integrity and Availability*

“These three letters stand for confidentiality, integrity, and availability, otherwise known as the CIA triad. Together, these three principles form the cornerstone of any organization's security infrastructure; in fact, they (should) function as goals and objectives for every security program.” Less

confidentiality, integrity, accountablity

Metropolitan State University

Have you had much teaching experience?

2 Answers

Yes, I had taught numerous levels in education and in within non-education positions. Less

Yes

Best Buy

What is the difference between UDP and TCP?

2 Answers

TCP establishes connection before data transfer is done. In addition, any packet loss during transmission is re-transmitted for reliability. In UDP no connection is established before data is transferred. Less

How long did it take you to get the offer after the inteview ?

Sitel Group

What are the three pillars of information security ?

2 Answers

Confidentiality, integrity and availability CIA

Confidentiality, Integrity, Availability

Corporate Risk Solutions (Kansas)

They are so rigid in their interview process that I beleive they overlook talent and are focused on people passing Dr. Mercer's tests

2 Answers

three of the people I interviewed with were somewhat disgruntled with the company... overworked. Less

At the end of a 3 hour interview that went perfectly, I was told I'd meet the president of the company. Prez came in and said, "I have 5 minutes." He showed me a bad photocopy of the company's core values... status quo. I said, Yes! I agree. He asked me, "The client is always right. True or false?" I said, "Well, the short answer is 'yes, of course! But for the past decades there's a much larger understanding of customer relationships... and it involves developing a partnership and strong supply chain" . They never called me to inform me of the interview result. I reached out the the company director who never took or returned my calls. No wonder that outfit had a non-stop search for production supervisors and process engineers. The company will be gone in a few years. Less

Optomi

Will you be able to work nights?

2 Answers

Yes, I am willing to work the night shift.

Yes

Viewing 1 - 10 of 1,584 Interview Questions

See Interview Questions for Similar Jobs

information security analyst