infosec-info-and-interview-questions

A collection of interview questions and answers I created while studying for interviews.

View on GitHub

General Info

Interview Tips

These are generally geared towards remote interviews.

General Security Concepts

CIA Triad

Confidentiality, Integrity, and Availability. This is the fundamental principle of Infosec.

Principle of Least Privilege (PoLP)

In short, nothing should have more access than the absolute bare minimum needed to accomplish a task. One example is a developer in AWS with an account. Many orgs will give them full admin access or a policy like EC2:*. This is dangerous. First, nothing is more dangerous to your company than a developer with admin access, and realistically, any kind of production access. Second, when their credentials are exposed or stolen, an attacker will now have over-privileged account.

Defense In Depth

Security is an onion. You can’t expect to be secure with one set of protections. You need many layers - Defense in depth

A good combination would be PoLP in all aspects (IAM, containers, server accounts), firewalls on servers and the perimeter, automated vulnerability scanners for alerting, WAFs on endpoints, VPNs, restricted ACLs and security groups, up to date servers, regular and secured backups, and security training for personnel: You can have all the security in the world but Jim from Accounting is still going to open up that Phishing email.

General Questions

Where do you get your news/info from?

In my opinion, these are some good places to get news. It’s very important to keep up with all kinds of news - attacks, bugs, new tools, etc.

You can also set up Feedly with a bunch of resources from the above, and others, to get a single dashboard of info.

Who do you follow in the industry?

Related to the above, it’s important to follow important people/groups in the industry outside of looking at news. This mostly applies to twitter.

What are your favorite tools?

This question is only helpful to start a conversation and judge your familiarity with the entire space, not the tools themselves. Can you name 5 security tools right now? What are they for and why would you use one over the other?

Don’t say Kali.

Wireshark, Metasploit, Hashcat, nmap, among others