MockQuestions

NTT DATA Mock Interview

Question 2 of 27 for our NTT DATA Mock Interview

NTT DATA was updated by on February 17th, 2019. Learn more here.

Question 2 of 27

Many companies are new to the cloud computing environment. How do you brief them about what security aspects come with a cloud?

"Cloud environments can be as secure as computing environments hosted on-premise based on two key attributes. These are Authentication and authorization, and Control of access. Authentication allows only those users who are authorized to access the resources hosted in the cloud. These include data, applications, and storage. Control of access is a system administrator tool which enables them to allow or deny access to specific users. Together, these tools provide a safe and secure cloud environment."

Next Question

How to Answer: Many companies are new to the cloud computing environment. How do you brief them about what security aspects come with a cloud?

Advice and answer examples written specifically for a NTT DATA job interview.

  • 2. Many companies are new to the cloud computing environment. How do you brief them about what security aspects come with a cloud?

      How to Answer

      The interviewer is testing your knowledge of security measures associated with the cloud environment and your ability to help customers manage their company's cloud.

      Knowing how to advise NTT DATA's clients on the benefits of the cloud, specifically on security issues, will be a huge selling point for you landing the job.

      Written by William Swansen on February 16th, 2019

      1st Answer Example

      "Cloud environments can be as secure as computing environments hosted on-premise based on two key attributes. These are Authentication and authorization, and Control of access. Authentication allows only those users who are authorized to access the resources hosted in the cloud. These include data, applications, and storage. Control of access is a system administrator tool which enables them to allow or deny access to specific users. Together, these tools provide a safe and secure cloud environment."

      Written by William Swansen on February 16th, 2019

      2nd Answer Example

      "There are two control mechanisms which keep hosted cloud compute environments safe and secure. These are Authentication and authorization, and Control of access. Authentication and authorization prevent unauthorized parties from accessing a company's data and applications. This is also known as 'Hacking." Control of access is the methodology system administrators use to provide authorization to known users. By only allowing authorized users to enter the system and then requiring them to authenticate themselves, companies can be assured their data and other computing resources are safe from theft and misuse."