MockQuestions

Tanium Mock Interview

Question 20 of 25 for our Tanium Mock Interview

Get More Information About Our Tanium Interview Questions

Question 20 of 25

Our clients know a great deal about cloud and network security, but they generally aren't familiar with Endpoint security and their vulnerabilities in this area. How would you describe Endpoint security to a customer so they understand the threat?

"The most vulnerable part of your IT infrastructure is the end devices. These are the systems, laptops and mobile devices people use to access the network, their applications, and data. Securing these are a challenge to organizations due to the high number of devices, their locations and the activities users engage in. The best way to secure these devices is to use a software approach which identifies and manages the user devices across the network. Components of the software approach are virtual private networks (VPNs,) antivirus software and secure operating systems. Endpoint devices are then provisioned with the correct access to corporate assets in accordance with the user's needs and company policies."

Next Question

How to Answer: Our clients know a great deal about cloud and network security, but they generally aren't familiar with Endpoint security and their vulnerabilities in this area. How would you describe Endpoint security to a customer so they understand the threat?

Advice and answer examples written specifically for a Tanium job interview.

  • 20. Our clients know a great deal about cloud and network security, but they generally aren't familiar with Endpoint security and their vulnerabilities in this area. How would you describe Endpoint security to a customer so they understand the threat?

      How to Answer

      The interviewer is seeking to determine your knowledge of Endpoint security relative to IT security in general. They also are looking for a demonstration of your presentation skills and how you can position products and services in relation to client needs.

      1st Answer Example

      "The most vulnerable part of your IT infrastructure is the end devices. These are the systems, laptops and mobile devices people use to access the network, their applications, and data. Securing these are a challenge to organizations due to the high number of devices, their locations and the activities users engage in. The best way to secure these devices is to use a software approach which identifies and manages the user devices across the network. Components of the software approach are virtual private networks (VPNs,) antivirus software and secure operating systems. Endpoint devices are then provisioned with the correct access to corporate assets in accordance with the user's needs and company policies."

      2nd Answer Example

      "Endpoint security involves securing the most vulnerable part of the network, the end user devices. These include desktop systems, laptops, and mobile devices. The challenge of securing these devices stems from their high number, the fact that they are widely dispersed and mobile, and that end users behave badly and unintentionally create security vulnerabilities. The endpoint devices can be secured if a comprehensive software-based management system is developed and deployed. The components of an effective software management system are secure operating systems, antivirus software applications, and virtual private networks (VPNs.) I believe Tanium offers an integrated solution to endpoint security which employs each of these solutions."

      Anonymous Interview Answers with Professional Feedback

      Anonymous Answer

      "The data on the endpoints is the most valuable resource a company has. There are many points of risks that can exist at an endpoint. Two common examples would be malware and phishing attacks. If that endpoint isn't secured so that anomalies can be detected, malware could allow access to critical company data on that endpoint or by gaining access to other endpoints."

      Rachelle's Feedback

      Nice, in-depth response. Your knowledge and understanding shine through in your responses because you seem to have a way to explain complicated concepts in a clear, easy to understand manner.