Question 4 of 10Pro Only

Describe how you would use SIEM search queries to investigate a suspected brute-force attack. What fields would you search for, and what patterns would you look for?

Sample answer preview

Investigating a suspected brute-force attack through SIEM queries involves a systematic approach where I progressively narrow down the data to confirm or deny the attack and understand its scope.

SIEM queriesbrute-force detectionEvent ID 4625Event ID 4624credential stuffingaccount lockout

Unlock the full answer

Get the complete model answer, key points, common pitfalls, and access to 9+ more SOC Analyst interview questions.

Upgrade to Pro

Starting at $19/month • Cancel anytime