Information security officer Interview Questions
549
Information Security Officer interview questions shared by candidates
How many years of formal CISO title do you have?
4 Answers↳
More than enough to call out a lazy leader
↳
I think nothing will change if all recruiters in the world are fired.
↳
Finally, we hired somebody after 6 months. With COVID-19, we will fire him soon. Seems like a looser who will not survive Less

What is the best anti-virus software
3 Answers↳
Bit Defender is the best as far as I know
↳
Trend micro. And right now you need to look further for EDR solution
↳
Icare

Aptitude question were very easy and u have to only apply simple logic. For instance; A C F K? Find the next word?
3 Answers↳
So the answer is R
↳
Answer will be p
↳
how ans will be R ?

types of topologies in network?
2 Answers↳
BUS Topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly two endpoints, then it is called Linear Bus topology. RING Topology It is called ring topology because it forms a ring as each computer is connected to another computer, with the last one connected to the first. Exactly two neighbours for each device. STAR Topology In this type of topology all the computers are connected to a single hub through a cable. This hub is the central node and all others nodes are connected to the central node. MESH Topology It is a point-to-point connection to other nodes or devices. All the network nodes are connected to each other. Mesh has n(n-1)/2 physical channels to link n devices. Less
↳
OSI layer


How do you change a culture of insecurity?
2 Answers↳
You have to impress upon people the urgency of protecting the information. I can't change the culture, culture change comes from executives. Less
↳
Most organizations can rationalize the basic need for security. Usually, if there is a cultural barrier it is because there has been high transactional cost in the past. If Security is seen as a barrier to staff doing their work, they will resist, and mightily. If you're trying to reset the culture, first ask about the experience of the staff and how they think about the workflow, the functionality of the IT system. With their feedback in mind, you can start to understand how to remove those blocks and develop influence over the culture. Less



What is the difference between encode, encrypt and hash ?
1 Answers↳
To encode effectively means to convert the data into a format readable in an exchange between different systems. Hashing ensures the integrity of data and Encryption protects the data from being made accessible to unauthorised parties. Less
