MockQuestions
Tanium Interview Questions

25 Tanium Questions and Answers By Tom Dushaj

Question 2 of 25

At Tanium we prefer to hire those with an education in computer science or another related field. Walk me through your post-secondary education and training.

  Previous Question Next Question  

Tanium Interview Questions & Answers

To view our answers examples, please upgrade.

  1. 1.

    Can you explain what a public and private key is in the world of public-key cryptography, and which key is used for which function?

  2. 2.

    At Tanium we prefer to hire those with an education in computer science or another related field. Walk me through your post-secondary education and training.

  3. 3.

    What's the difference between a threat, vulnerability, and a risk, and how do you assess the severity of a threat for example?

  4. 4.

    Our clients know a great deal about cloud and network security, but they generally aren't familiar with Endpoint security and their vulnerabilities in this area. How would you describe Endpoint security to a customer so they understand the threat?

  5. 5.

    Can you tell me what the difference is between stored and reflected XSS, and the common defenses against XSS?

  6. 6.

    Give me your opinion on Blockchain technology, and how do you think it will revolutionize cyber security?

  7. 7.

    We seek to hire highly ambitious people. Where would you like your career with Tanium take you?

  8. 8.

    Describe to me what encoding, encryption, and hashing are, how they work, and what the differences are between the three?

  9. 9.

    In your opinion, what's the ultimate goal of information security to an organization, and why is it important?

  10. 10.

    At Tanium we value organization. Tell us about a time when you were particularly effective on prioritizing tasks and completing a project on schedule.

  11. 11.

    We consider research to be the backbone of what we do at Tanium. Do you think it's important to conduct research before beginning a project or would you rather jump right in?

  12. 12.

    Tell me about your greatest work related accomplishment.

  13. 13.

    Looking at our products and services, what do you think we do better at Tanium than any of our competitors?

  14. 14.

    Explain the difference between symmetric and public-key cryptography, and what their importance is to encryption technology?

  15. 15.

    What experience do you have using team-based messaging applications?

  16. 16.

    Tell me what your favorite security assessment tools are, and why you prefer them over others?

  17. 17.

    Tell me about the most interesting project you have worked on this year and the biggest thing you learned from it.

  18. 18.

    Most threats initiated from endpoint devices are stealthy and difficult to detect. How do you help your clients understand this and what do you recommend they do to expose and quickly resolve the attacks?

  19. 19.

    What's the difference between Diffie-Hellman and RSA, and how do they apply to cryptography and encryption?

  20. 20.

    At Tanium we take privacy and confidentiality very seriously. Are you willing to sign a non-disclosure agreement, if hired?

  21. 21.

    This role with Tanium is highly technical. What is your understanding of this position and the responsibilities that come with it?

  22. 22.

    What do you think is the most important information security concern with most organizations right now?

  23. 23.

    If you could start your career over again, what direction would you take?

  24. 24.

    In today's environment, the majority of devices accessing either a private or public network are mobile, including laptops, tablets and cell phones. How should a company protect its IT network from mobile threats and risks?

  25. 25.

    At Tanium we take pride in our ability to stay one step ahead of our competitors. How will you contribute to this trend?