MockQuestions

Garmin Mock Interview

Question 3 of 28 for our Garmin Mock Interview

Garmin was updated by on December 6th, 2019. Learn more here.

Question 3 of 28

At Garmin, we take security risks very importantly in our products. In your experience, what are the biggest security risks in software and what is your experience in any prevention methods?

"As I'm fully aware, cyber-security has become a very important issue over the past ten years. In my current role, our biggest security risk is injection of code used by hackers to access information in our web applications. To help prevent any risks associated with injection, we've implemented the use of a safe API and using specific LIMIT and other SQL controls within queries to prevent loss of records in case of an injection."

Next Question

How to Answer: At Garmin, we take security risks very importantly in our products. In your experience, what are the biggest security risks in software and what is your experience in any prevention methods?

Advice and answer examples written specifically for a Garmin job interview.

  • 3. At Garmin, we take security risks very importantly in our products. In your experience, what are the biggest security risks in software and what is your experience in any prevention methods?

      How to Answer

      As an expert in software industry, you are obviously aware of the many security risks that systems face in this day and age. For your answer to this question, talk knowledgeably about the security risks that you are most familiar with combating in your day to day work. Explain why the posed risk is important to combat against and talk about the methods you used to minimalize risk in the finished product.

      Written by Ryan Brunner on December 6th, 2019

      1st Answer Example

      "As I'm fully aware, cyber-security has become a very important issue over the past ten years. In my current role, our biggest security risk is injection of code used by hackers to access information in our web applications. To help prevent any risks associated with injection, we've implemented the use of a safe API and using specific LIMIT and other SQL controls within queries to prevent loss of records in case of an injection."

      Written by Ryan Brunner on December 6th, 2019

      2nd Answer Example

      "In the healthcare field where I currently work, broken authentication vulnerability has allowed attackers to hack into electronic medical records and gain control over those systems. This type of attack potentially puts hundreds of thousands of people at risk within a given system. We use many methods to prevent this type of security risk. First, we take the time to properly test the code before rolling out new updates to software. We also utilize very detailed external security audits. Other details we have implemented have been multi-factor authentication processes and recommendations to align password requirements with the NIST guidelines."