Master 25 Information Security Analyst interview questions covering threat detection, risk assessment, and incident response.
Question 18 of 25
How to Answer
Example Answer
Community Answers

William Swansen has worked in the employment assistance realm since 2007. He is an author, job search strategist, and career advisor who helps individuals worldwide and in various professions to find their ideal careers.
This is both a technical as well as a follow-up question. In your answer to the question 'What are the differences between encoding, encrypting, and hashing?', you discussed encryption. This technical question is asking a follow-up question about how you go about performing the encryption process. As discussed earlier, you should always anticipate follow-up questions once you've answered an inquiry from an interviewer. By keeping your previous answer brief and to the point, you encouraged the interviewer to explore this topic in more detail. Since you have expertise in this area, the questions should be easy for you to answer. This is also an example of how you can guide the interviewer through the interview.

William Swansen has worked in the employment assistance realm since 2007. He is an author, job search strategist, and career advisor who helps individuals worldwide and in various professions to find their ideal careers.
"When using encryption to secure data, you should always encrypt the data before compressing it. If you compress the data first, you could not encrypt it properly or decrypt it when received by another device. The exact process is to create an encryption key, encrypt the data, compress it, then transmit the data and the decryption key to the receiving party."
Write Your Answer
0 - Character Count
Anonymous Answer
Encrypt it then compress it.

Stephanie's Feedback
Great strategy--I just suggest developing this response a bit more. Why did you come to this sequence? What previous work experience have you had in this area? Providing a specific example will help to make your response more impactful and memorable.
Unlock expert responses to technical security scenarios that interviewers prioritize.
Get StartedJump to Question

Written by William Swansen
25 Questions & Answers • Information Security Analyst

By William

By William