Common Technical Interview Questions and Answers Update on May 29, 2021

Question 81: Following too many failed login attempts, users are forced to validate their identity via an account lockout policy, which includes the following security settings:

A. Account lockout threshold
B. Account lockout duration
C. Reset account lockout counter after
D. All of the above

Correct Answer:
D. All of the above
Explanation:
The account lockout policy is made up of three security settings: account lockout duration, account lockout threshold and reset account lockout counter after. These policy settings can decrease the chances of successful attacks on an organization’s network by preventing attackers from guessing users’ credentials.

Question 82: The following are best practices for IT administrators to ensure remote users meet data security and protection standards, except:

A. Allow applications such as WhatsApp and Facebook Messenger to access business data
B. Audit all systems accessing corporate data and standardize on secure collaborative apps
C. Contact users directly to ensure they are familiar with standard work applications and processes
D. Make efforts to support remote users and proactively ask if they need help

Correct Answer:
A. Allow applications such as WhatsApp and Facebook Messenger to access business data
Explanation:
Under no circumstances, should IT administrators allow unsafe applications, such as WhatsApp and Facebook Messenger, to access business data. This is a direct threat to remote data security and may threaten the organization’s efforts to meet data protection compliance standards.

Question 83: The process of _______, when staff change roles and gain new permissions without eliminating outdated and unneeded privileges, expands the scope of attack in the event of an account compromise.

A. Principle of least privilege
B. Pass the hash
C. Role-based access
D. Privilege creep

Correct Answer:
D. Privilege creep
Explanation:
Privilege creep occurs when users accumulate more permissions than are necessary to perform their specific roles. To detect errors such as privilege creep — which can extend the blast radius in the event of account compromise — organizations should conduct audits of identity and access management processes.