Mock Interview with Classmate

 Q. What would you do if a software issue was to occur on a military aircraft? 

A. Firstly I would isolate the issue by checking various systems on the aircraft. When I find the issue, I would assemble a team from engineers and other software developers trained in that specific area to fix the issue. As we fix the issue, we would report the findings to head office and request the software issue is fixed on all new aircraft. 



Q. How would you protect military secrets on the military network? 

A. I would contact the head office and get permission for an authorised penetration test on the server where those military secrets are held. I would define a scope of work document with the head office to discuss when I would be doing the test, what I would be testing and how I would be testing it. Then I would 

conduct the test on the server from outside and inside the network, finding vulnerabilities, exploits, and planting backdoors. I would report my findings to head office and ask for a permission to fix the vulnerabilities to keep the integrity of the military secrets safe. 

  

Q. How would you approach a cyber-attack on our military network? 

A. First I would isolate important servers from the network. This includes servers that contain military secrets and other sensitive data. Then I would try and find the origin of the cyber-attack, the country/region it came from. Then I would identify the entry point to close of the vulnerability that had been 

exploited. Finally, I would scan for other vulnerabilities and fix them if I as to find any. 

  

Q. Explain to me what experience/s you've had in the past with cyber security. 

A. I'm halfway into my online ethical hacker course, I am currently on a digital infrastructure T-level course, and I completed GCSE computer science. 

  

Q. Can you describe how Virtual Private Networks (VPNs) enhance network security, and what are their potential vulnerabilities? 

A. VPN vulnerabilities can give hackers remote access to a network without having to use login credentials. Also, the VPN's servers may not be as secure as the ISP's servers. 

  

Q. How does multi-factor authentication enhance security, and what are some implementation methods? 

A. Multi factor authentication enhances security by providing an 'extra wall' of defence. It provides a level of protection against brute force attacks and makes sure that breached credentials can't be used. 

  

Q. How does full-disk encryption work, and what are its advantages in terms of data security? 

A. Full disk encryptions encrypts every file on the disk so that even if the disk is stolen, hackers can't read the contents. This is an advantage as it provides a physical layer of security as well as software security. 

Comments

Popular posts from this blog

Topologies

Core A – Formative Assessment

Emerging technologies allowing adaptability and future proofing