This is the second part of the Cybersecurity Interview Series. We’ll be going over Scenario Interviews.
Scenario based questions will test more in depth knowledge as well as your thought process vs knowing the answer to a specific question.
Some example scenarios could be
- When it comes to a Security solution for your team, when would you consider building vs buying?
- You have a Vulnerability Management report with 10 valid High Severity vulnerabilities. How would you prioritize these?
- The Classic Question: What happens when you type “website.com” into your browser and press enter?
All these are simply to get you thinking of scenarios you can be asked to walk through in a Cybersecurity Interview (Blue Team focused).
Keep in mind, you will be expected to walk through these, not just give an answer and move on.
Take the following scenario: You have been handed a laptop whose user believes there is malware on it since it has been running slow, what do you do? Where do you look to prove/disprove this theory?
Some of the first things you can do is narrow the scope down to a specific time range, and determine if you want to disconnect the machine from the network.
From here, the process will look differently depending on which OS to investigate.