A huge list of it security questions with my answers =)
Basic Concepts:
-
What is information security and how is it achieved?
-
What are the core principles of information security?
-
What is non-repudiation (as it applies to IT security)?
-
What is the relationship between information security and data availability?
-
What is a security policy and why do we need one?
-
What is the difference between logical and physical security? Can you give an example of both?
-
Is there an acceptable level of risk?
-
How do you measure risk? Can you give an example of a specific metric that measures information security risk?
-
Can you give me an example of risk trade-offs (e.g. risk vs cost)?
-
What are the most common types of attack that threaten enterprise data security?
-
What is the difference between a threat and a vulnerability?
-
Can you give me an example of common security vulnerabilities?
-
Are you familiar with any security management frameworks such as ISO/IEC 27002?
-
Can you briefly discuss the role of information security in each phase of the software development lifecycle?
-
Can you describe the role of security operations in the enterprise?
-
What is incident management?
-
What is business continuity management? How does it relate to security?
-
What is a security control?
-
What are the different types of security control?
-
Can you describe the information lifecycle? How do you ensure information security at each phase?
-
What is Information Security Governance?
-
What are your professional values? Why are professional ethics important in the information security field?
Security Audits and Testing:
-
What is an IT security audit?
-
How do you test information security?
-
What is the difference between black box and white box penetration testing?
-
What is a vulnerability scan?
-
What is captured in a security assessment plan (security test plan)?
Access Control:
-
What is the difference between authentication and authorization?
-
What types of information can be used for authentication?
-
What is role-based access control?
-
What is meant by the term “least privilege”?
-
What is two-factor authentication? Does it require special hardware?
Security Architecture:
-
Why are open standards important to security solutions?
-
How do you balance demands from different stakeholders who have conflicting requirements?
-
What is layered security architecture? Is it a good approach? Why?
-
Have you designed security measures that span overlapping information domains? Can you give me a brief overview of the solution?
-
How do you ensure that a design anticipates human error?
-
How do you ensure that a design achieves regulatory compliance?
-
What is capability-based security? Have you incorporated this pattern into your designs? How?
-
Can you give me a few examples of security architecture requirements?
-
Who typically owns security architecture requirements and what stakeholders contribute?
-
What special security challenges does SOA present?
-
What security challenges do unified communications present?
-
Do you take a different approach to security architecture for a COTS vs a custom solution?
-
Have you architected a security solution that involved SaaS components? What challenges did you face?
-
Have you worked on a project in which stakeholders choose to accept identified security risks that worried you? How did you handle the situation?
Network:
-
What is a firewall?
-
Besides firewalls, what other devices are used to enforce network boundaries?
-
What is the role of network boundaries in information security?
-
What does a intrusion detection system do? How does it do it?
-
What is a honeypot? What type of attack does it defend against?
-
What technologies and approaches are used to secure information and services deployed on cloud computing infrastructure?
-
What information security challenges are faced in a cloud computing environment?
-
How does packet filtering work?
-
Can you give me an overview of IP multicast?
-
Can you explain the difference between a packet filtering firewall and a application layer firewall?
-
What are the layers of the OSI model?
Security Leadership:
-
How do you ensure that solution architects develop secure solutions?
-
What training do solution architects need to have in regards to IT security? What about developers?
-
How do you sell the value of IT security initiatives to executive management?
-
How do you ensure that a solution continues to be resilient in the face of evolving threats?
-
How do you avoid implementing overly complex or unnecessary security mechanisms?
-
Have you been involved with the governance of information security? What was your role? What did you accomplish?
-
Can you describe the laws and regulations that have a significant impact to information security at our organization?
-
What is the relationship between information security and privacy laws?
-
What is security level management?
-
How do you ensure that security management is transparent and measurable?
-
Can you outline the typical responsibilities of a Chief Security Officer (CSO)?
-
Can you give me an example of some emerging trends in information security that youre keeping an eye on?
Experience:
-
Have you developed an incident response plan?
-
Have you been involved in supporting incident investigations? What was your role? What was the outcome?
-
Have you performed a risk analysis and evaluation? How did you go about it? What stakeholders did you involve?
-
Have you performed a threat assessment? What factors did you consider?
-
Have you performed a vulnerability assessment? What types of vulnerabilities are most difficult to identify?
-
In the context of a vulnerability assessment, how do you calculate the probability that a vulnerability will be exploited?
-
Can you give me an example of a time you identified and implemented controls to mitigate a risk? How did you evaluate the controls?
-
How do you stay up-to-date with technology? For example, how do you keep up with new information security threats?
Cryptography:
-
How does the SSL Protocol work?
-
What is the difference between symmetric-key cryptography and public-key cryptography?
-
Can you give me an overview of how public-key cryptography works?
-
What is the difference between the encryption standards AES and DES?
-
What is the role of digital certificates in encryption?
-
What encryption mechanisms would you recommend to an organization that wants to encrypt its outgoing emails?
-
Can you give me an overview of IPsec? What is its purpose?
-
Does IPsec replace the need for SSL?
Security Incident Management:
-
What are the components of ITIL incident management?
-
If our organization experienced a major security incident, what steps should we take to manage the incident?
-
Can you describe the responsibilities of an incident manager?
Threats:
-
In your opinion, what are the top five information security threats facing an organization such as ours?
-
What is a man-in-the-middle attack?
-
Can you give me an example of cross-site scripting?
-
What is SQL injection? How is it prevented?
-
What is a buffer overflow?
-
What is clickjacking?
Vulnerabilities:
-
What is a insecure direct object reference? Why is it a problem?
-
Why is it important to validate redirects and forwards?
-
What are some common security vulnerabilities at the information storage level?
-
What are some common security vulnerabilities at the transport level?
-
How can improper error handling expose security vulnerabilities? How?
Physical Security Integration:
-
Can you give me a few examples of physical security integration?
-
What is social engineering? How common is it?
-
How would you secure an office environment? What about a data center?