Soc Analyst Interview Questions
Soc Analyst Interview Questions
Analyst interviews?
SOC ANALYST
INTERVIEW
QUESTIONS
Mr Fingerz
@that_cybersecurityguy
Mr Fingerz
Contents:
Pre-preparing
Mr Fingerz
@that_cybersecurityguy
Mr Fingerz
Preparing:
Congratulations on taking the first step towards a career as a SOC Analyst! As you prepare for
interviews in this dynamic field, it's essential to equip yourself with the right knowledge and
strategies to stand out. This comprehensive guide is designed to help you navigate SOC Analyst
interviews with confidence and professionalism.
Mr Fingerz
@that_cybersecurityguy
Mr Fingerz
WHAT SHOULD YOU EXPECT?
Below is a list of the topics on which questions can be asked in the interview.
Security Analyst
Basic terminologies
Network fundamentals
Operating system fundamentals
Malware analysis fundamentals
How to analyze attacks (phishing, malware...)
Incident Responder
Incident response prosedure
How to detect and remediate specific kind of attack (like golden ticket, phishing
etc.) Ransomware remediation process
Mr Fingerz
@that_cybersecurityguy
Mr Fingerz
GENERAL QUESTIONS
Mr Fingerz
@that_cybersecurityguy
Mr Fingerz
GENERAL QUESTIONS
How can you define Blue Team and Red Team basically?
Red team is attacker side, blue team is defender side.
What is firewall?
Firewall is a device that allows or blocks the network traffic according to the rules.
Mr Fingerz
@that_cybersecurityguy
Mr Fingerz
GENERAL QUESTIONS
What is compliance?
Following the set of standards authorized by an organization, independent part, or
government.
Explain 2FA.
2FA is an extra layer of security used to make sure that people trying to gain access to an
online account are who they say they are. First, a user will enter their username and a
password. Then, instead of immediately gaining access, they will be required to provide
another piece of information. (Authy)
Mr Fingerz
@that_cybersecurityguy
Mr Fingerz
NETWORK
The Open Systems Interconnection model (OSI model) is a conceptual model that describes the
universal standard of communication functions of a telecommunication system or computing
system, without any regard to the system's underlying internal technology and specific protocol
suites. (Wikipedia)
1. Physical layer: The Physical Layer is responsible for the transmission and reception of
unstructured raw data between a device, such as a network interface controller, Ethernet hub
or network switch and a physical transmission medium. It converts the digital bits into
electrical, radio, or optical signals.
2. Data link layer: The data link layer provides node-to-node data transfer—a link between two
directly connected nodes. It detects and possibly corrects errors that may occur in the physical
layer. It defines the protocol to establish and terminate a connection between two physically
connected devices. It also defines the protocol for flow control between them. IEEE 802 divides
the data link layer into two sublayers: a. Medium access control (MAC) layer – responsible for
controlling how devices in a network gain access to a medium and permission to transmit data. b.
Logical link control (LLC) layer – responsible for identifying and encapsulating network layer
protocols, and controls error checking and frame synchronization.
3. Network layer: The network layer provides the functional and procedural means of transferring
packets from one node to another connected in "different networks".
4. Transport layer: The transport layer provides the functional and procedural means of
transferring variable-length data sequences from a source host to a destination host from one
application to another across a network, while maintaining the quality-of-service functions.
Transport protocols may be connection-oriented or connectionless.
Mr Fingerz
@that_cybersecurityguy letsdefend.io
Mr Fingerz
NETWORK
TCP uses a three-way handshake to establish a reliable connection. The connection is full
duplex, and both sides synchronize (SYN) and acknowledge (ACK) each other.
The client chooses an initial sequence number, set in the first SYN packet. The server also
chooses its own initial sequence number, set in the SYN/ACK packet.
Each side acknowledges each other's sequence number by incrementing it; this is the
acknowledgement number. The use of sequence and acknowledgment numbers allows both
sides to detect missing or out-of-order segments.
Once a connection is established, ACKs typically follow for each segment. The connection
will eventually end with a RST (reset or tear down the connection) or FIN (gracefully end
the connection). (ScienceDirect)
Mr Fingerz
@that_cybersecurityguy letsdefend.io
Mr Fingerz
NETWORK
What is TCP/IP Model? Explain the difference between OSI and TCP/IP
model.
The TCP/IP model is the default method of data communication on the Internet. It was
developed by the United States Department of Defense to enable the accurate and
correct transmission of data between devices.
TCP/IP divides communication tasks into layers that keep the process standardized,
without hardware and software providers doing the management themselves. The data
packets must pass through four layers before they are received by the destination device,
then TCP/IP goes through the layers in reverse order to put the message back into its
original format. (Fortinet)
TCP/IP Model contains four layers. The layers are:
1.Application Layer
2.Transport Layer
3.Internet Layer
4.Network Access Layer
What is ARP?
The Address Resolution Protocol (ARP) is a communication protocol used for discovering
the link layer address, such as a MAC address, associated with a given internet layer
address, typically an IPv4 address. This mapping is a critical function in the Internet
protocol suite. (Wikipedia)
What is DHCP?
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol
used on Internet Protocol (IP) networks for automatically assigning IP addresses and other
communication parameters to devices connected to the network using a client–server
architecture.
Mr Fingerz
@that_cybersecurityguy letsdefend.io
Mr Fingerz
NETWORK
Mr Fingerz
@that_cybersecurityguy
Mr Fingerz
WEB APPLICATION SECURITY
Mr Fingerz
@that_cybersecurityguy
Mr Fingerz
WEB APPLICATION SECURITY
Mr Fingerz
@that_cybersecurityguy
Mr Fingerz
WEB APPLICATION SECURITY
Mr Fingerz
@that_cybersecurityguy
Mr Fingerz
WEB APPLICATION SECURITY
What is IDOR?
Insecure Direct Object Reference (IDOR), is a vulnerability caused by the lack of an
authorization mechanism or because it is not used properly. It enables a person to access
an object that belongs to another.
Among the highest web application vulnerability security risks published in the 2021
OWASP, IDOR or “Broken Access Control” takes first place.
What is RFI?
Remote File Inclusion (RFI), is the security vulnerability that occurs when a file on different
server is included without sanitizing the data obtained from a user.
What is LFI?
Local File Inclusion (LFI), is the security vulnerability that occurs when a local file is
included without sanitizing the data obtained from a user.
Mr Fingerz
@that_cybersecurityguy letsdefend.io
Mr Fingerz
CRYPTOGRAPHY
Mr Fingerz
@that_cybersecurityguy
Mr Fingerz
MALWARE ANALYSIS
What is the name of the software that compiles of the written codes?
Compiler
What is the name of the software that translates machine codes into
assembly language?
Disassembler
Mr Fingerz
@that_cybersecurityguy
Mr Fingerz
EVENT LOG ANALYSIS
Which field of which event should I look at so that I can detect RDP
logons?
You can detect RDP logon activities with event ID 4624. "Logon Type" value should be 10.
Mr Fingerz
@that_cybersecurityguy
Mr Fingerz
THREAT INTELLIGENCE
Mr Fingerz
@that_cybersecurityguy letsdefend.io
Mr Fingerz