Upload Button Icon Add office photos

Filter interviews by

ISA Global SOC Analyst Interview Questions and Answers

Updated 20 Mar 2024

ISA Global SOC Analyst Interview Experiences

1 interview found

SOC Analyst Interview Questions & Answers

user image Anonymous

posted on 20 Mar 2024

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Approached by Company and was interviewed in Sep 2023. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Explain ISO-OSI layers ? What is ADSL?
  • Ans. 

    ISO-OSI layers are a conceptual framework used to understand network communication. ADSL is a type of broadband internet connection.

    • ISO-OSI layers refer to a model that divides network communication into seven layers, each with specific functions.

    • ADSL (Asymmetric Digital Subscriber Line) is a type of broadband internet connection that allows faster download speeds compared to upload speeds.

    • ISO-OSI layers include physic...

  • Answered by AI
  • Q2. What is DHCP?, What is Router, Difference between hub and Switch?
  • Ans. 

    DHCP is a network protocol that assigns IP addresses to devices, a router is a networking device that forwards data packets between computer networks, hub broadcasts data to all devices while switch forwards data to specific devices.

    • DHCP stands for Dynamic Host Configuration Protocol

    • DHCP assigns IP addresses to devices on a network

    • Router is a networking device that forwards data packets between computer networks

    • Hub bro...

  • Answered by AI

Interview Preparation Tips

Topics to prepare for ISA Global SOC Analyst interview:
  • Networking
  • Network Security
Interview preparation tips for other job seekers - Please don't be panic they may ask general question.

Skills evaluated in this interview

Interview questions from similar companies

SOC Analyst Interview Questions & Answers

TCS user image Saurabh Shinde

posted on 23 Sep 2024

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. WHAT IS HONETPOT
  • Ans. 

    A honeypot is a decoy system designed to lure cyber attackers and gather information about their tactics, techniques, and procedures.

    • Honeypots are used to detect and analyze cyber threats in a controlled environment.

    • They can be deployed within an organization's network to attract and monitor malicious activities.

    • Honeypots can help organizations improve their security posture by identifying vulnerabilities and understan...

  • Answered by AI
  • Q2. HOW YOU HANDLE SECURITY INCIDENT
  • Ans. 

    I handle security incidents by following established incident response procedures and utilizing various security tools.

    • Immediately isolate affected systems to prevent further damage

    • Collect and analyze relevant data to determine the scope and impact of the incident

    • Contain the incident by blocking malicious activity and removing threats

    • Communicate with stakeholders to keep them informed of the situation

    • Document the incid...

  • Answered by AI
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via LinkedIn and was interviewed in Jun 2023. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Case Study 

How you can slove issue when there is malware alert triggered where No ioc or ioa is deducted its new and you are only one at the shift how you will come up .

Round 3 - Technical 

(2 Questions)

  • Q1. How you will rectify new attack
  • Ans. 

    To rectify a new attack, I would first analyze the attack vector, contain the attack, investigate the root cause, implement necessary security measures, and update incident response procedures.

    • Analyze the attack vector to understand how the attack occurred

    • Contain the attack by isolating affected systems and limiting further damage

    • Investigate the root cause of the attack to prevent future incidents

    • Implement necessary se...

  • Answered by AI
  • Q2. How you can solve or scan the vulnerability
  • Ans. 

    To solve or scan vulnerabilities, utilize vulnerability scanning tools, conduct penetration testing, implement security patches, and regularly update software.

    • Utilize vulnerability scanning tools such as Nessus, Qualys, or OpenVAS to identify vulnerabilities in systems and networks

    • Conduct penetration testing to simulate real-world attacks and identify potential vulnerabilities

    • Implement security patches provided by soft...

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Genpact SOC Analyst interview:
  • Check company names in chathgpt
Interview preparation tips for other job seekers - Always trust and be patience and give your best.always hit the target any time one can achieve the target.

SOC Analyst Interview Questions & Answers

HCLTech user image Jangam Vijayasree

posted on 23 Feb 2024

Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What is CIA triad
  • Ans. 

    CIA triad is a model designed to guide policies for information security within an organization.

    • CIA stands for Confidentiality, Integrity, and Availability

    • Confidentiality ensures that information is only accessible to those who are authorized to view it

    • Integrity ensures that information is accurate and trustworthy

    • Availability ensures that information is accessible when needed

    • Example: Encrypting sensitive data to mainta

  • Answered by AI
  • Q2. What is Port number of RDP
  • Ans. 

    The port number for RDP (Remote Desktop Protocol) is 3389.

    • Port number for RDP is 3389

    • RDP uses TCP protocol

    • Commonly used for remote desktop connections

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Mar 2022. There were 2 interview rounds.

Round 1 - Aptitude Test 

Basic information about experience

Round 2 - Technical 

(2 Questions)

  • Q1. About my Technical skills.
  • Q2. About my responsibility

Interview Preparation Tips

Interview preparation tips for other job seekers - It's good opportunity for work and grow the technical skills and experience and also good for team work.

Interview Questionnaire 

1 Question

  • Q1. About analysis of incident like malware,phishing email, cyber attacks
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via campus placement at Dr. B.R. Ambedkar National Institute of Technology (NIT), Jalandhar and was interviewed in Dec 2023. There was 1 interview round.

Round 1 - One-on-one 

(2 Questions)

  • Q1. He ask me questions related to cyber security, He give me codes of network security in python and ask me to find the errors in the code
  • Q2. Only 2 rounds of interviews was there, both the interviews were of 45 min duration, first round was easy as compared to the second round
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.

Round 1 - Aptitude Test 

It has 40 Questions and time duration of more than 45 minutes

Round 2 - Coding Test 

It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.

Round 3 - HR 

(2 Questions)

  • Q1. Difference between GET and POST method.
  • Ans. 

    GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.

    • GET requests data from a specified resource

    • POST submits data to be processed to a specified resource

    • GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history

    • GET requests have length restrictions, while POST requests do

  • Answered by AI
  • Q2. About Cyber Security and Hashing Methods

Interview Preparation Tips

Interview preparation tips for other job seekers - Prepare well for your Job Role

Skills evaluated in this interview

I applied via Approached by Company and was interviewed in May 2022. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Technical 

(1 Question)

  • Q1. 1.What is Router. Router give the 1st interface and receive the packet and through out the destination. 2.What is Switch. Single network but it is a multiple device network it is a manageable device and st...
  • Ans. 

    A router is a networking device that forwards data packets between computer networks.

    • Routers operate at the network layer of the OSI model.

    • They use routing tables to determine the best path for data packets to travel.

    • Routers can connect different types of networks, such as LANs and WANs.

    • Examples of routers include Cisco, Juniper, and TP-Link.

    • Routers can provide security features such as firewalls and VPNs.

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - I am a fresher , persuing the ccna networking course

Skills evaluated in this interview

I applied via Naukri.com and was interviewed in Aug 2021. There were 3 interview rounds.

Interview Questionnaire 

8 Questions

  • Q1. Types of network?
  • Ans. 

    There are several types of networks, including LAN, WAN, MAN, WLAN, and PAN.

    • Local Area Network (LAN) is a network that covers a small area, such as an office or a building.

    • Wide Area Network (WAN) is a network that covers a large geographical area, such as multiple cities or countries.

    • Metropolitan Area Network (MAN) is a network that covers a larger area than a LAN but smaller than a WAN, typically within a city.

    • Wireles...

  • Answered by AI
  • Q2. What is the range of private ip address?
  • Ans. 

    The range of private IP addresses is defined by three blocks: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255.

    • Private IP addresses are used within private networks and are not routable on the internet.

    • The three blocks of private IP addresses are reserved for use in local area networks (LANs) and are not unique globally.

    • Private IP addresses allow organizations to have multipl...

  • Answered by AI
  • Q3. How many host will be in /29?
  • Ans. 

    A /29 subnet has 6 usable host addresses.

    • A /29 subnet has a subnet mask of 255.255.255.248.

    • The subnet mask leaves 3 bits for host addresses.

    • 2^3 = 8, but 2 addresses are reserved for network and broadcast.

    • Therefore, a /29 subnet has 6 usable host addresses.

  • Answered by AI
  • Q4. What is mpls?
  • Ans. 

    MPLS (Multiprotocol Label Switching) is a protocol used in telecommunications networks to efficiently route data packets.

    • MPLS is a layer 2.5 protocol that operates between traditional layer 2 (Data Link Layer) and layer 3 (Network Layer) protocols.

    • It uses labels to identify and forward data packets, improving network performance and scalability.

    • MPLS can be used to create virtual private networks (VPNs) and prioritize t...

  • Answered by AI
  • Q5. What's the ad value of bgp and bgp States?
  • Ans. 

    BGP (Border Gateway Protocol) is a routing protocol used in internet networks. It provides scalability, redundancy, and policy control.

    • BGP is used to exchange routing information between different autonomous systems (AS)

    • It allows for efficient routing decisions based on policies and network conditions

    • BGP states represent the different stages of establishing and maintaining BGP peering sessions

    • Examples of BGP states inc...

  • Answered by AI
  • Q6. Types of ospf LSA
  • Ans. 

    OSPF LSA types include Router LSA, Network LSA, Summary LSA, ASBR Summary LSA, AS External LSA, and NSSA External LSA.

    • Router LSA describes the state of the router and its interfaces within an area.

    • Network LSA describes the state of the network segment and its attached routers.

    • Summary LSA summarizes routes from one area to another.

    • ASBR Summary LSA summarizes routes to an Autonomous System Boundary Router (ASBR).

    • AS Exter...

  • Answered by AI
  • Q7. What's is VTP?
  • Ans. 

    VTP stands for VLAN Trunking Protocol. It is a Cisco proprietary protocol used to manage VLAN configurations across a network.

    • VTP allows for centralized management of VLANs in a network.

    • It enables the creation, deletion, and renaming of VLANs on a switch and automatically propagates these changes to other switches in the network.

    • VTP operates in three modes: server, client, and transparent.

    • Server mode allows VLAN config...

  • Answered by AI
  • Q8. What's is hsrp?
  • Ans. 

    HSRP stands for Hot Standby Router Protocol. It is a Cisco proprietary protocol used to provide redundancy for IP networks.

    • HSRP is used to create a virtual IP address that can be shared by multiple routers in a network.

    • It allows for automatic failover in case the primary router fails.

    • HSRP routers elect an active router and standby routers, with the active router handling traffic while the standby routers are ready to t...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - They asked practical questions, better practice in lab and try to troubleshooting and configuration, it will help you to crack interview.

Skills evaluated in this interview

ISA Global Interview FAQs

How many rounds are there in ISA Global SOC Analyst interview?
ISA Global interview process usually has 1 rounds. The most common rounds in the ISA Global interview process are Technical.
What are the top questions asked in ISA Global SOC Analyst interview?

Some of the top questions asked at the ISA Global SOC Analyst interview -

  1. What is DHCP?, What is Router, Difference between hub and Swit...read more
  2. Explain ISO-OSI layers ? What is AD...read more

Tell us how to improve this page.

ISA Global SOC Analyst Interview Process

based on 1 interview

Interview experience

3
  
Average
View more

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.4k Interviews
Accenture Interview Questions
3.9
 • 8.1k Interviews
Infosys Interview Questions
3.7
 • 7.6k Interviews
Wipro Interview Questions
3.7
 • 5.6k Interviews
Cognizant Interview Questions
3.8
 • 5.6k Interviews
Amazon Interview Questions
4.1
 • 5k Interviews
Capgemini Interview Questions
3.8
 • 4.8k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.8k Interviews
Genpact Interview Questions
3.9
 • 3k Interviews
View all
Operations Executive
36 salaries
unlock blur

₹1 L/yr - ₹4 L/yr

Assistant Manager
6 salaries
unlock blur

₹2.7 L/yr - ₹5 L/yr

Assistant Sales Manager
3 salaries
unlock blur

₹4 L/yr - ₹5 L/yr

Senior Executive
3 salaries
unlock blur

₹3 L/yr - ₹4.5 L/yr

Assistant Manager- HR
3 salaries
unlock blur

₹3.5 L/yr - ₹3.9 L/yr

Explore more salaries
Compare ISA Global with

TCS

3.7
Compare

Infosys

3.6
Compare

Wipro

3.7
Compare

HCLTech

3.5
Compare
Did you find this page helpful?
Yes No
write
Share an Interview