Security Analytics with Apache Metron Interview Question-Answer

Q.1 Who is responsible for finding patterns in the security data ingested into Metron?

       A. Forensic Investigator

       B. SOC Investigator

       C. Security Data Scientist

       D. SOC Analyst

Ans : Security Data Scientist


Q.2 Apache Metron is built on top of _________.

       A. Cisco Open Source Technologies

       B. Apache Open Source Technologies

       C. Multiple Cisco and Apache Technologies

       D. Cisco Licensed Technologies

Ans : Cisco Open Source Technologies


Q.3 Apache Metron in Deployment is __________

       A. replicated

       B. distributed

       C. can be either centralised or distributed

       D. centralised

Ans : can be either centralised or distributed


Q.4 Which of the following is an Example of Threat Intel feeds in Metron?

       A. DPI

       B. Bro

       C. Nifi

       D. Soltra

Ans : Soltra


Q.5 Consider you are a store owner operating your own website for the people of your Town. What can be ideal for maintaining security of the shopping platform on your site?

       A. Traditional SIEM

       B. Security is not needed

       C. Metron

       D. Either Metron or Traditional SIEM

Ans : Traditional SIEM


Q.6 Telemetry Data Ingestion is possible into Metron through ___________.

       A. Apache Impala

       B. Apache Kudu

       C. Apache Storm

       D. Apache Nifi

Ans : Apache Nifi


Q.7 Timestamp in Metron is parsed in ________.

       A. Both POSIX and UTC

       B. UTC format

       C. POSIX format

       D. None of the given options

Ans : POSIX format


Q.8 Machine Learning models can be adopted in Metron for ________.

       A. Advanced Analytics

       B. Threat Prediction

       C. Anomaly Detection

       D. all the given options

Ans : all the given options


Q.9 Metron Provides support for multiple types of data through its __________.

       A. Intelligence Platform

       B. Data Vault

       C. Pluggable framework

       D. all the given options

Ans : Pluggable framework


Q.10 Which of the following is NOT a component of parsing topology?

       A. Storm kafka spout

       B. kafka parser bolt

       C. Storm parser spout

       D. none of the options

       E. all the given options

Ans : Storm parser spout


Q.11 Parallel Enrichment is available on Metron by default

       A. True

       B. False

Ans : False


Q.12 What is the order of stages in Stream Processing Pipeline. a) Theat Intel b.) Telemetry Parsing c.) Index and Write d.) Alert Triage e.) Enrichment

       A. a, b, c, d, e

       B. b, e, a, d, c

       C. b, e d, a, c

       D. b, a d, e, c

       E. none of the given options

Ans : b, e, a, d, c


Q.13 In Telemetry Parsing Stage ________.

       A. data normalization takes place

       B. data validation takes place

       C. data enrichment takes place

       D. data transformation takes place

Ans : data normalization takes place


Q.14 Stellar Expressions can be used in telemetry parsing as part of ______.

       A. data normalization

       B. cannot be used in telemetry parsing

       C. data validation

       D. data transformation

       E. all the given options

Ans : cannot be used in telemetry parsing


Q.15 Threat Intel Feeds can be __________.

       A. streamed in real-time

       B. normalised and de-duped

       C. Bulk-loaded

       D. all the given options

Ans : all the given options


Q.16 Client for MaaS is written in ___________.

       A. Scala

       B. Node.js

       C. Python

       D. Java

Ans : Java


Q.17 Profiler can be configured for entities like

       A. application

       B. user

       C. subnet

       D. server

       E. all the given options

Ans : all the given options


Q.18 Solr and ElasticSearch Indices are supported __________.

       A. as they are cold storage indices

       B. as they are kibana supported

       C. as they are random access indices

       D. all the given options

Ans : as they are kibana supported


Q.19 Which of the following statements regarding MetaalertDao is/are TRUE

       A. pagination of metaalerts is not possible

       B. alerts are linked to metaalerts by id

       C. It denormalizes the relation between alerts and metaalerts

       D. none of the given options

Ans : It denormalizes the relation between alerts and metaalerts


Q.20 HDFS Index updates are supported in Metron.

       A. No, Only Random Access Index updates are supported

       B. Yes, Using a NoSQL write ahead log

       C. Yes, Natively Supported

       D. none of the given options

Ans : No, Only Random Access Index updates are supported


Q.21 Enrichment configuration can be stored on _________.

       A. storm

       B. Hbase

       C. zookeeper

       D. HDFS

Ans : zookeeper


Q.22 Validation of data entering Metron can be validated ___________.

       A. fully at the time of ingestion

       B. partially at the time of ingestion

       C. partially at time of enrichment

       D. all the given options

Ans : partially at time of enrichment


Q.23 Threat Intel Store is based on.

       A. Key – Value Pair

       B. Graph DB

       C. Columnar Table

       D. Document DB

Ans : Key – Value Pair


Q.24 Select the Correct order of nested data in a JSON file which is processed in the pipeline.

       A. threatIntel -> triageConfig -> enrichment

       B. enrichment -> triageConfig -> threatIntel

       C. enrichment -> threatIntel ->triageConfig

       D. None of the options

Ans : enrichment -> threatIntel ->triageConfig


Q.25 UDFs are supported by Stellar.

       A. True

       B. False

Ans : True


Q.26 Which of the following statements regarding MetaalertDao is/are TRUE.

       A. It is limited by parent-child relationships between alerts and metaalerts

       B. It denormalizes the relation between alerts and metaalerts

       C. alerts are linked to metaalerts by id

       D. none of the given options

Ans : It is limited by parent-child relationships between alerts and metaalerts


Q.27 Apache Metron do NOT have a dependency on _______.

       A. docker

       B. python

       C. ansible

       D. vagrant

Ans : ansible


Q.28 Identify the Stellar Function which is NOT VALID.

       A. IS_DOMIAN

       B. IS_IP

       C. IS_SUBNET

       D. IS_EMAIL

Ans : IS_SUBNET


Q.29 When Machine Learning models are employed for threat intelligence what is considered to be an infrastructure challenge?

       A. Type of adopted model

       B. Model Implementation Language dependency

       C. Implemented Model accuracy

       D. all the given options

Ans : Type of adopted model


Q.30 Consider you are trying to parse telemetry of a application which uses a custom API. Its telemetry is highly complex and the data is generated at a rapid rate. What is an ideal parsing strategy for the scenario?

       A. Write a Custom JVM parser while using Grok as stop gap

       B. Write and use a Custom JVM parser

       C. Modify a Grok Parser while using JVM parser as stop gap

       D. Use in-built Grok Parser

Ans : Use in-built Grok Parser


Q.31 MaaS scaling can be done through ______.

       A. YARN

       B. Service Discovery

       C. REST

       D. Storm

Ans : REST


Q.32 Data to create a profiler is collected.

       A. Over sliding windows

       B. Over multiple windows

       C. from different data sources

       D. In time series way

Ans : Over multiple windows


Q.33 Zeppelin Interpreter do NOT support.

       A. Python

       B. JDBC

       C. Node.js

       D. Cassandra

Ans : Node.js


Q.34 Stellar is Integrated into Metron Components such as _________.

       A. Enrichment and Indexing

       B. Indexing and Threat Triage

       C. Enrichment and Threat Triage

       D. Global Validation and Threat Triage

       E. Global Validation and Enrichment

Ans : Global Validation and Threat Triage


Q.35 Default Indexer of Metron is ____________.

       A. HDFS

       B. Hbase

       C. Elastic Search

       D. Solr

Ans : HDFS


Q.36 How does Network Intrusion Detection System works?

       A. Uses fixed rules to identify abnormal events

       B. Tracks communication between actors of target network

       C. Extracts application level request details

       D. all the given options

Ans : Uses fixed rules to identify abnormal events


Q.37 DPI(Deep Packet Inspection) Data is best to be extracted only for ____________.

       A. DNS Protocol

       B. REST Protocol

       C. PCAP

       D. Netflow protocol

Ans : Netflow protocol


Q.38 Pick out the Stellar Keyword among the following.

       A. NaN

       B. except

       C. case

       D. all the given options

Ans : NaN


Q.39 Metron apart from in-built Geo Enrichment supports.

       A. Asset and User Enrichment

       B. none of the given options

       C. Asset and Network Enrichment

       D. User and Network Enrichment

Ans : Asset and Network Enrichment


Q.40 Who among the following is considered to be an advanced SME w.r.t Apache Metron Platform _____________.

       A. SOC Investigator

       B. Security Platform Ops Engineer

       C. SOC Analyst

       D. Forensic Investigator

Ans : Security Platform Ops Engineer


Leave a Comment