MockQuestions

Optum Mock Interview

Question 16 of 28 for our Optum Mock Interview

Optum was updated by on December 12th, 2019. Learn more here.

Question 16 of 28

At Optum, we take security risks very importantly in our products. In your experience, what are the biggest security risks in software and what is your experience in any prevention methods?

As an expert in software industry, you are obviously aware of the many security risks that systems face in this day and age. For your answer to this question, talk knowledgeably about the security risks that you are most familiar with combating in your day to day work. Explain why the posed risk is important to combat against and talk about the methods you used to minimalize risk in the finished product.

Next Question

How to Answer: At Optum, we take security risks very importantly in our products. In your experience, what are the biggest security risks in software and what is your experience in any prevention methods?

Advice and answer examples written specifically for an Optum job interview.

  • 16. At Optum, we take security risks very importantly in our products. In your experience, what are the biggest security risks in software and what is your experience in any prevention methods?

      How to Answer

      As an expert in software industry, you are obviously aware of the many security risks that systems face in this day and age. For your answer to this question, talk knowledgeably about the security risks that you are most familiar with combating in your day to day work. Explain why the posed risk is important to combat against and talk about the methods you used to minimalize risk in the finished product.

      Written by Ryan Brunner on December 12th, 2019

      1st Answer Example

      "As I'm fully aware, cyber-security has become a very important issue over the past ten years. In my current role, our biggest security risk is injection of code used by hackers to access information in our web applications. To help prevent any risks associated with injection, we've implemented the use of a safe API and using specific LIMIT and other SQL controls within queries to prevent loss of records in case of an injection."

      Written by Ryan Brunner on December 12th, 2019

      2nd Answer Example

      "In the healthcare field where I currently work, broken authentication vulnerability has allowed attackers to hack into electronic medical records and gain control over those systems. This type of attack potentially puts hundreds of thousands of people at risk within a given system. We use many methods to prevent this type of security risk. First, we take the time to properly test the code before rolling out new updates to software. We also utilize very detailed external security audits. Other details we have implemented have been multi-factor authentication processes and recommendations to align password requirements with the NIST guidelines."