These are questions from my interview: 1. Scenario: An employee falls victim to a phishing attack, leading to the compromise of their system and the subsequent distribution of malicious emails to other employees. Question: What immediate actions would you take to contain the damage, protect the organization, and prevent further escalation? Explain the details of your investigation approach. 2. Describe the various security layers or controls that organizations typically implement to safeguard their systems and data. Humble request to cover it in your series.