Cybersecurity Analyst Interview Questions and Answers
Cybersecurity Analyst Interview Questions and Answers
Black hat: Black-Hat Hackers are those hackers who enter the system without taking
owners’ permission. These hackers use vulnerabilities as entry points. They hack systems
illegally. They use their skills to deceive and harm people.
White hat: White-Hat Hackers are also known as Ethical Hackers. They are certified hackers
who learn hacking from courses. These are good hackers who try to secure our data,
websites. With the rise of cyberattacks organizations and governments have come to
understand that they need ethical hackers.
Gray hat: Gray-Hat Hackers are a mix of both black and white hat hackers. These types of
hackers find vulnerabilities in systems without the permission of owners. They don’t have
any malicious intent. However, this type of hacking is still considered illegal. But they never
share information with black hat hackers. They find issues and report the owner, sometimes
requesting a small amount of money to fix it.
Port scanning is a method of determining which ports on a network are open and could be
receiving or sending data. It is also a process for sending packets to specific ports on a host
and analyzing responses to identify vulnerabilities.
4. How can you define Blue Team and Red Team basically?
5. What is firewall?
Firewall is a device that allows or blocks the network traffic according to the rules.
Threat: Any circumstance or event with the potential to adversely impact organizational
operations, organizational assets, individuals, other organizations, or the Nation through a
system via unauthorized access, destruction, disclosure, modification of information, and/or
denial of service.
8. What is compliance?
If you do have any project to show, make sure that you prepare it before the interview.
2FA is an extra layer of security used to make sure that people trying to gain access to an
online account are who they say they are. First, a user will enter their username and a
password. Then, instead of immediately gaining access, they will be required to provide
another piece of information.
12. Could you share some general endpoint security product categories?
• Antivirus
• EDR
• XDR
• DLP
HIDS: HIDS means Host Intrusion Detection System. HIDS is located on each host.
NIDS: NIDS means Network Intrusion Detection System. NIDS is located in the network.
Integrity: Integrity involves making sure your data is trustworthy and free from tampering.
The integrity of your data is maintained only if the data is authentic, accurate, and reliable.
Availability: Systems, networks, and applications must be functioning as they should and
when they should. Also, individuals with access to specific information must be able to
consume it when they need to, and getting to the data should not take an inordinate
amount of time.
Authentication: Authentication involves a user providing information about who they are.
Users present login credentials that affirm they are who they claim.
Accounting: Accounting keeps track of user activity while users are logged in to a network
by tracking information such as how long they were logged in, the data they sent or
received, their Internet Protocol (IP) address, the Uniform Resource Identifier (URI) they
used, and the different services they accessed.
Developed by Lockheed Martin, the Cyber Kill Chain framework is part of the Intelligence
Driven Defense model for identification and prevention of cyber intrusions activity. The
model identifies what the adversaries must complete to achieve their objective.
The seven steps of the Cyber Kill Chain enhance visibility into an attack and enrich an
analyst’s understanding of an adversary’s tactics, techniques and procedures.
Security information and event management (SIEM) is a security solution that provides the
real time logging of events in an environment. The actual purpose for event logging is to
detect security threats.
In general, SIEM products have several features. The ones that interest us most as SOC
analysts are they filter the data that they collect and create alerts for any suspicious events.
18. What Is Indicator of Compromise (IOCs)?
Indicators of Attack (IOAs) demonstrate the intentions behind a cyberattack and the
techniques used by the threat actor to accomplish their objectives. The specific cyber
threats arming the attack, like malware, ransomware, or advanced threats, are of little
concern when analyzing IOAs.
True Positive:
If the situation to be detected and the detected (triggered alert) situation are the same, it is
a True Positive alert. For example, let's say you had a PCR test to find out whether you are
Covid19 positive and the test result came back positive. It is True Positive because the
condition you want to detect (whether you have Covid19 disease) and the detected
condition (being a Covid19 patient) are the same. This is a true positive alert.
Let’s suppose there is a rule to detect SQL Injection attacks and this rule has been triggered
because of a request that was made to the following URL. The alert is indeed a “True
Positive” as there was a real SQL Injection attack.
False Positive:
In short, it is a false alarm. For example, there is a security camera in your house and if the
camera alerts you due to your cat's movements, it is a false positive alert.
If we look at the URL example below, we see the SQL parameter "Union" keyword within
this URL. If an SQL injection alert occurs for this URL, it will be a false positive alert because
the “Union” keyword is used to mention a sports team here and not for an SQL injection
attack.
NETWORK
The Open Systems Interconnection model (OSI model) is a conceptual model that describes
the universal standard of communication functions of a telecommunication system or
computing system, without any regard to the system's underlying internal technology and
specific protocol suites.
I. Physical layer: The Physical Layer is responsible for the transmission and reception
of unstructured raw data between a device, such as a network interface controller,
Ethernet hub or network switch and a physical transmission medium. It converts the
digital bits into electrical, radio, or optical signals.
II. Data link layer: The data link layer provides node-to-node data transfer—a link
between two directly connected nodes. It detects and possibly corrects errors that
may occur in the physical layer. It defines the protocol to establish and terminate a
connection between two physically connected devices. It also defines the protocol
for flow control between them. IEEE 802 divides the data link layer into two
sublayers: a. medium access control (MAC) layer – responsible for controlling how
devices in a network gain access to a medium and permission to transmit data.
b. Logical link control (LLC) layer – responsible for identifying and encapsulating
network layer protocols, and controls error checking and frame synchronization.
III. Network layer: The network layer provides the functional and procedural means of
transferring packets from one node to another connected in "different networks".
IV. Transport layer: The transport layer provides the functional and procedural means
of transferring variable-length data sequences from a source host to a destination
host from one application to another across a network, while maintaining the
quality-of-service functions. Transport protocols may be connection-oriented or
connectionless.
V. Session layer: The Session Layer creates the setup, controls the connections, and
ends the teardown, between two or more computers, which is called a "session".
Since DNS and other Name Resolution Protocols operate in this part of the layer,
common functions of the Session Layer include user logon (establishment), name
lookup (management), and user logoff (termination) functions. Including this matter,
authentication protocols are also built into most client software, such as FTP Client
and NFS Client for Microsoft Networks. Therefore, the Session layer establishes,
manages and terminates the connections between the local and remote application.
VI. Presentation layer: The Presentation Layer establishes data formatting and data
translation into a format specified by the application layer during the encapsulation
of outgoing messages while being passed down the protocol stack, and possibly
reversed during the deencapsulation of incoming messages when being passed up
the protocol stack. For this very reason, outgoing messages during encapsulation are
converted into a format specified by the application layer, while the conversation for
incoming messages during deencapsulation are reversed.
VII. Application layer: The application layer is the layer of the OSI model that is closest to
the end user, which means both the OSI Application Layer and the user interact
directly with software application that implements a component of communication
between the client and server, such as File Explorer and Microsoft Word. Such
application programs fall outside the scope of the OSI model unless they are directly
integrated into the Application layer through the functions of communication, as is
the case with applications such as Web Browsers and Email Programs. Other
examples of software are Microsoft Network Software for File and Printer Sharing
and Unix/Linux Network File System Client for access to shared file resources.
TCP uses a three-way handshake to establish a reliable connection. The connection is full
duplex, and both sides synchronize (SYN) and acknowledge (ACK) each other.
The client chooses an initial sequence number, set in the first SYN packet. The server also
chooses its own initial sequence number, set in the SYN/ACK packet.
Each side acknowledges each other's sequence number by incrementing it; this is the
acknowledgement number. The use of sequence and acknowledgment numbers allows both
sides to detect missing or out-of-order segments.
Once a connection is established, ACKs typically follow for each segment. The connection
will eventually end with a RST (reset or tear down the connection) or FIN (gracefully end the
connection).
22. What is TCP/IP Model? Explain the difference between OSI and TCP/IP model.
The TCP/IP model is the default method of data communication on the Internet. It was
developed by the United States Department of Defense to enable the accurate and correct
transmission of data between devices.
TCP/IP divides communication tasks into layers that keep the process standardized, without
hardware and software providers doing the management themselves. The data packets
must pass through four layers before they are received by the destination device, then
TCP/IP goes through the layers in reverse order to put the message back into its original
format.
I. Application Layer
II. Transport Layer
III. Internet Layer
IV. Network Access Layer
Difference:
TCP/IP OSI
TCP/IP uses both session and presentation layer OSI uses different session and
in the application layer itself. presentation layers.
The Address Resolution Protocol (ARP) is a communication protocol used for discovering the
link layer address, such as a MAC address, associated with a given internet layer address,
typically an IPv4 address. This mapping is a critical function in the Internet protocol suite.
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used
on Internet Protocol (IP) networks for automatically assigning IP addresses and other
communication parameters to devices connected to the network using a client–server
architecture.
25. Could you share some general network security product names?
• Firewall
• IDS
• IPS
• WAF
IDS only detect the traffic but IPS can prevent/block the traffic.
While answering this question vary different scenarios, encryption is the key point for being
safe.
1XX: Informational 2XX: Success 3XX: Redirection 4XX: Client-side error 5XX: Server-side
error
The OWASP Top 10 is a standard awareness document for developers and web application
security. It represents a broad consensus about the most critical security risks to web
applications.
SQL Injections are critical attack methods where a web application directly includes
unsanitized data provided by the user in SQL queries.
I. In-band SQLi (Classical SQLi): If a SQL query is sent and a replied to over the same
channel, we call these In-band SQLi. It is easier for attackers to exploit these
compared to other SQLi categories.
II. Inferential SQLi (Blind SQLi): SQL queries that receive a reply that cannot be seen
are called Inferential SQLi. They are called Blind SQLi because the reply cannot be
seen.
III. Out-of-band SQLi: If the reply to a SQL query is communicated over a different
channel, then this type of SQLi is called Out-of-band SQLi. For example, if the
attacker is receiving replies to his SQL queries over the DNS this is called an out-of-
band SQLi.
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are
injected into otherwise benign and trusted websites. XSS attacks occur when an attacker
uses a web application to send malicious code, generally in the form of a browser side
script, to a different end user. Flaws that allow these attacks to succeed are quite
widespread and occur anywhere a web application uses input from a user within the output
it generates without validating or encoding it.
For XSS attacks to be successful, an attacker needs to insert and execute malicious content
in a webpage. Each variable in a web application needs to be protected. Ensuring that all
variables go through validation and are then escaped or sanitized is known as perfect
injection resistance. Any variable that does not go through this process is a potential
weakness. Frameworks make it easy to ensure variables are correctly validated and escaped
or sanitised.
However, frameworks aren't perfect and security gaps still exist in popular frameworks like
React and Angular. Output Encoding and HTML Sanitization help address those gaps.
I. Reflected XSS (Non-Persistent): It is a non-persistent XSS type that the XSS payload
must contain in the request. It is the most common type of XSS.
II. Stored XSS (Persistent): It is a type of XSS where the attacker can permanently
upload the XSS payload to the web application. Compared to other types, the most
dangerous type of XSS is Stored XSS.
III. DOM Based XSS: DOM Based XSS is an XSS attack wherein the attack payload is
executed as a result of modifying the DOM “environment” in the victim’s browser
used by the original client-side script, so that the client-side code runs in an
“unexpected” manner.
Among the highest web application vulnerability security risks published in the 2021
OWASP, IDOR or “Broken Access Control” takes first place.
Remote File Inclusion (RFI) is the security vulnerability that occurs when a file on different
server is included without sanitizing the data obtained from a user.
Local File Inclusion (LFI) is the security vulnerability that occurs when a local file is included
without sanitizing the data obtained from a user.
LFI differs from RFI because the file that is intended to be included is on the same web
server that the web application is hosted on.
Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted
actions on a web application in which they’re currently authenticated. With a little help of
social engineering (such as sending a link via email or chat), an attacker may trick the users
of a web application into executing actions of the attacker’s choosing. If the victim is a
normal user, a successful CSRF attack can force the user to perform state changing requests
like transferring funds, changing their email address, and so forth. If the victim is an
administrative account, CSRF can compromise the entire web application.
A WAF or web application firewall helps protect web applications by filtering and monitoring
HTTP traffic between a web application and the Internet. It typically protects web
applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion,
and SQL injection, among others. A WAF is a protocol layer 7 defense (in the OSI model) and
is not designed to defend against all types of attacks.
CRYPTOGRAPHY
Encoding: Converts the data in the desired format required for exchange between different
systems.
Hashing: Maintains the integrity of a message or data. Any change did any day could be
noticed.
Encryption: Ensures that the data is secure and one needs a digital verification code or
image to open it or access it.
Hashing: Hashing is the process of converting the information into a key using a hash
function. The original information cannot be retrieved from the hash key by any means.
Difference:
A salt is added to the hashing process to force their uniqueness, increase their complexity
without increasing user requirements, and to mitigate password attacks like hash tables.
SSL TLS
SSL stands for “Secure Socket Layer.” TLS stands for “Transport Layer Security.”
Netscape developed the first version The first version of TLS was developed by the
of SSL in 1995. Internet Engineering Taskforce (IETF) in 1999.
Three versions of SSL have been Four versions of TLS have been released: TLS
released: SSL 1.0, 2.0, and 3.0. 1.0, 1.1, 1.2, and 1.3.
All versions of SSL have been found TLS 1.0 and 1.1 have been “broken” and are
vulnerable, and they all have been deprecated as of March 2020. TLS 1.2 is the
deprecated. most widely deployed protocol version.
MALWARE ANALYSIS
45. What is the name of the software that compiles of the written codes?
Compiler
46. What is the name of the software that translates machine codes into assembly
language?
Disassembler
47. What is the difference between static and dynamic malware analysis?
Dynamic Analysis: It is the approach that examines the behavior of malicious software on
the system by running it. In dynamic analysis, applications that can examine registry, file,
network and process events are installed in the system, and their behavior is examined by
running malicious software.
It should also be noted that using only one approach may not be sufficient to analyze
malware. Using both approaches together will give you to best results!
48. How does malware achieve persistence on Windows?
• Services
• Registry Run Keys (Run, RunOnce)
• Task Scheduler
• Infecting to clean files
• Security
• Application
• System
50. With which security Event ID can the Successfully RDP connection be detected?
4624
4625
52. Which field of which event should I look at so that I can detect RDP logons?
You can detect RDP logon activities with event ID 4624. "Logon Type" value should be 10.
THREAT INTELLIGENCE
Threat intelligence is the analysis of data using tools and techniques to generate meaningful
information about existing or emerging threats targeting the organization that helps
mitigate risks. Threat Intelligence helps organizations make faster, more informed security
decisions and change their behavior from reactive to proactive to combat the attacks.
TAXII, short for Trusted Automated eXchange of Intelligence Information, defines how cyber
threat information can be shared via services and message exchanges.