Question 6 of 10Pro Only

How would you conduct a threat hunt focused on network traffic to identify potential command and control communication? What patterns and anomalies would you look for?

Sample answer preview

Hunting for command and control communication in network traffic requires looking beyond individual connections and analyzing traffic patterns over time. C2 channels are designed to blend in with normal traffic, so detection depends on identifying subtle anomalies that automated…

C2 detectionbeaconing analysisDNS tunnelingJA3 fingerprintdomain generation algorithmNetFlow

Unlock the full answer

Get the complete model answer, key points, common pitfalls, and access to 9+ more SOC Analyst interview questions.

Upgrade to Pro

Starting at $19/month • Cancel anytime