Question: What is the difference between TCP and UDP? What are the TCP Flags/where do we find TCP Flags? What are the layers of the OSI
- What is the difference between TCP and UDP?
- What are the TCP Flags/where do we find TCP Flags?
- What are the layers of the OSI model?
- Describe the 3-way handshake process?
- What is the role of a sequence number in a 3-way handshake?
- Describe the functions of the TCP flags?
- What is a TCP window size? And what does it do?
- What is DNS and what port does it use?
- What is DNS over TCP used for?
- What is ICMP and what port does it use?
- Explain the use of tracert/traceroute?
- What is a host file in terms of DNS?
- What is a loopback address and what is a non-routable address
- What is the difference between a local account and a Domain account
- What is ARP and what is an ARP table?
- How can ARP be manipulated by an attacker?
- How can ARP poisoning occur in technical terms?
- What is SNMP?
- Can you tell me a DOS technique?
- What services and protocols are used to carry out DOS attacks?
- What is the difference between a DOS and a DDOS attack?
- What is a SQL injection attack?
- How can you identify a SQL injection attack?
- What are some of the technique's organizations can use to prevent SQL injection?
- What is the difference between a persistence and reflective cross site scripting attack?
- What is a buffer overflow and how can a buffer overflow be detected on the network? It is a Software coding error or vulnerability that can be exploited by hackers to gain access to the organization network. We can detect it using a NGF , Or HIDS .
- What is the difference between a stack overflow and a heap overflow?
- What are some defenses against buffer overflow? Input validation
- What is the difference between encryption, Encoding and hashing?
- What is a network service that uses encryption?
- What method can be used to get a plain text from a hash?
- What is the difference between asymmetric and symmetric encryption?
- What is the Diffie Herman key exchange?
- How does a port scan work?
- How does a port scan identify open ports?
- What is port scanning?
- How to identify port scanning:
- How to prevent port scanning:
- How can tools like NMAP identify specific versions of the operating system running on a targeted host?
- What is the difference between an IDS and an IPS?
- Can you give me a recent significant vulnerability?
- What is an APT?
- What differentiates an APT from other threat actors?
- Explain what you know about cloud technology
- How do organizations defend zero-day attacks if there is no patch available for that vulnerability?
- What is the CIA triad?
- What do you know about PKI and how does it work?
- What is the cyber kill chain?
- What is the MITRE Framework?
- What is Splunk and how does it work?
- What experience do you have in Splunk?
- What does SPL stand for?
- What function will you use ton lay out data in a table format in Splunk?
- How will you filter out a stream of network traffic inside Wireshark?
- What is NMAP and what will you use it for?
- What is NESSUS used for and how does it work?
- What is a rainbow table?
SCENARIO BASED QUESTIONS
- How would you triage a suspicious outbound DNS request?
- Why would you get an alert from a previously blocked domain on the same device? And what level of the cyber kill chain will this attack fall under?
- You identified an alert is at the Command-and-Control stage how do you identify what malware was installed?
- Is there a recent investigation that you have done that you can work me through?
- How do you test the functionality of a network device?
- What are the ports and protocols engaged when you run a command ping? How does ping work on the network layer?
- How will an administrator block the ping command at the network layer?
- Could you tell me about an interesting incident you took part in? What was the incident? What was your role, and how was it resolved? I was thinking of using my network scenario here
- You receive an alert for a server communicating with an IP with a malicious reputation. How do you approach the problem?
- You mentioned that as a Cybersecurity Analyst part of your job was providing mitigation strategies. Could you give me an example of some of the strategies that you have recommended or implemented?
- You receive an alert for a potentially malicious URL click made by a user. How would you investigate this? What steps would you take?
- What is your incident response experience? Can I give the 6 incidence response step here and an explanation
- What is your ticket handling experience?
- What is your malware analysis experience?
- What is your experience with Raw Logs?
- What is your experience with Threat Intelligence?
- What was the most difficult alert you responded to and how did you respond to it? Can I use the SCenario of the client refusing to block the IP but after doing more research and involving the manager the IP was blocked
- What are some of the different security events you have responded to?
- What is your security tuning experience, if any? explain if you have
- What is your engineering experience, if any?
- Have you done PCAP analysis? If so, explain
- What are you most proud of in your career so far?
- How have you used Splunk in your environment? Give a detailed overview because this are most used tool in my company
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
