MockQuestions MockQuestions
Interviews Questions by Career
Interviews Questions by Company
Interviews Questions by Topic
Get Started
Interview Coach 1:1
Gain the confidence you need by asking our professionals any interview scenario, question, or answer you are unsure about.
Let Us Review Your Answers
Our interviewing professionals will gladly review and revise any answer you send us. Allowing you to craft perfect responses for your next job interview.
Interview Questions by Topic
Interview Questions by Career
Interview Questions by Company

NetEnrich Interview
Questions

25 Questions and Answers by Tom Dushaj

Published March 24th, 2019 | Tom Dushaj is a business and technology executive and an accomplished author of the book "Resumes That Work".
Question 1 of 25
NetEnrich seeks to hire those with above average communication skills. Describe your communication style to me.
View Answers
How to Answer
The interviewer wants to know that your communication style will fit in with the culture they have worked on creating at NetEnrich. When clients seek the help of NetEnrich, they do so with certain expectations. Convince the interviewer that your communication style will meet those expectations. It's best to give a few unique keywords when discussing your communication style. Also be sure to compliment NetEnrich on their communication efforts.
1000s of Interview Questions
Win your next job by practicing from our question bank. We have thousands of questions and answers created by interview experts.
Suggested
Interview Q&As
Explore expert tips and resources to be more confident in your next interview.
Behavioral
Common
Phone
Tough
Leadership
All Interview Topics
All Career Q&As
Top 25 NetEnrich Inc. Interview Questions with Full Content
1.
NetEnrich seeks to hire those with above average communication skills. Describe your communication style to me.
The interviewer wants to know that your communication style will fit in with the culture they have worked on creating at NetEnrich. When clients seek the help of NetEnrich, they do so with certain expectations. Convince the interviewer that your communication style will meet those expectations. It's best to give a few unique keywords when discussing your communication style. Also be sure to compliment NetEnrich on their communication efforts.

Tom's Answer #1
"I have been a client of NetEnrich in the past and can truly say that positive communication with your clients is what makes you the most popular choice in the area. I am confident that my communication skills will work well here because my focus always remains on simple solutions, easy to understand language, and a friendly tone."
Tom's Answer #2
"Here are some additional words to describe your communication style:

- Energetic
- Lively
- Articulate
- Eloquent
- Informal
- Formal
- Succinct"
2.
At NetEnrich we believe in continued education of our employees. If you could take a course or workshop on any topic, what would you choose?
Working for a company which emphasizes the importance of continued education can be an enriching opportunity. Be prepared to talk to the interviewer about your interest in growing your knowledge base. You may want to push your existing knowledge into the expert range, or perhaps there is a current hot topic on which you would like to learn. Whatever your answer may be, ensure that you express to the interviewer your appreciation for continued education opportunities.

Tom's Answer #1
"I love that NetEnrich emphasizes continued education. This offering is one of the qualities I was looking for, in my next opportunity. If I could take a course or workshop on any topic I would choose to focus on IT Management. My goal is to grow into a management level position, and that would be a great stepping stone to get there."
Tom's Answer #2
"That is very exciting news to hear. I value continued education as well. If I could continue my education in any area, I would do a deeper dive into IT Security and IT Security Management."
3.
Can you describe the difference between a Black Hat, White Hat and Grey Hat hacker?
When it comes to cyber hackers, you will hear three terms used for hackers. They are Black Hat, White Hat, and Gray Hat hackers. These terms are also synonymous with Search Engine Optimization as well. For informational purposes, here's an overview of all three: Black Hat Hacker - Someone who has knowledge about breaking into or breaching computer systems and bypassing their security protocols. Their primary motivation is to financial or personal gain, and to spread malware or viruses in order to gain access to these computer systems. White Hat Hacker - Someone who is known to use their skills for good rather than evil. They typically work as Cyber Security consultants that are paid to find security vulnerabilities in systems, and work to strengthen those security holes for clients. In A hiring manager might pose a carefully crafted question to determine how well you know each one, and if you fall into one of the three categories. They want to know will you be able to defend against a cyber attack, and how you handle threats from hackers.

Tom's Answer #1
"When I think of Black Hat Hackers, a few things come to mind. An individual or group of hackers whose intent is to either maliciously penetrate a company's system by writing and distributing malware that leaves a company vulnerable and susceptible to further attacks. The others are cyber espionage and political persuasion. I am directly responsible for following our company protocol when we are alerted that a Black Hat attack is in progress. Much like a chess game, I carefully engage and monitor the activities of the Black Hat Hacker to see what steps and moves I must execute to prevent loss of data or a breach. One of the biggest motivations for Black Hat hackers is personal or financial gain."
Tom's Answer #2
"On the flip side of Black Hat Hackers is White Hat Hackers, which serve a completely different purpose and role. White Hat Hackers are what's called ethical hackers. I worked with a company that employed a White Hat Hacker, and I was assigned to work with this individual on a project to perform penetration testing and vulnerability assessments on the security systems to attempt to find weak spots and holes in our system via various hacking methods. I'm also familiar with how Gray Hat Hackers work, and I'm careful how I work and interface with them. The reason being is they don't fall within the Black Hat or White Hat Hacker category, thus the name Gray Hat hacker. I've found that they tend to look for vulnerabilities in a system without notifying the owner of the systems knowledge, and offer to fix those issues for a small fee. There are also instances where I have seen Gray Hat Hackers where Gray Hat hackers post a company's vulnerability in a public forum or social media platform for all to see. I've found that not all hackers are created equal, but I do take precautions with all hackers anyway."
4.
What are the benefits of leasing a private data center vs. building one from scratch?
There are many benefits to either leasing a data center as opposed to building one and vice versa. The interviewer would like to see that you understand the expenditure and risk that comes with either option.

When it comes to leasing a private data center the benefits include:

- Fewer upfront costs
- More predictable expenditure
- Ability to scale more easily
- Option to contract the experts as opposed to hiring them full time

If a company built their own data center the benefits could be:

- Ownership and complete control of all operations
- More control over your location
- Ability to lease out extra space to other businesses

Discuss with the interviewer the benefits of each, without swaying too far when it comes to your opinion.

Tom's Answer #1
"I believe there are benefits to each, and the choice would depend greatly on budget and how much control a company would like to have. If leasing, you can reduce expenditure significantly. If building one from scratch, you would have full control. In my opinion, there are pros and cons to each side."
Tom's Answer #2
"I have worked for data centers that lease their space, and data centers who own their space. From the leasing side, it is more challenging to scale; however, the costs are much lower. From the ownership side, there are more headaches when it comes to IT staffing; however, there is more control over space, location, and operations."
5.
Even though we have taken measures to protect our client's data and create a secure cloud environment, some of our clients have had incidents of potential intrusion from unauthorized sources. Tell me how you advise clients to prevent intrusions.
Since the word 'incident' can have many meanings, it is best to first define your interpretation of an incident, and then describe the steps you would take to address it. This will provide the interviewer with a context for your answer and will demonstrate that you have experience in this area. You should describe a process you recommend which can be replicated each time an incident occurs.

Tom's Answer #1
"As I understand it, you are using the word 'incident' to describe an event which may lead to a compromise in the security of your data. I recommend using a step-by-step process to respond to incidents and to make sure nothing is overlooked. The first step is to confirm that an incident has occurred. Next, I log it so other members of the team are aware of it and they have a record of it. Then I suggest the team investigate the incident and perform a root cause analysis. If necessary, they should escalate the incident to their management or other resources. This leads to recommendations for remediation of the incident and preventing from it recurring. Finally, a report should be generated with all of the above information and the status moved to closed."
Tom's Answer #2
"I use the word 'incident' to describe an event which may lead to a compromise in the security of a company's data. I have found that is is easier and more effective to develop a process to respond to incidents which can be used repeatedly. First I recommend confirming that an incident has occurred. Then I suggest creating a log of the incident so there is a record of it, and the team can determine if it is part of a trend. Next, I suggest they perform a root cause analysis to determine the causes and identify potential solutions. If necessary, they should escalate the incident to management to make them aware of it. The next step is to draft recommendations to resolve the incident and prevent from it recurring. Finally, a closure report is generated."
View All 25 NetEnrich Questions and Answers
Sign up to access our library of 50,000+ Q&As,
plus coaches for one-on-one support, so you can interview more confidently.
More Interview Q&As
Explore expert tips and resources to be more confident in your next interview.
Behavioral
Common
Phone
Tough
Leadership
All Interview Topics
All Career Q&As
About Our Interview Q&As
Our interview questions and answers are created by experienced recruiters and interviewers. These questions and answers do not represent any organization, school, or company on our site. We do not claim they will be asked in any interview you may have. Our goal is to create interview questions and answers that will best prepare you for your interview, and that means we do not want you to memorize our answers. You must create your own answers, and be prepared for any interview question in any interview.