Sophos Interview Questions
- 0of 0 votes
AnswersHow was your overall experience working at your last job?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Experience - 0of 0 votes
AnswersWhat was the software engineering process at your last job?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Experience - 0of 0 votes
AnswersDescribe the different programming languages you have used.
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Experience - 0of 0 votes
AnswersWho are virus writers? Why do they write viruses?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Security - 0of 0 votes
AnswersIf you were designing new anti-virus technology, what would you implement?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Ideas Security - 0of 0 votes
AnswersHow can a virtual OS can be compromised?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Security - 0of 0 votes
AnswersWhat sort of test setup would you require for understanding a virus?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Security - 0of 0 votes
AnswersWhat are the characteristics that you look for in an anti-virus engine?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Security - 0of 0 votes
AnswersCan Linux be compromised? How secure is Linux? How would you compromise a *NIX system?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Linux Kernel Security - 0of 0 votes
AnswersWhat is the difference between a heuristical and a behavioral engine?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Terminology & Trivia - 0of 0 votes
AnswersWhat sort of behavioral patterns would you be looking at when designing a behavioral engine?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Application / UI Design - 0of 0 votes
AnswersWhat are the characteristics that you look for in an anti-virus engine?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Security - 0of 0 votes
AnswersCan Linux be compromised? How secure is Linux? How would you compromise a *NIX system?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Security - 0of 0 votes
AnswersDescribe your experiences using different anti-virus technologies.
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Security - 0of 0 votes
AnswersHave you had any experience with assembly languages, particularly ASM?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Experience - 0of 0 votes
AnswerCan a 32-bit PE execute on a 16-bit DOS? If not how will DOS determine that?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Operating System - 0of 0 votes
AnswersHow is COM and SYS files infected?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Behavioral - 0of 0 votes
AnswersPlease explain the Windows PE executable standard and how a virus infects it.
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Security - 0of 0 votes
AnswersWhat are some of the short comings in your role as a researcher?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Behavioral - 0of 0 votes
AnswersWhat makes you a good researcher?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Behavioral - 0of 0 votes
AnswersDescribe the concept behind your current software projects.
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Experience - 0of 0 votes
AnswersWhat would make you an effective Virus Researcher?
- NH March 09, 2009| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Behavioral - 0of 0 votes
AnswersWhy are you interested in working at Sophos?
- NH February 13, 2007| Report Duplicate | Flag | PURGE
Sophos Virus Researcher Behavioral