Find jobs for information security officer

Information security officer Interview Questions


Information Security Officer interview questions shared by candidates

Top Interview Questions

Sort: Relevance|Popular|Date
Frontline Education
Information Security Officer was asked...January 30, 2020

How many years of formal CISO title do you have?

4 Answers

More than enough to call out a lazy leader

I think nothing will change if all recruiters in the world are fired.

Finally, we hired somebody after 6 months. With COVID-19, we will fire him soon. Seems like a looser who will not survive Less

Show More Responses

What is the best anti-virus software

3 Answers

Bit Defender is the best as far as I know

Trend micro. And right now you need to look further for EDR solution



Aptitude question were very easy and u have to only apply simple logic. For instance; A C F K? Find the next word?

3 Answers

So the answer is R

Answer will be p

how ans will be R ?

Fourth Dimension Technologies

types of topologies in network?

2 Answers

BUS Topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly two endpoints, then it is called Linear Bus topology. RING Topology It is called ring topology because it forms a ring as each computer is connected to another computer, with the last one connected to the first. Exactly two neighbours for each device. STAR Topology In this type of topology all the computers are connected to a single hub through a cable. This hub is the central node and all others nodes are connected to the central node. MESH Topology It is a point-to-point connection to other nodes or devices. All the network nodes are connected to each other. Mesh has n(n-1)/2 physical channels to link n devices. Less

OSI layer

Data Axle

They wanted answers to the problems they were facing

2 Answers

I sensed a fouls play in my second interview and have them answers that involved long term solutions. Less

Seems the person they hired for this role for let go within 6 months. I dodged a bullet! Less


How do you change a culture of insecurity?

2 Answers

You have to impress upon people the urgency of protecting the information. I can't change the culture, culture change comes from executives. Less

Most organizations can rationalize the basic need for security. Usually, if there is a cultural barrier it is because there has been high transactional cost in the past. If Security is seen as a barrier to staff doing their work, they will resist, and mightily. If you're trying to reset the culture, first ask about the experience of the staff and how they think about the workflow, the functionality of the IT system. With their feedback in mind, you can start to understand how to remove those blocks and develop influence over the culture. Less

Weiser Security

Can you work night shifts.

1 Answers

Yes, I prefer night shifts because I'm a night owl.

TTTech Computertechnik

What can you bring to the workplace?

1 Answers

I can bring positive personality, positive addons to the team, good wroking ability, diligence and profesionalism. Less

Form3 Financial Cloud

What is the difference between encode, encrypt and hash ?

1 Answers

To encode effectively means to convert the data into a format readable in an exchange between different systems. Hashing ensures the integrity of data and Encryption protects the data from being made accessible to unauthorised parties. Less

Korn Ferry

Why are you looking to leave your current employer?

1 Answers

I'm not actively looking but the opportunity you presented is compelling enough to give it the attention it deserves. Less

Viewing 1 - 10 of 549 Interview Questions