MockQuestions

Tanium Mock Interview

Question 3 of 25 for our Tanium Mock Interview

Get More Information About Our Tanium Interview Questions

Question 3 of 25

In today's environment, the majority of devices accessing either a private or public network are mobile, including laptops, tablets and cell phones. How should a company protect its IT network from mobile threats and risks?

"The key to protecting a company's data from exposure, theft or manipulation is quickly identifying that a data breach has occurred and taking immediate action to counter it. This involves blocking malicious applications and terminating malicious processes as soon as they are detected. It also requires that compromised devices must be blocked from accessing the network until they are secured or replaced. Finally, machine learning should be implemented so that the threats and intrusions like them can't recur. All this is done while still ensuring users have access to the resources they need and their privacy is respected."

Next Question

How to Answer: In today's environment, the majority of devices accessing either a private or public network are mobile, including laptops, tablets and cell phones. How should a company protect its IT network from mobile threats and risks?

Advice and answer examples written specifically for a Tanium job interview.

  • 3. In today's environment, the majority of devices accessing either a private or public network are mobile, including laptops, tablets and cell phones. How should a company protect its IT network from mobile threats and risks?

      How to Answer

      This is a direct question, in which the interviewer is looking to learn more about your understanding of mobile security and best practices used to protect a client's IT infrastructure from both malicious attacks and unintentional breaches due to lapses in user behavior. Direct questions should be answered with a direct response which quickly addresses the topic.

      1st Answer Example

      "The key to protecting a company's data from exposure, theft or manipulation is quickly identifying that a data breach has occurred and taking immediate action to counter it. This involves blocking malicious applications and terminating malicious processes as soon as they are detected. It also requires that compromised devices must be blocked from accessing the network until they are secured or replaced. Finally, machine learning should be implemented so that the threats and intrusions like them can't recur. All this is done while still ensuring users have access to the resources they need and their privacy is respected."

      2nd Answer Example

      "Protecting a company's IT assets against mobile threats involves balancing user productivity and privacy against the overall security of the organization's data. The key to this is having a system in place which quickly detects malicious intrusions and takes immediate access to isolate them. The software should stop the malicious process and block the device used to gain access to the network. All other processes and devices should not be impacted, thereby maintaining the overall productivity of the organization and protecting the privacy of the individual users. If done correctly, only the impacted user and the system administrators will be aware that a malicious intrusion had occurred. "