Questions d'entretiens - Cyber analyst
2 k
Questions d'entretien pour Cyber Analyst partagées par les candidatsPrincipales questions d'entretien

Tell me about yourself?
7 réponses↳
I’m a fantastic person looking to pay my bills
↳
I am a hairdresser for 23 years looking for different opportunities with benefits Moins
↳
I am a hairdresser for 23 years looking for different opportunities with benefits Moins


What is cyber security? What does Deloitte do?
3 réponses↳
Did you hear back from them?
↳
I have a second round office interview on November 3rd!
↳
hey how did that interview go? what kind of questions do they ask?

Reverse the individual words in a string maintaining case sensitivity and white space. (char array). input[] = "Apple Banana Cherry" output[] = "elppA ananaB yrrehC"
3 réponses↳
#include #include using namespace std; void revstr(string &s, string &buf) { string delims = " \t"; buf = ""; int wsp; int i, j; for (i = 0; i < s.length(); i = wsp + 1) { wsp = s.find_first_of(delims, i); if (wsp == string::npos) { wsp = s.length(); } for (j = i; j < wsp; j++) { buf.append(1,s[wsp - (j-i) - 1]); } buf.append(1, s[wsp]); } } int main() { string str = "Apple Banana Cherry"; string buf; cout << "input = " << str << endl; revstr(str, buf); cout << "output = " << buf << endl; return 0; } Moins
↳
The above code is in c++. The first 2 lines ought to read "#include " and "#include " Moins
↳
wow, let's try this again; In the c++ code posted above, you need to include the iostream library and string library. Moins

What is the CIA Triad?
3 réponses↳
Confidentiality, Integrity and Availability*
↳
“These three letters stand for confidentiality, integrity, and availability, otherwise known as the CIA triad. Together, these three principles form the cornerstone of any organization's security infrastructure; in fact, they (should) function as goals and objectives for every security program.” Moins
↳
confidentiality, integrity, accountablity

What is your availability and ability to get the job done
3 réponses↳
I am available 24/7 whenever wherever
↳
Asap
↳
I am available full time

Have you had much teaching experience?
2 réponses↳
Yes, I had taught numerous levels in education and in within non-education positions. Moins
↳
Yes

What is the difference between UDP and TCP?
2 réponses↳
TCP establishes connection before data transfer is done. In addition, any packet loss during transmission is re-transmitted for reliability. In UDP no connection is established before data is transferred. Moins
↳
How long did it take you to get the offer after the inteview ?

Analyze these 3 files
2 réponses↳
Hi
↳
Because they had no tools and no lab to analyze within, I literally hashed them and compared the MD5 to reports online. Every malware analyst knows that this is NOT analysis, but short of building a lab with access to no VM's, having an isolated host, or wasting time by downloading static tools, this is all I could do. Moins

What are the three pillars of information security ?
2 réponses↳
Confidentiality, integrity and availability CIA
↳
Confidentiality, Integrity, Availability