Sollicitatiegesprek voor de functie Technical Program Manager-Security



Threat model an application. Pick a vulnerability and explain how it works. How does public key infrastructure work? What are your considerations in designing an identity management system? How do you monitor security in a data center where devices may be changed out routinely?


Voeg antwoorden of opmerkingen toe

Meld u aan of registreer u om hier een opmerking over te maken.