The document contains questions about various IT and security topics like roles in organizations, SIEM tools, network devices, protocols, attacks, and incident response processes. Respondents were asked to rate their knowledge on each topic from 1 to 5.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
21 views4 pages
Security
The document contains questions about various IT and security topics like roles in organizations, SIEM tools, network devices, protocols, attacks, and incident response processes. Respondents were asked to rate their knowledge on each topic from 1 to 5.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 4
Questions Rating
What is the role in your current company? 5
explain brute force attack 5 explain different types malware 5 when malware attack happen, what you will do 5 What is the role in your company? 5 From how many years you are working in SIEM tool. 5 Can you explain me about your role in your company and how y 5 OSI layers 5 Layer 3 devices 5 layer 2 device 5 difference between tcp and udp 5 recent malware attack made the news? 5 use cases 5 according to which correlation rule ransomware incident will 5 What are the steps u will take to remediate ransomware? 5 Explain SIEM Architecture? 5 What are L1, L2, L3 roles in your organization and what is the 5 What is your role and what your day today activities? 5 Explain some correlation rule that you think was most importan 5 How you will mitigate zero day attack? 5 Which protocol DNS works is this TCP or UDP?Same with http 5 WHat si more dangerous a flase positive or false negative? 5 Which is more dangerous internal or external threath and why 5 The most severe breach you worked on in your organization 5 How you detect and remediate an DDOS attack? 5 Worked on any tools that detect an DDOS? 5 Introduce yourself? 5 What are your day to day activity? 5 What kind on escalation do you get? and how do you handle i 5 Technical escalation you have handled with example? 5 How are the escalation process happens in you company? (ex: 5 What are threat intelligence you have used? 5 Which SIEM tool you have worked on? 5 Which siem u are using? 5 What is osi layer? 5 What is 3 way handshake? 5 What is latest security threat? 5 What you will do to get incident about wanna cry? 5 What are the different sources from where you will get logs? 5 What is virus and malware? 5 What is difference between tcp and udp? 5 How will you remediate in case of sql injection? 5 What is difference between virus,worm and Trojan? 5 Explain your experience in security!! 5 What is incident management and how you mange it at your o 5 What are L1, L2, L3 roles in your organization and what is the 5 What is your role and what your day today activities? 5 what type of logs you come across daily basis 4 explain incident management option when you rise a ticket. 4 explain false positive 4 Architecture of the SIEM 4 What types of logs you were monitoring 4 Dos and DDos attack 4 Data Ex-filteration 4 What is correlation 4 What were the use cases you were monitoring 4 How do you determine the false positives 4 Apart from this what al d wrks you hv done. 4 Difference between routing and router protocol, 4 how do you go through Dns server? 4 own dns server in dmz? 4 dns uses tcp or udp? 4 in which case it uses tcp or udp? 4 SIEM corelation and configuration? 4 how you find incident seeing logs? 4 Which type of incident u know? 4 which logs u use to see in windows? 4 What logs u see in application, security and system? 4 what u see after uploading file in virus total? 4 what is trojan horse, virus and worm? 4 Explain your experience in security!! 4 What is incident management and how you mange it at your o 4 WHat are the tools you used or know about how and when you 4 How do you communicate the work after your shift ends? 4 What is the difference between firewall and router if both doe 4 How do you detect a mail is spam or not?List out the pointers 4 Difference between vulnerability, risk, threat? 4 What is malware? 4 How will you detect a malware and remediate?Expain the cycle 4 Is headre encrypted in SSL or TLS? 4 What are the network inline tools(firewall, IDS/IPS, WAF, Ro 4 What is APT? 4 How do you make sure that the data you received from server 4 What is MIM how would you mitigate it?Steps please? 4 Diff between vulnerability and exploit? 4 Ways to handle brute force? 4 What is OWASP list some rules you used while testing? 4 How to you analyse the detection found in IPS Say a rule is tr 4 Will provide you with an application server what re the things/s 4 Any further improvements done for the escalation? 4 Apart from providing incident response what else can be done 4 DNS specific use cases? 4 Why do we need siem? 4 Why u want to switch from this company? 4 What you do as your current profile? 4 What incident you get to siem? 4 What is proxy server? 4 What is ips? 4 How you will communicate with google explain step by step? 4 What is firewall? 4 What you want to do after 2 year? 4 In which layer computer will work? 4 which tool your using as SOC Analyst 3 3 what is the exact message displayed on pop up with malware attack happen. what basis you decide severity of malware or attack 3 explain in depth about brute force attack (how it happens, wh 3 explain sync flood attack 3 what are all the devices your integrating to SIEM and how ma 3 how you will find the brute force attacker(on what basis...etc 3 how many tickets you rise daily 3 what you learn t in 1.5 Yrs from your organization 3 What is zero day attack 3 How do you update role or policy in firewall. Explain 3 Suppose you monitoring a particular attack. How do you respon 3 What s dictionary attack 3 Diff between brute force and dictionary attack 3 Mention recent major vulnerability you have cm across. 3 What is aggregation 3 Which tool you are using? 3 What you do with ePO other than installing AV, enforcing poli 3 What is Firewall? 3 Have you worked on Firewall? 3 What is brute force attack and how you will come to know that i 3 do you knowledge on networking and security concept? 3 firewall(mcafee 3 syslog configration on siem 3 What are the feeds in threat intelligence? 3 How much percent u are confident to do this job? 3 What is prevevilege escalation? 3 What is ransomware? 3 What is your idea or knowledge when it comes to UEBA or in 3 Ex: IMagine there is S1/S2 incident logged and analised and y 3 What is vullnerability assesment? 3 Have you done VA and what tool you used 3 If you used any tool how often and how you used to manage a 3 What is ESM? 3 WHat was your biggest failure and success in your career?Wh 3 LIst some top vulnerabilities you worked in recently? 3 Worked on ISO-27001 or NIST 800-53 if yes what are the con 3 What is the use of RADIUS server?Difference between SSL 3 How you ensure that video straeming is not affected when your 3 Difference between NAT and ARP? 3 Private IP address range? 3 What is VPN?Explain how its implemented at your org? 3 What is ransom ware? 3 What is TCP retransmission and why it happens? 3 What is DLP?What tool you used? 3 What is SSL and why is it not enough when it comes to encry 3 What is XSS? 3 Can we hack WEP?If yes what tools you will use? 3 How you will ensure security of database? 3 Diff between encoding, encryption, and hashing? 3 If you had to both encrypt and compress data during transmis 3 What are teh sites you browse to get information on security? 3 Diff between HTTP and HTML? 3 How will you solve CORS header error? 3 How will you solve CORS header error..? 3 What are the technology platform you have worked on? 3 What are the monitoring tools have you used? 3 What is default gateway? 3 What is subnetting? 3 What is ip address and classify? 3 How will you configure ip address? 3 What is static and dynamic routing? 3 What is Xpath injection? 3 What is there in you so that I will hire you? 3 WHat are the tools you used or know about how and when you 3 are you making any reports, if not who is doing that. 2 what is reconnaissance virus and why is so important 2 Puddle attack and heartbleed 2 What are the clients of your company and what your compan 2 What is ePO and what you will do using ePO... 2 analyse logs and report incident 2 what is domain admin? 2 What is event ID for username created and deleted in 1 hour 2 Reporting? 2 Can the Nitro SIEM backup automatically during update?(PLea 2 How will you detect phishing attack as security engineer? 2 Basic concepts on AWS(cloud types, storage types, SAAS, I 2 within LAN and outside public traffic? 2 Tools you used during PT if you have added PT or CEH cert?t 2 How do you ensure security for your cloud instances? 2 What is salting, and why is it used? 2 What are XSS you solved along with application developer? 2 common defenses against XSS? 2 How do you check processes and virtual memory in UNIX? 2 File transfer in UNIX? 2 What are XSS you solved along with application developer..? 2 common defenses against XSS? 2 How do you think DGA's work? 2 What is difference between Mcafee vs Logarythm SIEM? 2 How worked on any analytics tools?(ex: Bigdata 2 How worked on any analytics tools?(ex: Bigdata) 2 What is proactive? 2 Why do you want to join capegemini? 2 What you do with wireshark? 2 Explain tool functions 1 what you will do using ePO 1 which client you are working for and explain about client 1 explain different types scenario, when you rise ticket 1 In which company you are working? 1 What is OSPF and RIP? 1 expectation: 1 What is poodle vulnerability how did you mitigated the inciden 1 What is difference between hard worker and smart worker? 1