Question 5 of 10Pro Only

As encryption becomes ubiquitous, how do you hunt for threats when you cannot inspect the content of network traffic? What metadata and behavioral indicators remain useful?

Sample answer preview

The widespread adoption of TLS encryption is excellent for privacy and security but creates significant challenges for threat hunters who can no longer inspect traffic content for malicious payloads, command strings, or exfiltrated data.

JA3 fingerprintingcertificate analysisencrypted trafficflow analysisbeaconing detectionDNS analysis

Unlock the full answer

Get the complete model answer, key points, common pitfalls, and access to 9+ more SOC Analyst interview questions.

Upgrade to Pro

Starting at $19/month • Cancel anytime