24Unisys Interview Questions & Answers
1.In addition to monitoring our customer's online security, we provide them with periodic reports about threats and attempts to penetrate their network. What objects do you feel should be included in a security penetration report?
2.Although you are not an experienced network administrator, you should be fluent in the terminology used in our industry. Can you explain to me the difference between symmetric and asymmetric encryption and the benefits of each one?
3.As I understand it, the network is the most vulnerable part of a company's IT infrastructure. What is your opinion of this and how would you define the threat and risk to a company in terms of network security?
4.What is a false positive and false negative alert in the case of Intrusion Detection Systems?
5.Can you tell me the different factors that affect the performance and reliability of a client network, and how network monitoring tools might help?
6.At Unisys we deal with sensitive and confidential client information. Are you willing to complete a full background check?
7.Can you explain to me the basic characteristics of a hosted cloud?
8.What is the difference between Asymmetric and Symmetric encryption and which one is better?
9.Many companies are new to the cloud computing environment. How do you brief them about what security aspects come with a cloud?
10.What questions do you have for me about Unisys?
11.Can you name some open source cloud computing platform databases?
12.What different types of network monitoring tools have you worked with, and which one do you consider yourself an expert?
13.One of the most prevalent types of attempts at intrusions we see when monitoring our clients' networks is a Distributed Denial of Service (DDoS) attack. Can you explain what a DDoS is and what you would recommend to clients to prevent it?
14.If a client is considering moving from an internal data center environment to our platform. What are the key issues you would recommend them addressing before making this move?
15.We recently had a situation occur where a security problem occurred on our network and the person who detected it wasn't directly responsible for resolving it, even though they had the skills to do so. How would you have handled this situation?
16.There are many different definitions of a 'Cloud' in the IT industry. In order to make sure we are on the same page can you provide your definition of a cloud hosting environment and describe its components?
17.Can you describe the difference between a Black Hat, White Hat and Grey Hat hacker?
18.Even though we have taken measures to protect our client's data and create a secure cloud environment, some of our clients have had incidents of potential intrusion from unauthorized sources. Tell me how you advise clients to prevent intrusions.
19.Can you explain the security requirements we must adhere to in order to confirm that our customers' data is secure in the cloud?
20.During the implementation of a hosted cloud environment, our IT team emphasizes that the most insecure component of a cloud infrastructure is the data transmission process. How do you recommend customers secure data while transferring it to the cloud?
21.Our company provides customers with details of our policies, processes, and guidelines for setting up and managing their hosted resources. However, often the clients are confused by this information. How would you help them better understand it?
22.At Unisys we believe in continued education of our employees. If you could take a course or workshop on any topic, what would you choose?
23.There are different levels of data classification, how are they structured, and why are they required?
24.What is the differences between 'scalability' and 'elasticity' when speaking in terms of cloud hosting?