Anaplan Flashcards

(50 cards)

1
Q

What’s your day-to-day in a SOC?

A

Triage alerts, enrich and investigate, escalate incidents, contain/eradicate threats, coordinate recovery, tune detections, and document lessons learned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you triage an alert from the SIEM?

A

Validate authenticity, check severity/context (asset, user, impact), enrich with threat intel, inspect logs/EDR, determine scope, and escalate per runbook.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s the first thing you do when an incident is reported?

A

Confirm and classify the incident, isolate affected assets if needed, gather evidence, and follow the incident response playbook for containment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the NIST incident response phases.

A

Prepare → Detect & Analyze → Contain → Eradicate → Recover → Post-Incident Activities / Lessons Learned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you use MITRE ATT&CK in investigations?

A

Map observed behaviors to TTPs to understand attacker intent, prioritize detections, inform response actions and build detection coverage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s the Cyber Kill Chain?

A

Reconnaissance → Weaponization → Delivery → Exploitation → Installation → Command & Control → Actions on Objective. Use to disrupt attacker stages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How would you respond to an EDR alert showing PowerShell spawned from Word?

A

Quarantine host, capture memory/process dump, collect logs, check parent/child processes, look for persistence, isolate network, and remediate based on findings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What log sources are essential for triage?

A

Endpoint (EDR), network (firewall, proxy), authentication (AD/Azure AD), application logs, cloud audit logs, email gateway, and SIEM correlation logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you reduce false positives in a SIEM?

A

Tune rules (thresholds), add context (asset criticality, baselines), implement allowlists, use suppression windows, and validate with historical data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the difference between detection and prevention?

A

Prevention blocks threats proactively (firewall, DLP, email filtering); detection finds adversary activity that bypassed prevention (SIEM, EDR).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe containment vs eradication.

A

Containment limits impact (isolate systems); eradication removes threat artifacts and root cause (remove malware, close vulnerabilities).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you prioritize alerts?

A

Use risk factors: asset criticality, scope, impact, exploitability, confidence, and business context—then prioritize response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s a playbook and why use one?

A

A playbook is a documented response process for specific incident types to ensure consistent, rapid, and auditable actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give an example of a simple SIEM query for failed logins.

A

index=auth sourcetype=linux_secure “Failed password” | stats count by src_ip, user (Splunk-style).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you preserve evidence for forensics?

A

Isolate system, collect and image disk/memory, capture logs, record chain of custody, avoid altering evidence, and document actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is DLP and typical controls?

A

Data Loss Prevention detects/prevents exfiltration (endpoint agents, email/Gateway DLP, CASB, content discovery and classification).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Explain SPF, DKIM, and DMARC.

A

SPF: sender IP authorization. DKIM: cryptographic signature. DMARC: policy and reporting for SPF/DKIM failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How would you handle a phishing email reported by a user?

A

Quarantine message, analyze headers/links/attachments, search for other recipients, block URLs/IOCs, notify impacted users, and log the incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What’s MTTR and why does it matter?

A

Mean Time To Respond/Recover — measures SOC effectiveness; lower MTTR reduces impact and risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do you use threat intelligence in triage?

A

Enrich IOCs with sources (VT, AbuseIPDB, OTX), check reputation, prioritize based on matching TTPs, and feed SIEM rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are common indicators of exfiltration?

A

Abnormal outbound traffic, large transfers to unknown IPs, unusual cloud storage usage, and spikes in data access.

22
Q

How do you handle an attacker with valid credentials?

A

Revoke sessions, reset credentials, investigate origin, search for lateral movement, check MFA, and perform forensic analysis.

23
Q

Describe Zero Trust principles.

A

Never trust implicitly, verify every request, least privilege access, microsegmentation, continuous authentication and device trust.

24
Q

What is device trust?

A

Ensuring only managed, healthy devices meeting policy (patching, posture) can access resources.

25
Explain Access Gateways and Isolated Browsers.
Access Gateways broker secure access to apps; Isolated Browsers run browsing off-host to prevent web-based compromise from impacting endpoint.
26
Which automation/scripting skills are useful in SOC?
Python for enrichment/automation, bash/PowerShell for host tasks, and basic API use for integrations.
27
How do you automate enrichment?
Use scripts or SOAR to query VT/AbuseIPDB/Shodan and append results to SIEM/alerts for faster triage.
28
What’s a good incident report structure?
Summary, timeline, scope, impact, root cause, actions taken, evidence, mitigations, and recommendations.
29
How do you measure SOC success?
Metrics: MTTR, detection rate, false positive rate, number of incidents, mean time to contain, and coverage of critical assets.
30
How do you handle stakeholder communication?
Use clear, non-technical summaries for execs; technical status for IT; provide timelines, impact, next steps, and remediation plans.
31
Explain pivot analysis in investigations.
Use an IOC (IP, hash) to pivot across logs/sources to find related hosts, accounts, network flows, and lateral activity.
32
What’s the role of EDR in incident response?
Provides endpoint telemetry, detection, remote response (kill/process, isolate), and forensic artifacts.
33
How do you decide to isolate a host?
Based on impact/risk: active compromise, lateral movement, data exfiltration, or malware persistence that threatens broader environment.
34
How do you test incident playbooks?
Run tabletop exercises, simulated incidents, red team/blue team drills, and post-exercise reviews to refine playbooks.
35
What’s a false positive and how to handle one?
An alert that’s not malicious. Document reason, tune rules, add context, and update detection logic to reduce recurrence.
36
How do you onboard new tooling?
Define requirements, pilot, integrate logs/alerts, create playbooks, train staff, and evaluate performance/ROI.
37
What’s a SIEM correlation rule?
A rule that ties related events (e.g., failed logins + new admin creation) to detect suspicious multi-event patterns.
38
How would you investigate unusual cloud admin activity?
Check CloudTrail/Audit logs, identify origin IP/user, check MFA/device, review recent changes, and rollback or revoke access if needed.
39
What’s least privilege?
Grant users and services only the minimum permissions needed to perform tasks to reduce attack surface.
40
How do you handle on-call rotations and escalations?
Follow escalation matrix, keep runbooks, document handoffs, use paging/SMS, and ensure 24/7 coverage and SLAs.
41
How do you secure SaaS applications?
Enforce SSO/MFA, conditional access, DLP, logging/monitoring, app-level controls, and least privilege for service accounts.
42
What’s the difference between detection engineering and incident response?
Detection engineering builds/optimizes detections; IR triages and responds to incidents those detections produce.
43
How would you escalate a critical incident?
Follow escalation policy: notify incident manager, execs as defined, mobilize IR team, open incident channel, and start communication cadence.
44
What’s an IOC vs TTP?
IOC: observable artefact (IP, hash). TTP: attacker behavior/method (technique or tactic used).
45
How do you handle data privacy during an investigation?
Minimize access, follow data retention/policy, anonymize where possible, and consult legal/privacy teams before exfiltrating PII.
46
Explain role of email security in SOC
Prevents phishing and malware—email gateways, URL detonation, SPF/DKIM/DMARC, and user reporting are key.
47
How do you keep current with adversary TTPs?
Follow TI feeds, vendor blogs, MITRE, community sources, attend conferences, and subscribe to reputable intelligence sources.
48
Give a concise example of an automation you built / would build.
A webhook that ingests IOC, auto-enriches with VT/AbuseIPDB, creates a ticket in Jira/ServiceNow, and notifies Slack if score > threshold.
49
What are common recovery steps after eradication?
Patch systems, rotate credentials, restore from clean backups, validate system integrity, monitor for reoccurrence, and run post-mortem.
50
Why do you want this role at Anaplan?
I want to apply my SOC/IR skills at a SaaS leader protecting high-value customers; I’m excited by their cloud scale and the chance to improve detection and automation while learning their stack.