MockQuestions

Unisys Mock Interview

To help you prepare for an Unisys job interview, here are 24 interview questions and answer examples.

Unisys was updated by on March 27th, 2019. Learn more here.

Question 1 of 24

One of the most prevalent types of attempts at intrusions we see when monitoring our clients' networks is a Distributed Denial of Service (DDoS) attack. Can you explain what a DDoS is and what you would recommend to clients to prevent it?

The interviewer is testing your knowledge of cybersecurity and attempting to ensure that you will be able to interface with clients on both a business and technical level when presenting them with the services their company offers. This type of question is best answered with a direct answer describing the topic and how you would discuss it with a client.

Next Question

24 Unisys Interview Questions & Answers

Below is a list of our Unisys interview questions. Click on any interview question to view our answer advice and answer examples. You may view six answer examples before our paywall loads. Afterwards, you'll be asked to upgrade to view the rest of our answers.

  • 1. One of the most prevalent types of attempts at intrusions we see when monitoring our clients' networks is a Distributed Denial of Service (DDoS) attack. Can you explain what a DDoS is and what you would recommend to clients to prevent it?

  • 2. What is the differences between 'scalability' and 'elasticity' when speaking in terms of cloud hosting?

  • 3. There are different levels of data classification, how are they structured, and why are they required?

  • 4. At Unisys we believe in continued education of our employees. If you could take a course or workshop on any topic, what would you choose?

  • 5. Our company provides customers with details of our policies, processes, and guidelines for setting up and managing their hosted resources. However, often the clients are confused by this information. How would you help them better understand it?

  • 6. During the implementation of a hosted cloud environment, our IT team emphasizes that the most insecure component of a cloud infrastructure is the data transmission process. How do you recommend customers secure data while transferring it to the cloud?

  • 7. Can you explain the security requirements we must adhere to in order to confirm that our customers' data is secure in the cloud?

  • 8. Even though we have taken measures to protect our client's data and create a secure cloud environment, some of our clients have had incidents of potential intrusion from unauthorized sources. Tell me how you advise clients to prevent intrusions.

  • 9. Can you describe the difference between a Black Hat, White Hat and Grey Hat hacker?

  • 10. There are many different definitions of a 'Cloud' in the IT industry. In order to make sure we are on the same page can you provide your definition of a cloud hosting environment and describe its components?

  • 11. We recently had a situation occur where a security problem occurred on our network and the person who detected it wasn't directly responsible for resolving it, even though they had the skills to do so. How would you have handled this situation?

  • 12. If a client is considering moving from an internal data center environment to our platform. What are the key issues you would recommend them addressing before making this move?

  • 13. In addition to monitoring our customer's online security, we provide them with periodic reports about threats and attempts to penetrate their network. What objects do you feel should be included in a security penetration report?

  • 14. What different types of network monitoring tools have you worked with, and which one do you consider yourself an expert?

  • 15. Can you name some open source cloud computing platform databases?

  • 16. What questions do you have for me about Unisys?

  • 17. Many companies are new to the cloud computing environment. How do you brief them about what security aspects come with a cloud?

  • 18. What is the difference between Asymmetric and Symmetric encryption and which one is better?

  • 19. Can you explain to me the basic characteristics of a hosted cloud?

  • 20. At Unisys we deal with sensitive and confidential client information. Are you willing to complete a full background check?

  • 21. Can you tell me the different factors that affect the performance and reliability of a client network, and how network monitoring tools might help?

  • 22. What is a false positive and false negative alert in the case of Intrusion Detection Systems?

  • 23. As I understand it, the network is the most vulnerable part of a company's IT infrastructure. What is your opinion of this and how would you define the threat and risk to a company in terms of network security?

  • 24. Although you are not an experienced network administrator, you should be fluent in the terminology used in our industry. Can you explain to me the difference between symmetric and asymmetric encryption and the benefits of each one?