Questions d'entretiens - Cyber analyst

2 k

Questions d'entretien pour Cyber Analyst partagées par les candidats

Principales questions d'entretien

Trier: Pertinence|Populaires|Date
Thermo Fisher Scientific
On a demandé à un Cyber Security...7 mai 2017

Tell me about​ yourself?

7 réponses

I am an experienced and respected captain on seasonal ships. I am looking for a full time position. Moins

I’m a fantastic person looking to pay my bills

I am a hairdresser for 23 years looking for different opportunities with benefits Moins

Afficher Plus de réponses
US Air Force

Do you have a high school diploma?

4 réponses

Yes

Yes. Here it is.

Yes

Afficher Plus de réponses
Deloitte

What is cyber security? What does Deloitte do?

3 réponses

Did you hear back from them?

I have a second round office interview on November 3rd!

hey how did that interview go? what kind of questions do they ask?

Raytheon Technologies

Reverse the individual words in a string maintaining case sensitivity and white space. (char array). input[] = "Apple Banana Cherry" output[] = "elppA ananaB yrrehC"

3 réponses

#include #include using namespace std; void revstr(string &s, string &buf) { string delims = " \t"; buf = ""; int wsp; int i, j; for (i = 0; i < s.length(); i = wsp + 1) { wsp = s.find_first_of(delims, i); if (wsp == string::npos) { wsp = s.length(); } for (j = i; j < wsp; j++) { buf.append(1,s[wsp - (j-i) - 1]); } buf.append(1, s[wsp]); } } int main() { string str = "Apple Banana Cherry"; string buf; cout << "input = " << str << endl; revstr(str, buf); cout << "output = " << buf << endl; return 0; } Moins

The above code is in c++. The first 2 lines ought to read "#include " and "#include " Moins

wow, let's try this again; In the c++ code posted above, you need to include the iostream library and string library. Moins

Deloitte

What is the CIA Triad?

3 réponses

Confidentiality, Integrity and Availability*

“These three letters stand for confidentiality, integrity, and availability, otherwise known as the CIA triad. Together, these three principles form the cornerstone of any organization's security infrastructure; in fact, they (should) function as goals and objectives for every security program.” Moins

confidentiality, integrity, accountablity

VDart

What is your availability and ability to get the job done

3 réponses

I am available 24/7 whenever wherever

Asap

I am available full time

Metropolitan State University

Have you had much teaching experience?

2 réponses

Yes, I had taught numerous levels in education and in within non-education positions. Moins

Yes

Agoda

Analyze these 3 files

2 réponses

Hi

Because they had no tools and no lab to analyze within, I literally hashed them and compared the MD5 to reports online. Every malware analyst knows that this is NOT analysis, but short of building a lab with access to no VM's, having an isolated host, or wasting time by downloading static tools, this is all I could do. Moins

Best Buy

What is the difference between UDP and TCP?

2 réponses

TCP establishes connection before data transfer is done. In addition, any packet loss during transmission is re-transmitted for reliability. In UDP no connection is established before data is transferred. Moins

How long did it take you to get the offer after the inteview ?

Sitel Group

What are the three pillars of information security ?

2 réponses

Confidentiality, integrity and availability CIA

Confidentiality, Integrity, Availability

1 - 10 sur 2 134 Questions d'entretien

Consultez les questions posées en entretiens pour des emplois similaires

security analystsecurity researcherdigital forensic analystthreat analyst