filmov
tv
Cyber Security Interview Questions and Answers | Vulnerability Remediation and Incident Response
![preview_player](https://i.ytimg.com/vi/cY9rnkWz7Ng/maxresdefault.jpg)
Показать описание
In this video, I will be answering some cybersecurity interview questions that I've been collecting over time. The goal of this video is to show some realistic questions that might be asked in your next interview and give some ideas on how to thoughtfully answer some of these questions. Please post any corrections in the comments!
⭐ 1-on-1 Mentoring ⭐
📹 - Video Links - 📹
🙇♂️ - Patreon - 🙇♂️
⌨️ - Coding - ⌨️
⭐️ - Social Media - ⭐️
🎥 - Equipment - 🎥
📄 - Sample Resumes - 📄
0:00 Intro
0:22 You have completed a risk assessment and you determine that an identified vulnerability is High risk and requires a control to be implemented on a legacy system. The system administrator/ manager disagrees with your assessment. The system administrator/ manager believes the risk has been overstated and the risk is actually low due to it being internal (not external facing). Also, the mitigation strategy you recommend may impact their fragile, but very important legacy system. You reassessed the risk and still believe the risk is High. How do you proceed? What and how do you communicate?
5:30 Describe a time when you were involved with a security incident/ breach. Describe the incident, how it was detected, your role regarding the incident and controls put in place to address it.
9:15 Outro
Cyber Security Interview Questions and Answers | Vulnerability Remediation and Incident Response
CyberSecurity Interview Questions and Answers | Vulnerability Remediation and Incident Response
DISCLAIMER: This video description has some affiliate links and I may receive a small commission. I only share stuff that I use and believe in. Thanks so much for your support 🥺
⭐ 1-on-1 Mentoring ⭐
📹 - Video Links - 📹
🙇♂️ - Patreon - 🙇♂️
⌨️ - Coding - ⌨️
⭐️ - Social Media - ⭐️
🎥 - Equipment - 🎥
📄 - Sample Resumes - 📄
0:00 Intro
0:22 You have completed a risk assessment and you determine that an identified vulnerability is High risk and requires a control to be implemented on a legacy system. The system administrator/ manager disagrees with your assessment. The system administrator/ manager believes the risk has been overstated and the risk is actually low due to it being internal (not external facing). Also, the mitigation strategy you recommend may impact their fragile, but very important legacy system. You reassessed the risk and still believe the risk is High. How do you proceed? What and how do you communicate?
5:30 Describe a time when you were involved with a security incident/ breach. Describe the incident, how it was detected, your role regarding the incident and controls put in place to address it.
9:15 Outro
Cyber Security Interview Questions and Answers | Vulnerability Remediation and Incident Response
CyberSecurity Interview Questions and Answers | Vulnerability Remediation and Incident Response
DISCLAIMER: This video description has some affiliate links and I may receive a small commission. I only share stuff that I use and believe in. Thanks so much for your support 🥺
Комментарии