2 Information Security Analyst Interview Questions
Q. What do you do if somebody higher on the work order than you request you break protocol for them?
This is a typical situation for an IT security analyst, and
it very well may be a frightening issue if their job is threatened. At times
the situation will be harmless, for example, an administrator asking that you
give them remote access to their PC at home. Different occasions they may
request to access to a representative's email or data — which can be illegal if
the information they're accessing to is delicate or personal.
The key here is to take this issue up the chain. It is
prescribed checking with your administrator to confirm if doing something like
this is acceptable. Regardless of whether you already know the appropriate
response, having somebody on your side can support your conversation later.
Harvard Business Review prescribes engaging the leader's own objectives and
security — violating HIPAA could result in a strong claim, and no one needs
that, right?
Q. How would you keep organization devices secure if they're
on public/hotel Wi-Fi?
This is critical for an organization that has workers who
often travel, or who use Wi-Fi that you don't have a clue about the security
of.
Norton Security suggests staying off of public Wi-Fi by and
large. When on public Wi-Fi, then clients should prevent from getting to
delicate information, similar to bank accounts. Clients should utilize a VPN,
prevent from utilizing public wireless chargers, which have been utilized in
the past to hack into devices and prevent from connecting with unknown
Bluetooth devices.
Comments
Post a Comment