Cyber Security Interview Questions and Answers | Encoding, Encryption, and Hashing | Threat vs Risk

preview_player
Показать описание
In this video, I will be answering some cybersecurity interview questions that I've been collecting over time. The goal of this video is to show some realistic questions that might be asked in your next interview and give some ideas on how to thoughtfully answer some of these questions. Please post any corrections in the comments!

⭐ 1-on-1 Mentoring ⭐

📹 - Video Links - 📹

🙇‍♂️ - Patreon - 🙇‍♂️

⌨️ - Coding - ⌨️

⭐️ - Social Media - ⭐️

🎥 - Equipment - 🎥

📄 - Sample Resumes - 📄

0:00 Intro
0:51 What is on your home network?
2:26 What is the difference between a threat, a vulnerability, and a risk?
4:33 How do you go about securing a server?
6:52 Why is DNS monitoring important?
8:50 What port does ping work over?
9:34 What is the difference between encoding, encrypting, and hashing?
11:20 Outro

Cyber Security Interview Questions and Answers | Realistic Interview Preparation (Questions 1-6)
CyberSecurity Interview Questions and Answers | Realistic Interview Preparation (Questions 1-6)
What is on your home network?
What is the difference between a threat, a vulnerability, and a risk?
How do you go about securing a server?
Why is DNS monitoring important?
What port does ping work over?
What is difference between encoding, encrypting, and hashing?

DISCLAIMER: This video description has some affiliate links and I may receive a small commission. I only share stuff that I use and believe in. Thanks so much for your support 🥺
Рекомендации по теме
Комментарии
Автор

So glad you're making this series, thanks for taking the time to put this all together! I especially like the Answer/Explain mode format, super helpful.

hthr
Автор

OMG thank you, I've got a second interview coming up Thursday and I just watched your other interview questions video last night to pass the one I had today. So, thank you for your content from a fellow WGU grad!

imoen
Автор

Have an interview tomorrow. Using this as my template!

soldiermedic
Автор

Those were great answer mode. Extremely detailed but straight to the point. I am making notes

mahakhan
Автор

Awesome Material Josh. I have no experience in cyber security. This really helps.

ngole
Автор

Greatest video and questions keep up the great work

TechAiExpert
Автор

Nice explanation. I always got confused on the differences of risk, threat, and vulnerability.

roberttolito
Автор

Josh sensei

Thanks for your sharing. I would like to see the technical interview, which includes some commands test (maybe Linux) or Scripting based on the interviews you still remember or what you would do if you were hiring a manager.
I think you have both CS (developer) and Cyber security (security) sides. So it is exciting, and I will encounter some when I finish my master's next March and change my jobs.

takaoda
Автор

Looking forward to the series. Would help to eliminate phrases such as "like" and "kind of".

yvltotj
Автор

Please can you bring up some interview questions on RMF?
Thank you

renestevens
Автор

This was great, thank you Josh. Subscribing
If I may suggest a question for the next episode, would love to hear your take on:
What happens when you go to google website?

hiddanek
Автор

Please share a interview video on Mitra attack and cyber kill chain

nitish
Автор

If a host has the IP address information stored in browser or OS cache, it won't be affected by DNS poisoning because it modifies actual cache on the DNS server, right? Do you know how long the browser and OS cache might remain until a host needs to do another dns query?

Keyumiz
Автор

Help to secure security clearance job and how do I get I switched from aviation to IT now but no job so help

mawellyankah
Автор

Hello. I currently work in I.T. and would like to study cybersecurity. What would you say would be the best approach for me to get started? Books, mentors, video, etc.. thank you

vnsmur