Questions Rating
What is the role in your current company? 5
explain brute force attack 5
explain different types malware 5
when malware attack happen, what you will do 5
What is the role in your company? 5
From how many years you are working in SIEM tool. 5
Can you explain me about your role in your company and how y 5
OSI layers 5
Layer 3 devices 5
layer 2 device 5
difference between tcp and udp 5
recent malware attack made the news? 5
use cases 5
according to which correlation rule ransomware incident will 5
What are the steps u will take to remediate ransomware? 5
Explain SIEM Architecture? 5
What are L1, L2, L3 roles in your organization and what is the 5
What is your role and what your day today activities? 5
Explain some correlation rule that you think was most importan 5
How you will mitigate zero day attack? 5
Which protocol DNS works is this TCP or UDP?Same with http 5
WHat si more dangerous a flase positive or false negative? 5
Which is more dangerous internal or external threath and why 5
The most severe breach you worked on in your organization 5
How you detect and remediate an DDOS attack? 5
Worked on any tools that detect an DDOS? 5
Introduce yourself? 5
What are your day to day activity? 5
What kind on escalation do you get? and how do you handle i 5
Technical escalation you have handled with example? 5
How are the escalation process happens in you company? (ex: 5
What are threat intelligence you have used? 5
Which SIEM tool you have worked on? 5
Which siem u are using? 5
What is osi layer? 5
What is 3 way handshake? 5
What is latest security threat? 5
What you will do to get incident about wanna cry? 5
What are the different sources from where you will get logs? 5
What is virus and malware? 5
What is difference between tcp and udp? 5
How will you remediate in case of sql injection? 5
What is difference between virus,worm and Trojan? 5
Explain your experience in security!! 5
What is incident management and how you mange it at your o 5
What are L1, L2, L3 roles in your organization and what is the 5
What is your role and what your day today activities? 5
what type of logs you come across daily basis 4
explain incident management option when you rise a ticket. 4
explain false positive 4
Architecture of the SIEM 4
What types of logs you were monitoring 4
Dos and DDos attack 4
Data Ex-filteration 4
What is correlation 4
What were the use cases you were monitoring 4
How do you determine the false positives 4
Apart from this what al d wrks you hv done. 4
Difference between routing and router protocol, 4
how do you go through Dns server? 4
own dns server in dmz? 4
dns uses tcp or udp? 4
in which case it uses tcp or udp? 4
SIEM corelation and configuration? 4
how you find incident seeing logs? 4
Which type of incident u know? 4
which logs u use to see in windows? 4
What logs u see in application, security and system? 4
what u see after uploading file in virus total? 4
what is trojan horse, virus and worm? 4
Explain your experience in security!! 4
What is incident management and how you mange it at your o 4
WHat are the tools you used or know about how and when you 4
How do you communicate the work after your shift ends? 4
What is the difference between firewall and router if both doe 4
How do you detect a mail is spam or not?List out the pointers 4
Difference between vulnerability, risk, threat? 4
What is malware? 4
How will you detect a malware and remediate?Expain the cycle 4
Is headre encrypted in SSL or TLS? 4
What are the network inline tools(firewall, IDS/IPS, WAF, Ro 4
What is APT? 4
How do you make sure that the data you received from server 4
What is MIM how would you mitigate it?Steps please? 4
Diff between vulnerability and exploit? 4
Ways to handle brute force? 4
What is OWASP list some rules you used while testing? 4
How to you analyse the detection found in IPS Say a rule is tr 4
Will provide you with an application server what re the things/s 4
Any further improvements done for the escalation? 4
Apart from providing incident response what else can be done 4
DNS specific use cases? 4
Why do we need siem? 4
Why u want to switch from this company? 4
What you do as your current profile? 4
What incident you get to siem? 4
What is proxy server? 4
What is ips? 4
How you will communicate with google explain step by step? 4
What is firewall? 4
What you want to do after 2 year? 4
In which layer computer will work? 4
which tool your using as SOC Analyst 3
3
what is the exact message displayed on pop up with malware attack happen.
what basis you decide severity of malware or attack 3
explain in depth about brute force attack (how it happens, wh 3
explain sync flood attack 3
what are all the devices your integrating to SIEM and how ma 3
how you will find the brute force attacker(on what basis...etc 3
how many tickets you rise daily 3
what you learn t in 1.5 Yrs from your organization 3
What is zero day attack 3
How do you update role or policy in firewall. Explain 3
Suppose you monitoring a particular attack. How do you respon 3
What s dictionary attack 3
Diff between brute force and dictionary attack 3
Mention recent major vulnerability you have cm across. 3
What is aggregation 3
Which tool you are using? 3
What you do with ePO other than installing AV, enforcing poli 3
What is Firewall? 3
Have you worked on Firewall? 3
What is brute force attack and how you will come to know that i 3
do you knowledge on networking and security concept? 3
firewall(mcafee 3
syslog configration on siem 3
What are the feeds in threat intelligence? 3
How much percent u are confident to do this job? 3
What is prevevilege escalation? 3
What is ransomware? 3
What is your idea or knowledge when it comes to UEBA or in 3
Ex: IMagine there is S1/S2 incident logged and analised and y 3
What is vullnerability assesment? 3
Have you done VA and what tool you used 3
If you used any tool how often and how you used to manage a 3
What is ESM? 3
WHat was your biggest failure and success in your career?Wh 3
LIst some top vulnerabilities you worked in recently? 3
Worked on ISO-27001 or NIST 800-53 if yes what are the con 3
What is the use of RADIUS server?Difference between SSL 3
How you ensure that video straeming is not affected when your 3
Difference between NAT and ARP? 3
Private IP address range? 3
What is VPN?Explain how its implemented at your org? 3
What is ransom ware? 3
What is TCP retransmission and why it happens? 3
What is DLP?What tool you used? 3
What is SSL and why is it not enough when it comes to encry 3
What is XSS? 3
Can we hack WEP?If yes what tools you will use? 3
How you will ensure security of database? 3
Diff between encoding, encryption, and hashing? 3
If you had to both encrypt and compress data during transmis 3
What are teh sites you browse to get information on security? 3
Diff between HTTP and HTML? 3
How will you solve CORS header error? 3
How will you solve CORS header error..? 3
What are the technology platform you have worked on? 3
What are the monitoring tools have you used? 3
What is default gateway? 3
What is subnetting? 3
What is ip address and classify? 3
How will you configure ip address? 3
What is static and dynamic routing? 3
What is Xpath injection? 3
What is there in you so that I will hire you? 3
WHat are the tools you used or know about how and when you 3
are you making any reports, if not who is doing that. 2
what is reconnaissance virus and why is so important 2
Puddle attack and heartbleed 2
What are the clients of your company and what your compan 2
What is ePO and what you will do using ePO... 2
analyse logs and report incident 2
what is domain admin? 2
What is event ID for username created and deleted in 1 hour 2
Reporting? 2
Can the Nitro SIEM backup automatically during update?(PLea 2
How will you detect phishing attack as security engineer? 2
Basic concepts on AWS(cloud types, storage types, SAAS, I 2
within LAN and outside public traffic? 2
Tools you used during PT if you have added PT or CEH cert?t 2
How do you ensure security for your cloud instances? 2
What is salting, and why is it used? 2
What are XSS you solved along with application developer? 2
common defenses against XSS? 2
How do you check processes and virtual memory in UNIX? 2
File transfer in UNIX? 2
What are XSS you solved along with application developer..? 2
common defenses against XSS? 2
How do you think DGA's work? 2
What is difference between Mcafee vs Logarythm SIEM? 2
How worked on any analytics tools?(ex: Bigdata 2
How worked on any analytics tools?(ex: Bigdata) 2
What is proactive? 2
Why do you want to join capegemini? 2
What you do with wireshark? 2
Explain tool functions 1
what you will do using ePO 1
which client you are working for and explain about client 1
explain different types scenario, when you rise ticket 1
In which company you are working? 1
What is OSPF and RIP? 1
expectation: 1
What is poodle vulnerability how did you mitigated the inciden 1
What is difference between hard worker and smart worker? 1