User Tools

Site Tools


other:interview_questions

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
other:interview_questions [2018/03/07 14:27]
jack last edit for a while I promise
other:interview_questions [2018/09/03 17:25] (current)
Line 9: Line 9:
  
   * Describe three of the most common ways an external attacker today might attempt to gain access to a network.  ​   * Describe three of the most common ways an external attacker today might attempt to gain access to a network.  ​
 +  * You just got put in charge of a network after the last sysadmin was fired. What steps would you take to protect the network?
   * A user forwards you a suspected phishing email. How do you respond and handle it?  ​   * A user forwards you a suspected phishing email. How do you respond and handle it?  ​
   * What are the primary reason NOT to upload targeted malware to VT?  ​   * What are the primary reason NOT to upload targeted malware to VT?  ​
other/interview_questions.txt ยท Last modified: 2018/09/03 17:25 (external edit)