Master 38 NSA interview questions covering security clearances, technical assessments, and national security scenarios.
Question 28 of 38
Why the Interviewer Asks This Question
General
What You Need to Know
Tips
Community Answers

Kevin Downey has an extensive background in business management, recruiting, branding and marketing. He's volunteered his career coaching services at job fairs, lecturing on interview techniques and crafting winning resumes and cover letters.
So much of the NSA's history is centered around its cryptography heritage. So refresh your knowledge by exploring the various webpages they've dedicated to their history, to the cryptography museum, and to the role cryptography plays in the agency today. Arrive to your interview ready to talk about the topic knowledgeably. When speaking, do so as if you are educating a member of the public, as you would were you a member of their workforce. Consider the research you perform as getting a head start on your onboarding with the agency. This will help establish you as a top performer and help you earn greater credibility as a candidate.

Ryan Brunner has over ten years of experience recruiting, interviewing, and hiring candidates in the healthcare, public service, and private manufacturing/distribution industries.
"Cryptography is the practice of ensuring that data transmitted across a network is secure. Threats to the security of any data can come from both internal and external sources. Common practices used to secure data all involve encryption of the information. The sender encrypts the data, which is then decrypted by the authorized recipient, using both off-the-shelf and customized software tools. While I don't know the exact methods that the NSA uses in the cryptography efforts, I'd sure be excited to learn if hired for this role."

Kevin Downey has an extensive background in business management, recruiting, branding and marketing. He's volunteered his career coaching services at job fairs, lecturing on interview techniques and crafting winning resumes and cover letters.
Here is a collection of excerpts from their website that summarize in layman's terms what cryptology is, and the role it plays in current operations of the NSA. "Cryptology is the art and science of making and breaking codes and ciphers. NSA is responsible for creating the systems that protect U.S. communications and for analyzing systems and communications used by foreign powers. Making a code or cipher system is called cryptography. Those who try to "break" a cryptosystem are practicing cryptanalysis."

Kevin Downey has an extensive background in business management, recruiting, branding and marketing. He's volunteered his career coaching services at job fairs, lecturing on interview techniques and crafting winning resumes and cover letters.
Here are some additional historical facts from the NSA's website on the history of cryptology in the USA: "Code making and code breaking have influenced America's history. During the Civil War, both Union and Confederate soldiers sent encrypted messages and intercepted enemy communications. In 1917, the British decryption of the Zimmermann Telegram helped push the United States into World War I. Intelligence derived by solving many Japanese and German systems gave Allied forces an edge in many World War II battles, on land and at sea, arguably shortening the war and saving countless lives.
Protecting U.S. communications was likewise as important to the Allied victory in WWII as reading the enemy's messages. The Marine Corps and Army trained Native Americans in radio communications. They used their own languages and code words to confuse enemy soldiers who may have been listening. The Army and Navy also used the SIGABA, an extremely complex cipher machine, to encrypt messages. The enemy never broke the Navajo code talkers or the SIGABA code, giving the United States a clear advantage. The Cold War saw cryptology foster the development of new communications and computer technology. Today's supercomputers, encrypted cell phones, and verification systems owe some of their development to work done for the NSA/CSS."
Write Your Answer
0 - Character Count
Anonymous Answer
it is the scrambling of data when passing them through a long unprotected medium. if anyone tried to tap into it, they wouldn't be able to read it until it is decoded by a key. Keeping the key in a safe place is important.
Marcie's Feedback
Nice! It sounds like you're familiar with this term and concept. Can you provide more common practices that are used with this discipline beyond keeping the key safe? Impress the interviewer with your in-depth knowledge in this area. Good job!
Anonymous Answer
Cryptography is the ensuring data you are trying to send or use is encrypted. I currently need to do this in my career by communicating back and forth with the USCG. I am not familiar with how it is done at NSA, but I am eager to learn about it.

Jaymie's Feedback
Great start! If you can give a couple of examples of best practices, that will help demonstrate your competency and experience with this as well.
Prepare for polygraph discussions and questions that test your judgment under scrutiny.
Get StartedJump to Question

Written by Kevin Downey
38 Questions & Answers • NSA (National Security Agency)

By Kevin

By Kevin