Module 2 - Fighters In The War Against Cybercrime Flashcards

1
Q

Which personnel in a SOC is assigned the task of verifying whether an alert triggered by monitoring software represents a true security incident?

Tier 3 personnel
SOC Manager
Tier 2 personnel
Tier 1 personnel

A

Tier 1 personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

After a security incident is verified in a SOC, an incident responder reviews the incident but cannot identify the source of the incident and form an effective mitigation procedure. To whom should the incident ticket be escalated?

an alert analyst for further analysis
the SOC manager to ask for other personnel to be assigned
a cyberoperations analyst for help
a SME for further investigation

A

a SME for further investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two services are provided by security operations centers? (Choose two.)

providing secure Internet connections
responding to data center physical break-ins
monitoring network security threats
managing comprehensive threat solutions
ensuring secure routing packet exchanges

A

monitoring network security threats
managing comprehensive threat solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Mean Time to Detect (MTTD)

A

MTTD is the average time that it takes for the SOC personnel to identify valid security incidents have occurred in the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which metric is used to measure the length of time that threat actors have access to a network before they are detected and the access of the threat actors stopped?

MTTC
MTTR
Dwell Time
MTTD

A

Dwell Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the role of SIEM?

  • to analyze all the network packets for any malware signatures and synchronize the signatures with the Federal Government databases
  • to analyze all the data that firewalls, network appliances, intrusion detection systems, and other devices generate and institute preventive measures
  • to analyze all the network packets for any malware signatures and update the vulnerabilities database
  • to analyze any OS vulnerabilities and apply security patches to secure the operating systems
A

to analyze all the data that firewalls, network appliances, intrusion detection systems, and other devices generate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a characteristic of the SOAR security platform?

to provide a user friendly interface that uses the Python programming language to manage security threats
to provide a means to synchronize the vulnerabilities database
to interact with the Federal Government security sites and update all vulnerability platforms
to include predefined playbooks that enable automatic response to specific threats

A

to include predefined playbooks that enable automatic response to specific threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network security professional has applied for a Tier 2 position in a SOC. What is a typical job function that would be assigned to a new employee?

further investigating security incidents
monitoring incoming alerts and verifying that a true security incident has occurred
serving as the point of contact for a customer
hunting for potential security threats and implementing threat detection tools

A

further investigating security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If a SOC has a goal of 99.99% uptime, how many minutes of downtime a year would be considered within its goal?

60.56
50.38
48.25
52.56

A

52.56

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which organization offers the vendor-neutral CySA+ certification?

(ISC)²
IEEE
CompTIA
GIAC

A

CompTIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the operation of a SOC, which system is frequently used to let an analyst select alerts from a pool to investigate?

syslog server
security alert knowledge-based system
registration system
ticketing system

A

ticketing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can a security information and event management system in a SOC be used to help personnel fight against security threats?

by collecting and filtering data
by authenticating users to network resources
by filtering network traffic
by encrypting communications to remote sites

A

by collecting and filtering data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which three technologies should be included in a security information and event management system in a SOC? (Choose three.)

vulnerability tracking
security monitoring
VPN connection
firewall appliance
intrusion prevention
threat intelligence

A

threat intelligence
security monitoring
vulnerability tracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly