How would you triage a suspicious outbound dns request

Assignment Help Management Information Sys
Reference no: EM133361634

Assignment:

  1. How would you triage a suspicious outbound DNS request?
  2. Why would you get an alert from a previously blocked domain on the same device? And what level of the cyber kill chain will this attack fall under?
  3. You identified an alert is at the Command-and-Control stage how do you identify what malware was installed?
  4. Is there a recent investigation that you have done that you can work me through?
  5. How do you test the functionality of a network device?
  6. What are the ports and protocols engaged when you run a command ping? How does ping work on the network layer?
  7. How will an administrator block the ping command at the network layer?
  8. Could you tell me about an interesting incident you took part in? What was the incident? What was your role, and how was it resolved? I was thinking of using my network scenario here
  9. You receive an alert for a server communicating with an IP with a malicious reputation. How do you approach the problem?
  10. You mentioned that as a Cybersecurity Analyst part of your job was providing mitigation strategies. Could you give me an example of some of the strategies that you have recommended or implemented?
  11. You receive an alert for a potentially malicious URL click made by a user. How would you investigate this? What steps would you take?
  12. What is your incident response experience? Can I give the 6 incidence response step here and an explanation
  13. What is your ticket handling experience?
  14. What is your malware analysis experience?
  15. What is your experience with Raw Logs?
  16. What is your experience with Threat Intelligence?
  17. What was the most difficult alert you responded to and how did you respond to it? Can I use the SCenario of the client refusing to block the IP but after doing more research and involving the manager the IP was blocked
  18. What are some of the different security events you have responded to?
What is your security tuning experience, if any? explain if you have
  • What is your engineering experience, if any?
  • Have you done PCAP analysis? If so, explain
  • What are you most proud of in your career so far?
  • How have you used Splunk in your environment? Give a detailed overview because this are most used tool in my company
  • Name 10 ports and Protocols

Reference no: EM133361634

Questions Cloud

Discuss physical intrusion as a social engineering technique : What are the differences between Passive and Active Reconnaissance, consider the legality of these techniques?
What are issues with downloading-using proprietary software : What are the issues with copying, downloading, and using proprietary software and other copyrighted works?
Role of a business case as utilized in the systems analysis : What is the value, importance and role of a business case as utilized in the systems analysis and design process?
Identify a top concern with compliance : We might find that the actions of individuals can dictate the success or failure of compliance efforts throughout the organization.
How would you triage a suspicious outbound dns request : Why would you get an alert from a previously blocked domain on the same device? And what level of the cyber kill chain will this attack fall under?
Concepts of it security and privacy : The principles and concepts of IT security and privacy; How key events in history that have contributed to modern IT security and privacy;
How would organize sensitivity levels for this client : Explain how you would organize sensitivity levels for this client. Consider classifications such as high-medium-low, numbered levels, and labels such as public.
Discuss concept map for systems monitoring : A concept map is a way to put ideas into a picture and show how those concepts relate. It is a way for you to absorb new information in a visual way.
Review article about the fbis cybercrime : What we see is that cyber criminal strategy keep evolving so the FBI have to stay one step ahead of the criminals in order to fight their work.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Advantages and issues related to transnational it operations

Write a 4- to 6-page paper about various aspects, advantages, disadvantages, and issues related to transnational IT operations

  How does the group influence the state government

Discuss its connection or relationship to each of the two major political parties in your state. Analyze the interest group's relationship with the two major political parties by addressing these questions: How does the group influence the state gove..

  A description of the ethical issue faced by the company

Write a paper of approximately 3 pages on the company and topic chosen in terms of both the personal and professional ethical issues that existed.

  How can a tool such as splunk assist with this

Propose a "plan" for your network log management program to your boss. Who will review your logs? How often will they be reviewed? How will you protect your log files? What recommendations will you make for log aggregation and correlation? How can..

  List several input-output devices that you own

List several input/output devices that you own. Which are your favorite? Why? Which are your least favorite? Why?

  Moral judgment and living wage

explain at least two reasons many consider the adoption of a living wage a moral and ethical issue. Discuss the implications that morality and ethics have to analyzing and developing public policy.

  Electronic system for time coding

Information Systems Life Cycle-Time Coding - process to an electronic system for time coding.

  Explain in detail the initial steps that would need

Explain in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident.

  Describe the network configuration

Describe the network configuration that will address the needs of the organization. Topic coverage should include DNS, DHCP, network protocols etc.

  Review of a scholarly article on the topic of intimidation

Review of a scholarly article on the topic of intimidation. Reviews should include a synopsis and your opinion of the article.

  What factors might help your team decide to put a new system

What factors might help your team decide when to put a new system or release into production?

  Explore the bank data available on the lms

CISC520 : Explore the bank data available on the LMS, and an accompanying description of the attributes and their values.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd