Upload Button Icon Add office photos

Filter interviews by

YASREF SOC Analyst Interview Questions and Answers

Updated 31 Jan 2024

YASREF SOC Analyst Interview Experiences

1 interview found

SOC Analyst Interview Questions & Answers

user image abdulrahman

posted on 31 Jan 2024

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. How many years experience in SIEM

Interview questions from similar companies

SOC Analyst Interview Questions & Answers

TCS user image Saurabh Shinde

posted on 23 Sep 2024

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. WHAT IS HONETPOT
  • Ans. 

    A honeypot is a decoy system designed to lure cyber attackers and gather information about their tactics, techniques, and procedures.

    • Honeypots are used to detect and analyze cyber threats in a controlled environment.

    • They can be deployed within an organization's network to attract and monitor malicious activities.

    • Honeypots can help organizations improve their security posture by identifying vulnerabilities and understan...

  • Answered by AI
  • Q2. HOW YOU HANDLE SECURITY INCIDENT
  • Ans. 

    I handle security incidents by following established incident response procedures and utilizing various security tools.

    • Immediately isolate affected systems to prevent further damage

    • Collect and analyze relevant data to determine the scope and impact of the incident

    • Contain the incident by blocking malicious activity and removing threats

    • Communicate with stakeholders to keep them informed of the situation

    • Document the incid...

  • Answered by AI
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via LinkedIn and was interviewed in Jun 2023. There were 3 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Case Study 

How you can slove issue when there is malware alert triggered where No ioc or ioa is deducted its new and you are only one at the shift how you will come up .

Round 3 - Technical 

(2 Questions)

  • Q1. How you will rectify new attack
  • Ans. 

    To rectify a new attack, I would first analyze the attack vector, contain the attack, investigate the root cause, implement necessary security measures, and update incident response procedures.

    • Analyze the attack vector to understand how the attack occurred

    • Contain the attack by isolating affected systems and limiting further damage

    • Investigate the root cause of the attack to prevent future incidents

    • Implement necessary se...

  • Answered by AI
  • Q2. How you can solve or scan the vulnerability
  • Ans. 

    To solve or scan vulnerabilities, utilize vulnerability scanning tools, conduct penetration testing, implement security patches, and regularly update software.

    • Utilize vulnerability scanning tools such as Nessus, Qualys, or OpenVAS to identify vulnerabilities in systems and networks

    • Conduct penetration testing to simulate real-world attacks and identify potential vulnerabilities

    • Implement security patches provided by soft...

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Genpact SOC Analyst interview:
  • Check company names in chathgpt
Interview preparation tips for other job seekers - Always trust and be patience and give your best.always hit the target any time one can achieve the target.

SOC Analyst Interview Questions & Answers

HCLTech user image Jangam Vijayasree

posted on 23 Feb 2024

Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What is CIA triad
  • Ans. 

    CIA triad is a model designed to guide policies for information security within an organization.

    • CIA stands for Confidentiality, Integrity, and Availability

    • Confidentiality ensures that information is only accessible to those who are authorized to view it

    • Integrity ensures that information is accurate and trustworthy

    • Availability ensures that information is accessible when needed

    • Example: Encrypting sensitive data to mainta

  • Answered by AI
  • Q2. What is Port number of RDP
  • Ans. 

    The port number for RDP (Remote Desktop Protocol) is 3389.

    • Port number for RDP is 3389

    • RDP uses TCP protocol

    • Commonly used for remote desktop connections

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Referral and was interviewed before Mar 2022. There were 2 interview rounds.

Round 1 - Aptitude Test 

Basic information about experience

Round 2 - Technical 

(2 Questions)

  • Q1. About my Technical skills.
  • Q2. About my responsibility

Interview Preparation Tips

Interview preparation tips for other job seekers - It's good opportunity for work and grow the technical skills and experience and also good for team work.

Interview Questionnaire 

1 Question

  • Q1. About analysis of incident like malware,phishing email, cyber attacks
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Referral and was interviewed in Oct 2024. There was 1 interview round.

Round 1 - One-on-one 

(5 Questions)

  • Q1. What kind of vulnerability you came across
  • Ans. 

    I came across a vulnerability in a web application that allowed for SQL injection attacks.

    • Identified lack of input validation in user inputs

    • Discovered that the application was directly executing user-supplied SQL queries

    • Suggested implementing parameterized queries to prevent SQL injection

    • Tested the vulnerability by attempting to inject SQL code through input fields

  • Answered by AI
  • Q2. What issues you face in management regarding reporting some security issues
  • Q3. Tcp vs UDP which one is better
  • Ans. 

    It depends on the specific use case and requirements.

    • TCP is reliable and ensures all data is delivered in order, but it can be slower due to the overhead of error-checking and retransmission.

    • UDP is faster and more efficient for real-time applications like video streaming or online gaming, but it does not guarantee delivery or order of packets.

    • Choose TCP for applications that require reliable data transmission, such as ...

  • Answered by AI
  • Q4. Hashing and its examples in real world
  • Ans. 

    Hashing is a process of converting input data into a fixed-size string of bytes using a mathematical algorithm.

    • Hashing is commonly used in password storage to securely store user passwords without storing the actual password.

    • Hashing is used in digital signatures to ensure the integrity of the signed data.

    • Blockchain technology uses hashing to create a secure and tamper-proof record of transactions.

    • File integrity checks ...

  • Answered by AI
  • Q5. Pop3 and icmp what are work and port no.

Interview Preparation Tips

Topics to prepare for Wipro Information Security Analyst interview:
  • Networking
  • cybersecurity
  • reallife scenarios
  • attacks

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Campus Placement and was interviewed in Sep 2024. There were 3 interview rounds.

Round 1 - Aptitude Test 

It is online test. In this test there is question of apti and also coding and from 5g question.

Round 2 - Coding Test 

There are two questions asked and time is enough to solve 60 minutes

Round 3 - Technical 

(5 Questions)

  • Q1. Wap for palindrome number
  • Ans. 

    A palindrome number is a number that remains the same when its digits are reversed.

    • Convert the number to a string

    • Reverse the string

    • Check if the reversed string is equal to the original string

  • Answered by AI
  • Q2. Add two numbers by function
  • Ans. 

    Create a function to add two numbers

    • Define a function that takes two parameters as input

    • Inside the function, add the two numbers together and return the result

    • Example: function addNumbers(num1, num2) { return num1 + num2; }

  • Answered by AI
  • Q3. Write a code for Binary search
  • Ans. 

    Binary search code implementation in Python

    • Define a function that takes a sorted array and a target value as input

    • Initialize two pointers, low and high, to the start and end of the array respectively

    • While low is less than or equal to high, calculate mid as (low + high) // 2 and compare array[mid] with target

    • If array[mid] is equal to target, return mid

    • If array[mid] is less than target, update low to mid + 1

    • If array[mid]...

  • Answered by AI
  • Q4. Wap for check your name is palindrome not
  • Ans. 

    A program to check if a given name is a palindrome or not.

    • Convert the name to lowercase to handle case-insensitivity

    • Remove any spaces or special characters from the name

    • Reverse the name and compare it with the original name to check for palindrome

  • Answered by AI
  • Q5. What is malloc and calloc function
  • Ans. 

    malloc and calloc are functions in C programming used for dynamic memory allocation.

    • malloc function is used to allocate a single block of memory of a specified size.

    • calloc function is used to allocate multiple blocks of memory of a specified size, initialized to zero.

    • Example: int *ptr = (int*)malloc(5 * sizeof(int));

    • Example: int *ptr = (int*)calloc(5, sizeof(int));

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Capgemini Network Engineer interview:
  • Basic programming

Skills evaluated in this interview

Network Engineer Interview Questions & Answers

Jio user image Mehulkumar Prajapati

posted on 29 Nov 2024

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
4-6 weeks
Result
Selected Selected

I applied via Referral

Round 1 - HR 

(2 Questions)

  • Q1. Preferred location
  • Ans. 

    I am open to any location that offers growth opportunities and a challenging work environment.

    • Open to relocation for the right opportunity

    • Prefer locations with strong networking infrastructure

    • Interested in locations with tech hubs or opportunities for professional development

  • Answered by AI
  • Q2. What' isbm your CCTC?
  • Ans. 

    My current CCTC is $80,000 per year.

    • Current CCTC is $80,000 per year

    • CCTC may include salary, bonuses, benefits, etc.

    • Negotiable based on experience and qualifications

  • Answered by AI
Round 2 - One-on-one 

(2 Questions)

  • Q1. Full form of BGP
  • Ans. 

    Border Gateway Protocol

    • BGP stands for Border Gateway Protocol

    • It is a standardized exterior gateway protocol used to exchange routing information between different autonomous systems on the internet

    • BGP helps in determining the best path for data to travel between networks

    • It is commonly used by Internet Service Providers (ISPs) and large organizations to connect to multiple networks

    • BGP operates on TCP port 179

  • Answered by AI
  • Q2. Router function
  • Ans. 

    Routers are networking devices that forward data packets between computer networks.

    • Routers operate at the network layer of the OSI model

    • They use routing tables to determine the best path for data packets

    • Routers can connect different types of networks, such as LANs and WANs

  • Answered by AI
Round 3 - HR 

(2 Questions)

  • Q1. What is Joining date
  • Q2. What is your ECTC
  • Ans. 

    Expected CTC (Cost to Company) for the position

    • ECTC stands for Expected Cost to Company

    • It includes salary, bonuses, benefits, and any other compensation offered by the employer

    • Candidates should provide their expected salary range based on their experience and skills

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
Selected Selected
Round 1 - One-on-one 

(2 Questions)

  • Q1. CCNA SWITCHING and switching
  • Q2. Routing
Round 2 - Technical 

(1 Question)

  • Q1. Manager round CCNA routing and switching

YASREF Interview FAQs

How many rounds are there in YASREF SOC Analyst interview?
YASREF interview process usually has 1 rounds. The most common rounds in the YASREF interview process are Technical.

Tell us how to improve this page.

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.2k Interviews
Accenture Interview Questions
3.9
 • 8k Interviews
Infosys Interview Questions
3.7
 • 7.5k Interviews
Wipro Interview Questions
3.7
 • 5.5k Interviews
Cognizant Interview Questions
3.8
 • 5.5k Interviews
Amazon Interview Questions
4.1
 • 4.9k Interviews
Capgemini Interview Questions
3.8
 • 4.7k Interviews
Tech Mahindra Interview Questions
3.6
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.7k Interviews
Genpact Interview Questions
3.9
 • 3k Interviews
View all
Area Manager
3 salaries
unlock blur

₹51 L/yr - ₹51 L/yr

Explore more salaries
Compare YASREF with

Reliance Industries

4.1
Compare

Indian Oil Corporation

4.4
Compare

Bharat Petroleum

4.2
Compare

Hindustan Petroleum

4.2
Compare

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Did you find this page helpful?
Yes No
write
Share an Interview