What are Different SOC models ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
Explain SOC team Hierarchy ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is Cognitive Cyber Security ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What are top benefits of SOAR ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is log Aggregation? what are common ways to aggerate logs for SIEM ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is log Enrichment?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is log Normalization and Categorization ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is Log parsing ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is difference between Encryption and Hashing ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is forward Secrecy and how does it work ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
Explain Different types of firewall in details ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is Difference between HIDS & NIDS ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
How to protect data in transit VS rest ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is Difference between Diffe hellman and RSA ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What are HTTP error codes ? name few ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is cipher text ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What are various types of Data breach ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is perimeter-based and data-based protection ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What do you document in an Incident ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
Why do we need SOC team ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What ticketing tool you have worked on ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is SLA ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What are different types of VLAN ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
How will you detect WAF or firewall ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
what type of patching tool you are familiar with ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What types of lg you will receive everyday ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
Explain Splunk Architecture ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
How do you provide email security ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
How you Detect Ransomware though SIEM ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is session Hijacking & how it is different from session fixation ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What steps you will take in company as Security Analyst , in case of Ransomware attack ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What are Splunk ports ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is Mitre Att&ck Frame work ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is AAA ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is Zero day attack ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is inbound and outbound traffic ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What command you will you use to check packet loss or not and the connection is working fine or not ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
How will you forward logs and add log source ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
Assume you are head of security in you organization , a breach happen in your org how will you handle it ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What are different dashboard you generate ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
Apart from SIEM what other tools have you worked on ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
How does OpenVPN works ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
Explain SIEM Implementation phases ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
Explain the incident response/process lifecycle ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
Explain SOC workflow ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What do you document in Shift handover ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
what is SOP/playbook/runbook?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
Difference between Blue-team and red-team ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is Difference between VPN & VLAN ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
Explain CSRF & security Misconfiguration ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is Difference between stream cipher and block cipher ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
How can identity theft be prevented ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What are steps to setup a firewall?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is difference between information protection and information assurance ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What are several Indicators of compromise that an organization should look for ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is difference in Find & locate in Linux ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What will you do if there are 200 alerts triggered at once ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
what is Cyber kill chain ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
Explain Trojan Infection process ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
How do you handle P1 incident in SOC ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
Take me though cyber security incident handling process ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is data exfiltration ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What are Risk management phases ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is difference between symmetric and asymmetric Encryption ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is PKI ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
How will you secure server ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is web Cache poisoning ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
How do you Continously monitor a file in linux, you want to the file changes being displayed in screen frequently ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is RCE on Website ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
What is kerberosting ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
How to avoid looping while sending packets from one switch to another ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
If IP is provided to you what will be your approach to do Vulnerability Assessmentd ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.
How you stay updated with currently threats, vulnerabilities, security issues, Data breach ?
Answer to be updated here soon as I get time, the answer will be an example answer of what I would have said, is not perfect nor ideal, I expect you to answer them correctly with confidence.