MockQuestions

ATT Cybersecurity Interview Questions

30 Questions and Answers by

Kelly Burlison is an experienced healthcare and quality measurement professional with experience interviewing in the healthcare field focusing on IT.

ATT Cybersecurity was published on March 7th, 2019. Learn more here.

Question 1 of 30

How will you detect an incident or data breach, and what steps do you take to prevent it from happening?

Next Question  

List of 30 ATT Cybersecurity Interview Questions & Answers

To view our answers examples, please upgrade.

  1. 1.

    How will you detect an incident or data breach, and what steps do you take to prevent it from happening?

  2. 2.

    What tools do you use when managing a project?

  3. 3.

    Describe to me what encoding, encryption, and hashing are, how they work, and what the differences are between the three?

  4. 4.

    Can you describe the difference between a Black Hat, White Hat and Grey Hat hacker?

  5. 5.

    There have been several virus attacks recently, what have you done to protect your organization from these cyber attacks?

  6. 6.

    Malicious Software, or Malware, has many meaning and connotations. What is your definition of Malware and how would you explain it to a client?

  7. 7.

    Can you explain what a public and private key is in the world of public-key cryptography, and which key is used for which function?

  8. 8.

    What's the difference between Diffie-Hellman and RSA, and how do they apply to cryptography and encryption?

  9. 9.

    Most of our clients believe they have taken the necessary steps to protect themselves against malware. However since they tend to focus on a small subset of threats, this isn't usually true. Can you list the types of malware clients should be aware of?

  10. 10.

    Many companies are new to the cloud computing environment. How do you brief them about what security aspects come with a cloud?

  11. 11.

    During the implementation of a hosted cloud environment, our IT team emphasizes that the most insecure component of a cloud infrastructure is the data transmission process. How do you recommend customers secure data while transferring it to the cloud?

  12. 12.

    What do you think is the most important information security concern with most organizations right now?

  13. 13.

    What strategies do you use in preparing for and mitigating risk in the project management process?

  14. 14.

    What actions do you take when you recognize project deadlines will not be met?

  15. 15.

    What's the difference between a threat, vulnerability, and a risk, and how do you assess the severity of a threat for example?

  16. 16.

    One of the most prevalent types of attempts at intrusions we see when monitoring our clients' networks is a Distributed Denial of Service (DDoS) attack. Can you explain what a DDoS is and what you would recommend to clients to prevent it?

  17. 17.

    Can you explain the impact edge computing has on a company's network and why this is important?

  18. 18.

    What are the various ways to inform employees about information security policies and procedures?

  19. 19.

    Give me your opinion on Blockchain technology, and how do you think it will revolutionize cyber security?

  20. 20.

    In addition to monitoring our customer's online security, we provide them with periodic reports about threats and attempts to penetrate their network. What objects do you feel should be included in a security penetration report?

  21. 21.

    What is the difference between Asymmetric and Symmetric encryption and which one is better?

  22. 22.

    Our company provides customers with details of our policies, processes, and guidelines for setting up and managing their hosted resources. However, often the clients are confused by this information. How would you help them better understand it?

  23. 23.

    In a situation where a user needs admin rights on his system, what is the protocol that you follow to grant or restrict admin access?

  24. 24.

    Can you name some open source cloud computing platform databases?

  25. 25.

    Can you explain the security requirements we must adhere to in order to confirm that our customers' data is secure in the cloud?

  26. 26.

    There are different levels of data classification, how are they structured, and why are they required?

  27. 27.

    How would you educate our clients to recognize the symptoms of malware so they can notify us of an intrusion so we can begin to take measures to remediate it?

  28. 28.

    What is a false positive and false negative alert in the case of Intrusion Detection Systems?

  29. 29.

    Even though we have taken measures to protect our client's data and create a secure cloud environment, some of our clients have had incidents of potential intrusion from unauthorized sources. Tell me how you advise clients to prevent intrusions.

  30. 30.

    Tell me what your favorite security assessment tools are, and why you prefer them over others?