Its a 7 step framework developed by Lockheed Martin and part of the intelligence defence driven model for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in order to achieve their objective. 1-
There's quite an extended back and forth in actual interviews for questions like this, so nothing quite like real practice. The Prepfully Curve Cyber Security Engineer experts have actually worked in this role, so they're able to do an honest-to-God accurate mock, which really puts you through the paces. prepfully.com/practice-interviews
Previous jobs, what would you do in this situation. what security process do you follow, blogs, software etc, 2 panel interview, lasted about 1 hour - asked allot of informative questions very impressed with the whole setup
'ping' uses ICMP, specifically ICMP echo request and ICMP echo reply packets. There is no 'port' associated with ICMP. Ports are associated with the two IP transport layer protocols, TCP and UDP. ICMP packets are identified by the 'protocol' field in the IP datagram header.