Siber Güvenlik Uzmanı - Senaryo Soruları

Siber Güvenlik Uzmanı 10 soru 06.04.2026
Bu sorular ve cevaplar genel bilgilendirme ve mülakat hazırlık amaçlıdır. Gerçek mülakat sorularını yansıtmaz.
1

Senaryo: Ransomware saldırısı tespit edildi, production sistemler şifrelendi. Incident response?

Immediate: 1) Isolate affected systems (network segmentation), 2) Incident declaration (war room), 3) Communication (stakeholders, legal, PR). Containment: Shutdown sharing, disable accounts. Eradication: Malware removal, vulnerability patching. Recovery: Clean backups restoration (verify integrity), business continuity testing. Post-incident: Ransom payment decision (last resort), lessons learned.
2

Senaryo: Hacker email üzerinden credential phishing yapıyor, kullanıcıların %10'u tıkladı. Response?

Immediate: 1) Phishing campaign shutdown (block sender, URLs), 2) Password reset (compromised accounts), 3) MFA enforcement (if not enabled). Investigation: Email headers, attachment analysis, indicators of compromise. Remediation: User training, phishing simulation improvements, email filtering enhancement. Metrics: Reporting rate, click rate.
3

Senaryo: Security audit found 500+ vulnerabilities, engineering team overwhelmed. Prioritization?

Prioritization framework: 1) CVSS score (Critical/High first), 2) Exploitability (public exploits), 3) Asset criticality (production systems), 4) Business impact. Quick wins: Low-hanging fruit. Long-term: Root cause analysis, secure SDLC. Communication: Risk-based remediation plan, executive sponsorship.
4

Senaryo: Insider threat: İyiden pahalıya customer data export edildi. Investigation?

Investigation: 1) User activity logs (login, access, downloads), 2) DLP alerts, 3) Network traffic analysis. Interviews: Manager, HR, legal. Response: Account suspension, data collection, forensic analysis. Legal: Employee termination, legal action. Prevention: DLP enhancement, behavior analytics, least privilege enforcement.
5

Senaryo: Third-party vendor security breach, your data exposed. Actions?

Response: 1) Vendor communication (breach details), 2) Internal assessment (what data exposed?), 3) Legal/PR (regulatory notification). Investigation: Vendor's security practices, contract compliance. Remediation: Vendor relationship review, additional security requirements, data isolation. Prevention: Vendor risk management enhancement.
6

Senaryo: Zero-day vulnerability detected in production software. Mitigation?

Immediate: 1) Vulnerability assessment (exploitability, impact), 2) Vulnerable system isolation, 3) Compensating controls (WAF rules, network segmentation). Coordination: Vendor communication, security community. Patch: Emergency patching plan, testing deployment. Monitoring: Exploit detection, anomaly monitoring.
7

Senaryo: C-level executive email account hacked, BEC (Business Email Compromise). Response?

Immediate: 1) Account lockdown (password reset, MFA reset), 2) Investigation (email rules, forwarding, sent items), 3) Communication (affected parties, financial team). Investigation: logs analysis, attacker actions, data exposure. Prevention: Executive protection program, advanced email filtering, transaction verification.
8

Senaryo: DDoS attack, website down. Mitigation strategies?

Immediate: 1) DDoS detection (traffic spike analysis), 2) Service activation (Cloudflare, AWS Shield), 3) Traffic filtering (rate limiting, geo-blocking). Long-term: DDoS protection service, CDN, traffic analysis. Post-incident: Attack analysis, source identification, prevention improvements.
9

Senaryo: Security team budget cut %30. Priority adjustment?

Prioritization: 1) Critical systems protection, 2) Compliance requirements, 3) High-risk vulnerabilities. Cost optimization: Automation (reduce manual effort), open-source tools, managed services. Communication: Risk exposure to leadership, business impact. Strategy: Risk-based approach, quick wins.
10

Senaryo: New regulation requires data localization. Migration plan?

Assessment: 1) Data inventory (location, type), 2) Regulatory requirements (which data?), 3) Impact analysis (systems, processes). Migration: Data classification, localization architecture, compliance controls. Implementation: Phased migration, validation, testing. Ongoing: Monitoring, audit preparation.