How to Answer: When tasked with strengthening user authentication, what methods would you use to?
Advice and answer examples written specifically for an Information Security Analyst job interview.
7. When tasked with strengthening user authentication, what methods would you use to?
How to Answer
You probably already recognize this as an operational question. This is specifically asking you about the process you use to perform a task. As a reminder, operational questions should be answered directly and succinctly, and you should anticipate follow-up questions.
Written by William Swansen on October 1st, 2020
Answer Example
"One of the key elements of data security is user authentication. The most basic form of user authentication is supplying the user with a username and password. This is needed at any time the user logs in to the application or the network. A higher level of security is known as two-step authentication. In addition to the user ID and password, a code is sent to a device the user has pre-registered. They are then required to input the code before they are allowed to access the network."
Written by William Swansen on October 1st, 2020
Anonymous Interview Answers with Professional Feedback
Anonymous Answer
Stephanie's Feedback