Book Image

Hack the Cybersecurity Interview

By : Kenneth Underhill, Christophe Foulon, Tia Hopkins
Book Image

Hack the Cybersecurity Interview

By: Kenneth Underhill, Christophe Foulon, Tia Hopkins

Overview of this book

This book is a comprehensive guide that helps both entry-level and experienced cybersecurity professionals prepare for interviews in a wide variety of career areas. Complete with the authors’ answers to different cybersecurity interview questions, this easy-to-follow and actionable book will help you get ready and be confident. You’ll learn how to prepare and form a winning strategy for job interviews. In addition to this, you’ll also understand the most common technical and behavioral interview questions, learning from real cybersecurity professionals and executives with years of industry experience. By the end of this book, you’ll be able to apply the knowledge you've gained to confidently pass your next job interview and achieve success on your cybersecurity career path.
Table of Contents (18 chapters)
1
Part 1: Hacking Yourself
3
Part 2: Cybersecurity Careers and Interview Questions
11
Part 3: Cybersecurity Management Careers and Interview Questions

Common interview questions for a malware analyst career

The following questions include a heavier focus on the analysis of PE headers and questions around assembly language. From my own experience in interviews, the majority of questions I received for malware analyst positions were around PE headers:

  • Can you name the common headers in a Portable Executable (PE) file?

The headers are the DOS header (struct_IMAGE_DOS_HEADER), NT header (struct_IMAGE_NT_HEADER), the file and optional headers that live within the NT header (struct__IMAGE_FILE_HEADER and struct__IMAGE_OPTIONAL_HEADER respectively), and the individual section headers (struct_IMAGE_SECTION_HEADER).

When opening an executable in a hex editor, the DOS header will occupy the first four rows (64 bits) in the hex editor and also include MZ in the magic number field.

The file header contains basic information about the file's layout and contains the following fields:

Table 8.1 ...