SOC Promotional Prep

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/48

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:54 AM on 5/22/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

49 Terms

1
New cards

Walk me through how you triage a high-severity alert.

Validate alert → identify asset/user → review supporting logs → build timeline → determine scope/impact → escalate or close with justification.

2
New cards

Brute force followed by successful login—what first?

Check auth logs for IP, geolocation, MFA status, login type, failure pattern, and post-login activity.

3
New cards

What do you need before escalating to Tier 2/IR?

Evidence, timeline, scope, impacted assets/users, and initial impact assessment.

4
New cards

How do you prioritize multiple alerts?

Severity + asset criticality + attack stage + blast radius + time sensitivity.

5
New cards

Key log sources for endpoint investigations?

Process creation logs, EDR telemetry, Sysmon, PowerShell logs.

6
New cards

Key log sources for network/auth investigations?

AD logs, VPN logs, DNS logs, proxy logs, firewall logs.

7
New cards

How do you investigate suspicious PowerShell?

Check command line, encoding, parent process, script logs, network connections, and user context.

8
New cards

Indicators of DNS tunneling?

High query volume, long encoded subdomains, TXT records, NXDOMAIN spikes, beaconing patterns.

9
New cards

Signs of account compromise in auth logs?

Impossible travel, MFA anomalies, brute force patterns, unusual device/user-agent, new login locations.

10
New cards

How do you validate phishing email?

Check headers, sender spoofing, link analysis, attachments, sandboxing, and org-wide prevalence.

11
New cards

How do you use SIEM in investigations?

Correlate logs across systems to build timeline using user, IP, host, and process pivots.

12
New cards

Common SIEM queries

User activity, IP correlation, failed/successful logins, process execution, time-based chains.

13
New cards

How do you pivot from an alert?

Start from entity → expand to process tree → auth logs → network connections → related events.

14
New cards

When do you isolate a host?

Confirmed malware, active C2, credential dumping, lateral movement, or high-confidence compromise.

15
New cards

Containment vs monitor-only?

Containment = high confidence/impact risk; monitor-only = low confidence or isolated signal.

16
New cards

How do you handle uncertainty?

Document findings, state confidence level, escalate with evidence rather than assumptions.

17
New cards

Common ATT&CK techniques in SOC?

Phishing, brute force, PowerShell execution, persistence methods, lateral movement, C2 traffic.

18
New cards

How does lateral movement appear in logs?

Multiple system logins, SMB/RDP spikes, remote service creation, NTLM activity.

19
New cards

Credential dumping vs password spraying?

Dumping = extract credentials from system; spraying = try common passwords across many accounts.

20
New cards

Common persistence techniques?

Scheduled tasks, registry run keys, new users, services, WMI subscriptions.

21
New cards

Describe a complex incident you handled.

situation → task → actions → result with focus on investigation steps.

22
New cards

Tell me about a mistake you made.

Explain mistake → impact → what you learned → how process improved.

23
New cards

How do you handle feedback?

Apply it immediately and validate improvement in future investigations.

24
New cards

Alerts are noisy but you can’t tune them—what do you do?

Improve triage, document false positives, escalate for tuning, refine investigation filters.

25
New cards

No clear IOC—what now?

Expand scope, pivot on related entities, build timeline, analyze behavior.

26
New cards

Speed vs accuracy?

Accuracy for high severity; efficiency through structured workflow.

27
New cards

You receive a high severity alert for suspicious PowerShell execution on a user workstation.

First, I’d validate the alert details—what PowerShell command triggered it, whether it was encoded, and what the parent process was. Then I’d identify the user and host and determine whether PowerShell use is expected based on their role or normal activity. I’d pivot into related logs—other endpoint events, authentication logs, and network connections—to see if there’s additional suspicious behavior or broader impact. If it appears legitimate but unclear, I’d validate with the user; if malicious indicators are present, I’d escalate and begin containment recommendations

28
New cards

You receive an alert for multiple failed VPN logins, followed by a successful login from the same account.

How do you investigate whether this is account compromise or just a user mistyping their password?

First, I’d review the VPN logs to identify the source IP, geolocation, device, and timing of the failed attempts followed by the successful login. I’d determine whether the pattern looks like normal mistyping or a brute force attempt—for example, a few failures versus many rapid attempts. Then I’d check MFA logs and review post-login activity for unusual behavior like access to new systems or privilege changes. Finally, I’d compare it to the user’s normal login patterns and, if needed, contact the user to confirm legitimacy.

29
New cards

You have three alerts at once:

  1. Malware detected on a workstation

  2. Multiple failed logins on a shared service account

  3. A phishing email reported by a user

How do you prioritize these, and why?

First, I’d prioritize the malware detection because it may represent an active compromise and could require immediate containment, such as host isolation. Second, I’d investigate the failed logins to determine whether there was a successful authentication or signs of account compromise, since credential abuse could lead to broader access. Third, I’d review the phishing report—while important, it’s lower priority unless there’s evidence the user clicked or executed something, in which case it may move higher. My prioritization is based on active threat, potential blast radius, and urgency.

30
New cards

You investigate an alert and there’s no obvious IOC—no bad hash, no known bad IP, no signature hit.

How do you investigate when there’s no clear indicator of compromise?

First, I’d review the alert logic to understand exactly what behavior triggered it. Since there’s no obvious IOC, I’d shift to behavioral analysis—pivoting on the user, host, process, and timeframe to build a timeline. I’d look for anomalies like unusual parent-child processes, abnormal authentication activity, unexpected network connections, or persistence mechanisms. The goal is to determine whether the behavior is malicious, suspicious, or expected based on context—not just whether it matches a known bad indicator.

31
New cards

A senior analyst disagrees with your alert severity. You think it’s high, they think it’s medium.

How do you handle that?

First, I’d explain my reasoning using the evidence I found—why I believe the alert is high severity, such as impact, scope, or attack stage. I’d listen to the senior analyst’s perspective and align on the facts rather than treating it like a disagreement of opinion. If immediate action is needed, I’d follow the agreed path, but afterward I’d revisit it constructively to understand the decision and improve future consistency.

32
New cards

A detection fires repeatedly and you suspect it’s a false positive, but you’re not allowed to tune rules yourself.

What do you do?

I’d document repeated examples showing why it appears to be a false positive—what triggers it, what makes it benign, and how often it occurs. I’d quantify the impact, like alert volume or analyst time spent, and then recommend a specific tuning change to the engineering or detection team. Until it’s tuned, I’d update my triage process so the team can handle it consistently without missing a true positive.

33
New cards

A user reports a phishing email and says they clicked the link.

What are your next steps?

First, I’d determine what happened after the click—whether it was just a page visit, a credential harvest, or a malware download. If credentials may have been entered, I’d immediately reset the password, revoke active sessions, and review MFA activity. I’d then check endpoint and network logs for any malicious downloads or connections, and review email logs to identify whether other users received the same message. Finally, I’d scope impact and escalate if there’s evidence of compromise.

34
New cards

A host shows PowerShell launching from Word.

What’s your first thought, and what do you investigate next?

My first thought is possible malicious macro execution or document-based malware because Word should not normally spawn PowerShell. I’d inspect the PowerShell command line for encoding, download commands, or execution policy bypass flags, then confirm the parent-child relationship in the process tree. Next I’d check for network connections, dropped files, persistence mechanisms, and whether the user recently opened an email attachment or downloaded a document.

35
New cards

You see repeated DNS requests to long random subdomains every 30 seconds.

What does that suggest, and how would you investigate it?

The regular interval suggests beaconing, and the long random subdomains raise concern for DNS tunneling or command-and-control traffic. I’d check the domain reputation, age, and threat intelligence first, then inspect the subdomains for signs of encoding or exfiltration. Next, I’d identify which host and process is generating the DNS requests, review query types like TXT records, and determine whether this is malware communication or potential data exfiltration.

36
New cards

Tell me about a time you missed something during an investigation. What did you learn from it?

During a phishing investigation, I initially focused too heavily on technical email authentication indicators like SPF, DKIM, and DMARC and missed that the sender was using a lookalike domain with a subtle character change—an added ‘s’ and a swapped ‘i’. That taught me not to anchor on one part of the analysis too early. Now I deliberately slow down and review the full picture—sender details, domain spelling, headers, links, and message context—before making a determination.

37
New cards

FTP (Data Transfer)

20

38
New cards

SSH (Secure Shell)

22

39
New cards

Telnet (Remote Login)

23

40
New cards

SMTP (Simple Mail Transfer Protocol)

25

41
New cards

DNS (Domain Resolution)

53

42
New cards

HTTP (Web Browsing)

80

43
New cards

HTTPS (Secure Web Browsing)

443

44
New cards

FTP (Control)

21

45
New cards

DHCP (Server to Client)

67

46
New cards

DHCP (Client to Server)

68

47
New cards

TFTP (Trivial File Transfer)

69

48
New cards

SMB (File Sharing)

445

49
New cards

RDP (Remote Desktop)

3389