Interview Questions 2023
Interview Questions 2023
oof
Business
Sensitive
Interview Questions: e
Inform
Basic Network Questions: ton
The main difference between TCP and UDP
On which OSI layer Formatting, compression, and encapsulation happens? - presentation layer
The transport layer sets up and maintains the connection between two devices.
What is SSL?
If you want to do encryption from one system to another, which one do we choose and why?
FTP 0, 2
SMTP 5 TFTP 69
DNS 53 NTP 23
HTTPS 443
Cyberpr
oof
Business
Sensitive
Threats: e
Inform
What is SQL Injection and how does it work? ton
What is client-side cross site scripting and how does it work?
What changes do you see once the malware is infected in the system?
There are emerging threats every day, how do you update yourself as a security analyst?
Recent attacks
What is sandboxing
ArcSight:
5 GB
-> on which port console/web console/command center and Manager connects? And on which
protocol?
What are the criteria for priority evaluation that happens in the ArcSight? Model Confidence, relevance,
severity, asset criticality.
Cyber
oof
Business
Sensitv
Using which interface do you manage the CORR Engine?
e
Inform
What are the types of storage retention in ArcSight
tonCORRE engine (Time based, and Space based)
What is the default retention period in CORRE? (30 to 90 days)
Qradar
If you see some offenses in Qradar which have already been informed by the client as pentesting alerts, what do you
do
-> Using which option in QRadar local and remote IPPs are differentiated
If you set any offense as pending, does the same event trigger a new offense?
Reference set, Reference map, Reference map of set, Reference map of maps
scaserver
Will the event retention change when you do the QRadar upgrade?
hthttps://www.ibm.com/developerworks/communityty/forums/html/topic?id= 69b4ef82-ad-4ac5-9f b-
cdeab24a 500
What kind of use cases can you think of after integrating a firewall?
Difference between local rule and global rule
Types of flows:
Type A Super flow (Network scans): One source to many destination IPs
This is a unidirectional flow, which has the same source, but multiple destinations.
Type C Super flow (Port scans): One-to-one source and destination with
Cyberp
oof
Business
Sensitive
many ports This is a one-to-one flow with differentesource or destination ports
Inform
Over Flow record: Created when license limits aretonexceeded
When a QFlow collector hits its flow license limit, it begins creating overflow records. Overflow records
have a source IP of 2 7.0.0.4 and a destination IP of 2 7.0.0.5 with one flow created per protocol (icmp,
udp, tcp, etc). When the license limit is reached, QFlow rolls the rest of the traffic for the protocol within
the interval into a single record. All bytes and packet counts are totaled up and added to these
overflow records
What is GRUB
What is the difference between soft SIM clean and hard SIM clean?
What is sudo?
In which layer do DDoS and DoS occur?
swap memory - It is an extra memory that is taken from the HDD when the RAM memory is full.
System needs more memory resources.
Double Pulsar runs in kernel mode, which grants cybercriminals a high level of control over the
computer system. Once installed, it uses three commands: ping, kill, and exec, the latter of which can
be used to load malware onto the system
>CISSP, CISSP-ISSAP, CISA, CISM, CEH, CHFI, ITILv3F, ISO 7002 LI, CCNA
How do you analyze whether the system got compromised when you open an attachment?
How do WAF, ROUTER, SWITCH, PROXY, IDS, IPS, EMAIL GATEWAY, etc. work?
Cyberpr
oof
Business
Sensitive
How do you confirm whether SQL injection or XSSe attack happened and which logs you will check?
Inform
for confirmation and what actions you will take ton
>what arethetop web applicaton atacks(OWASP) and what isthe mitgaton for each atack
How do you confirm that a DOS or DDOS attack occurred and what action will you take to fix it?
likewise
Pluralsight
Categories: Applicaton, Authentcaton, DOS, Exploit, Malware, policy, potental exploit, suspicious
activity
Syslog stands for System Logging Protocol and is a standard protocol used to send system log or event.
messages to a specific server, called a syslog server. It is primarily used to collect various device logs
from several different machines in a central location for monitoring and review.
netstat: The netstat command is a Command Prompt command used to display very detailed
Information about how your computer is communicating with other computers or network devices.
netstat -f
The Forwarded protocol is typically used to forward events to another QRadar® Console. For example,
Console A has Console B configured as an off-site target.
IBM resilient
protocol - JDBC
-postgress DB 543
Sybase DB 5000
-DB 50000
Informix DB 9088
Windows without win collect - Microsoft Remote Procedure Call (MSRPC) 235
Quantitatively, the risk will be measured in terms of money like 000$ risk etc.
Qualitatively is the common method, using this you will measure risk as Low, High, and Medium as a scale.
from 2 to 20 etc.
4-7 MEDIUM
8-20 HIGH
Is there a way to know which user created a rule and who edited it?
Cyberpr
oof
Business
Sensitive
Look in these events: e
Inform
CRE Rule Modified, CRE Rule Added ton
Log Source: SIM Audit- :: hostname
When we add a log source, which database will be updated, or which location will be updated?
qradar backend
How do you find malware on your Windows box (using the command line) netstat -ano, net
users,tasklist /svc,net localgroup administrators, Netstat –an –proto,Netstat –s
How does coalescing work, what are the parameters for coalescing to work, can we modify those?
parameters?
What is ransomware, types of ransomware and how do we analyze and mitigate them
What is the minimum bandwidth and latency required for a HA pair in QRadar?
What parameters will you check while calculating a license for QRadar?
Can we keep one device in a HA pair in one location and the other in another geographical location? If so, what are the
challenges we face
What parameter will you check to give the log source identifier as hostname/IP address?
What are the configuration steps you take on a firewall, proxy, email gateway, WAF, endpoint device, etc.?
to send the logs to SIEM
What are the parameters we will check to confirm if a website is secure or not?
How do you confirm or how do you analyze whether your email id is compromised or not?
When antivirus software is updating, if any virus attacks the system, will the antivirus detect it?
threat or not
How does the malware identify a normal system and a sandbox, and how does it behave differently in those?
scenarios
What are the standard parameters we will check to confirm SQL injection, XSS is performed (True
positive/false positive
False positive or false negative, which one should we be more concerned about?
What is the protocol used to collect logs from Windows devices other than Win Collect, Syslog?
Difference between reference set (set of elements to refer IPs, MD5, usernames, IOCs) and building block
What is the difference between defining severity, credibility, and relevance in rule actions and rules?
responses?
Difference between reference set and reference data
/opt/qradar/support/validate_deployment.sh
How do you log into the server as admin using SQL injection?
What is a honeypot
WAF:
Email secure gateway: Cisco Email Security Appliance, Clearswift SECURE Email Gateway, Fortinet
FortMail, McAfee Security for Email Servers, Microsoft Exchange Online Protection, Proofpoint Email
Protecton, Sophos Email Appliance, Symantec Email Security.cloud, Symantec Messaging Gateway,
Trend Micro InterScan Messaging Security
How can we bypass correlation for a log source which is sending logs to QRadar
Difference between deploy changes and full deploy changes
What is the port number for protocol DRBD (Distributed Replicated Block Device) 7789?
/opt/qradar/bin/contentManagement.pl
hahttps://www.ibm.com/supportt/knowledgecener/SSKMKU/com.ibm.qradar.doc_cloud/
t_cmt_importng_contint.html
Service now app (to create the ticket from the offense)
How would you confirm that a Windows 7 system has been compromised?
What are examples of tools or logs that might be used to collect and analyze evidence?
When you suspect that an attack against the network has occurred, what information should you collect to
test the theory
What is vulnerability scanning and how does it help to keep an enterprise secure?
PSH
TCP buffers data that you send. This means it won't send data immediately and will wait to see if you
have more. By setting the PSH flag, and confirming that you have no more data to send, TCP will 'push'
or send the buffered or collected data into the wire towards the receiver. In the receiving end, normally,
it will also buffer data. But, if it sees the PSH flag being set, it pushes it immediately to the application. If
A packet leaving the sender has the PSH field set, it only means that the sender has nothing more to
send.
URG
If you have pushed data, the receiving end will wait for all of the data first and will see the PSH flag being
set. Then it forwards the data to the application. This means, you have to wait for the receiver to get all
of the data before forwarding it and processing a new one. If the URG flag is set, this is like the sender
You do not need to wait for all of the data before sending them. Go ahead and prioritize sending.
Cyberpr
oof
Business
Sensitive
urgent data.". This causes the receiving TCP to forward e the urgent data on a separate channel to the
application. This allows the application to process information and data out of band.
ton
The urgent pointer is the one that indicates how much of the data in the segment is urgent and where it is.
starts counting from the first byte.
Enumerating: The process of counting off or listing what services, applications, and protocols are
present on each identified computer
>>>>>>>>>>>>>>>>>>>>>>>>>
Tell me about recent attacks you have worked on recently.
What is SQL injection and how do you identify this attack using QRadar?
What is Cyber kill chain
What are the correlation rules you have created in Qradar
How do you integrate log sources in QRadar?
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>