Professional Documents
Culture Documents
300 InfoSec Interview Questions PDF
300 InfoSec Interview Questions PDF
Source: http://www.concise-courses.com/ec-council/ceh/info/
By Waqar Soomro
24. Share an experience in which you conducted a test of a product, service, or process and successfully
improved the quality or performance of the product, service, or process.
25. What is Spyware?
26. Can my page file hold sensitive data?
27. Physical Security questions
28. What do you see as the most critical and current threats effecting Internet accessible websites?
29. Is NT susceptible to flood attacks?
30. Are some Web server software programs more secure than others?
31. Have you worked with building and maintaining networks?
32. What makes you a good IT professional?
33. How does HTTP handle state?
34. I have just plugged in my network cable. How many packets must leave my NIC in order to complete
a traceroute to twitter.com?
35. What is DES?
36. What papers have you written?
37. What is DNS Hijacking?
38. What is LDAP?
39. What are DCO and HPA?
40. Can DCO and HPA be changed?
41. Are there limitations of Intrusion Detection Signatures?
42. What are Linuxs strengths and weaknesses vs. Windows?
43. Please explain how the SSL protocol works.
44. Please explain how asymmetric encryption works
45. Please detail 802.1x security vs. 802.11 security (dont confuse the protocols).
46. Why did you become (Certified Ethical Hacker) certified?
47. If we want to launch any new product or services in the market how will you perform risk assessment
48. How can you configure a network router from the CLI?
49. Is it possible to use packet filters on an NT machine?
50. What do you see as the most critical and current threats effecting Internet accessible websites?
51. Would you consider analyzing data or information a strength? How so?
52. Share an experience in which your attention to detail and thoroughness had an impact on your last
company.
53. How do you determine when to update virus protection systems?
54. Describe an effective method you have used to maintain permanent fleet cryptologic and carry-on
direct support systems.
55. Provide an example when you were able to prevent a problem because you foresaw the reaction of
another person.
56. How can I avoid computer viruses?
57. Use the out put from any network security scanner, which ever network security scanner is used by
the interviewer
58. Wireless Security questions
59. What do you see as challenges to successfully deploying/monitoring web intrusion detection?
60. What ports must I enable to let NBT (NetBios over TCP/IP) through my firewall?
61. Are server-side includes insecure?
62. In which area of networking do you consider yourself most competent and why?
63. What specific automated tools have you used to recover deleted files?
64. What exactly is Cross Site Scripting?
65. How would you build the ultimate botnet?
66. What is Triple DES?
67. What is the secret sauce to a Cisco command?
68. What are IDA and/or Olly?
69. Why is LDAP called Light weight?
70. What was ISO 17799 originally called?
71. Whats the difference between a threat, vulnerability, and a risk?
72. What is a Syn Flood attack, and how to prevent it?
73. Can a server certificate prevent SQL injection attacks against your system? Please explain.
74. What is stateful packet inspection?
75. During an audit, an interviewee is not disclosing the information being requested. How would you
overcome this situation?
76. How will u implement BCP
77. What are the ways to secure a Linux system?
78. What do you see as challenges to successfully deploying/monitoring web intrusion detection?
79. Provide an example when your ethics were tested.
80. Provide an example of when you were persistent in the face of obstacles.
81. What have you found to be the best way to monitor the performance of your work and/or the work of
others? Share a time when you had to take corrective action.
82. Share an experience in which your diligence of inspecting equipment, structures, or materials helped
you identify a problem or the cause of a problem.
83. Tell me about the last time you oversaw the work of someone else. How did you effectively motivate,
develop, and direct the worker(s)?
84. What is computer impersonation?
85. Where do I get patches, or, what is a Service Pack or a Hot Fix?
86. What is Authenticode?
87. Intrusion Detection and Recovery questions
88. What are the most important steps you would recommend for securing a new web server?
89. What should I think about when using SNMP?
90. How do I secure Windows 2000 and IIS 5.0?
91. Give two examples of things youve done on the job or in school that demonstrate your willingness to
work hard.
92. When solving a problem, tell me about the steps you go through to ensure your decisions are correct /
effective.
93. Whats the difference between stored and reflected XSS?
94. What is NMAP?
95. How is session management handled with both HTTP and HTTPS request/responses?
96. What do you think of Teams?
97. Have you hacked any system?
98. What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP and Global Catalog?
99. Describe a time when you implemented defense in depth.
100.
101.
Cryptographically speaking, what is the main method of building a shared secret over a public
medium?
102.
Your network has been infected by malware. Please walk me through the process of cleaning
up the environment.
103.
Do you have a home lab? If so, how do you use it to perfect your skills.
104.
105.
106.
107.
Tell me about cross site request forgery and why should I care.
108.
What are the most important steps you would recommend for securing a new web server?
Web application?
109.
Provide a time when you were able to identify a complex problem, evaluate the options, and
Name a time when your patience was tested. How did you keep your emotions in check?
111.
Share an example of when you established and accomplished a goal that was personally
Name a time when your creativity or alternative thinking solved a problem in your workplace.
113.
Describe a time when you successfully persuaded another person to change his/her way of
thinking or behavior.
114.
115.
116.
117.
118.
What are some examples of you how you would attempt to gain access?
119.
120.
121.
122.
What is the most difficult task you have performed or learned about with group policy with a
Windows Server?
123.
124.
125.
126.
What is the primary difference between traceroute on Unix/Linux and tracert on Windows?
127.
What is the security threat level today at the Internet Storm Center (ISC)?
128.
129.
130.
The goal here is to get the candidate to talk about multiple layers of security, like an onion.
131.
Define an incident?
132.
133.
134.
135.
136.
Who is the ultimate responsible to classify a companys information: the Infosec Team or the
information owner?
137.
138.
139.
If you were not using Apache as the reverse proxy, what Microsoft application/tool could you
What are some long-range objectives that you developed in your last job? What did you do to
achieve them?
141.
142.
143.
Tell me about a time when you developed your own way of doing things or were self-
Tell me about a time when your ability to analyze needs and product requirements helped you
146.
147.
148.
149.
How could you identify what the contents are of the hacked.htm file that the attacker is trying
to upload?
150.
What is Rollback.exe?
151.
152.
It is very important to build good relationships on the job, but sometimes it doesnt always
work out. If you can, tell me about a time when you were not able to build a successful relationship
with a difficult person.
153.
154.
155.
156.
157.
Explain SOX, HIPAA, PCI and GLB (if applicable). What do you see as the most critical and
If i give you two DLLs of different versions, one has the vulnerability and another is patched
for that vulnerability then how will you find the vulnerability?
159.
160.
What was the last training course you attend? Where? When? Why?
161.
162.
163.
164.
165.
166.
167.
168.
169.
170.
Share a time when you willingly took on additional responsibilities or challenges. How did
Provide an example of a time when you were able to demonstrate excellent listening skills.
Share an experience in which your ability to consider the costs or benefits of a potential action
Please share with me an example of how you helped coach or mentor someone. What
Share an experience in which you used new training skills, ideas, or a method to adapt to a
176.
177.
What is Shutdown.exe?
178.
Are some operating systems more secure to use as platforms for Web servers than others?
179.
I am new to the Internet and have been hearing a lot about viruses. I am not exactly sure what
181.
What online resources do you use to keep abreast of web security issues?
182.
183.
184.
What are your best qualities when looking at your job experience?
185.
In public-key cryptography you have a public and a private key, and you often perform both
encryption and signing functions. Which key is used for which function?
186.
In a public key infrastructure (PKI), the authority responsible for the identification and
authentication of an applicant for a digital certificate (i.e., certificate subjects) is called what?
187.
188.
189.
190.
What is dsniff?
191.
192.
193.
194.
195.
196.
197.
What actions would you take to change end user behavior towards InfoSec?
198.
199.
What do you think about security convergence and its effect on our company?
200.
Share an effective method you have used to prevent violations of computer security
procedures.
201.
Provide a time when you dealt calmly and effectively with a high-stress situation.
202.
Provide a time when you worked in a rapidly evolving workplace. How did you deal with the
change?
203.
Describe an effective method you have used to ensure functioning of data processing
Provide an experience in which your ability to actively find ways to help people improved
207.
208.
What is CryptoAPI?
209.
210.
What is the security threat level today at the Internet Storm Center (ISC)?
211.
212.
Imagine that we are running an Apache reverse proxy server and one of the servers we are
proxy for is a Windows IIS server. What does the log entry suggest has happened?
213.
Tell us about a time when you took responsibility for an error/mistake and were held
personally accountable.
214.
215.
216.
217.
218.
What are the most important steps you would recommend for securing a new web server?
219.
220.
221.
222.
223.
224.
225.
What are the latest threats you foresee for the near future?
226.
227.
229.
230.
Name a time when you identified strengths and weaknesses of alternative solutions to
Share an example of when you went above and beyond the "call of duty".
232.
Provide a successful method you have used to monitor the use of data files and regulate
Share an effective method you have used to ensure system security and improve server and
Please share an experience in which you successfully taught a difficult principle or concept.
235.
Describe an experience in which your ability to work well with others and reconcile
237.
238.
239.
240.
241.
242.
243.
What do you know about our company and why are you interested in working/interning with
us?
244.
245.
246.
Describe the issues related to using MD5 Hashing Algorithm in SSL certificates?
247.
A business team has developed this brand new web site that you just tested and found a
What are the most important steps you would recommend for securing a new Web
application?
249.
250.
251.
252.
If you were to start a job as head engineer or CSO at a Fortune 500 company due to the
previous guy being fired for incompetence, what would your priorities be?
253.
254.
255.
Please describe step-by-step how you would prepare and perform an audit of any given
system.
257.
258.
259.
260.
Share an experience you had in dealing with a difficult person and how you handled the
situation.
261.
Describe an effective method you have used to encrypt data transmissions and erect firewalls.
262.
Share an example.
263.
264.
Provide an experience in which you were sensitive to someone's needs or feelings. How did
266.
267.
Are there any NT based viruses, or can NT be susceptible for other viruses?
268.
269.
270.
271.
272.
If you had to both encrypt and compress data during transmission, which would you do first,
and why?
273.
274.
275.
What is SSL?
276.
What is UPX?
277.
278.
279.
As a corporate Information Security professional, whats more important to focus on: threats
or vulnerabilities?
280.
281.
282.
283.
What is a RISK, how can it be measured and what actions can be taken to treat it?
284.
285.
How do you convince the managers at the client company that they need to adhere to some
286.
287.
Share an experience when you applied new technology or information in your job. How did it
Tell me about a plan you developed which successfully safeguarded computer files against
modification, destruction, or disclosure. What is one thing you would change about your plan?
289.
Share an experience in which your willingness to lead or offer an opinion helped your
company.
290.
Share an experience in which you successfully coordinated with others. How about a
What is a Firewall?
293.
I have been hearing a lot about firewalls, but I am not sure what it is or if I need it. Can you
help?
294.
Are there any known problems with the screen saver/ screen lock program?
295.
296.
297.
298.