Cyberops quiz

Quiz
•
Computers
•
Professional Development
•
Hard
Dove Soap
Used 11+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
What is a difference between SIEM and SOAR?
SOAR predicts and prevents security alerts, while SIEM checks attack patterns and applies the mitigation.
SIEM predicts and prevents security alerts, while SOAR checks attack patterns and applies the mitigation.
SOAR's primary function is to collect and detect anomalies, while SIEM is more focused on security operations automation and response.
SIEM's primary function is to collect and detect anomalies, while SOAR is more focused on security operations automation and response.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is a difference between data obtained from Tap and SPAN ports?
SPAN improves the detection of media errors, while Tap provides direct access to traffic with lowered data visibility.
SPAN passively splits traffic between a network device and the network without altering it, while Tap alters response times.
Tap mirrors existing traffic from specified ports, while SPAN presents more structured data for deeper analysis.
Tap sends traffic from physical layers to the monitoring device, while SPAN provides a copy of network traffic from switch to destination.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An engineer received an alert affecting the degraded performance of a critical server. Analysis showed a heavy CPU and memory load. What is the next step the engineer should take to investigatethis resource usage?
Run ps -m to capture the existing state of daemons and map required processes to find the gap
Run ps -d to decrease the priority state of high load processes to avoid resource exhaustion
Run ps -u to find out who executed additional processes that caused a high load on a server
Run ps -ef to understand which processes are taking a high amount of resources
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is an incident response plan?
an organizational approach to events that could lead to asset loss or disruption of operations
an organizational approach to system backup and data archiving aligned to regulations
an organizational approach to disaster recovery and timely restoration of operational services
an organizational approach to security management to ensure a service lifecycle and continuous improvements
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two symmetric encryption algorithms? (Choose two.)
3DES
HMAC
MD5
AES
SHA
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which antimalware software approach can recognize various characteristics of known malware files to detect a threat?
heuristics-based
behaviour-based
signature-based
routing-based
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack?
DHCP
DNS
ICMP
HTTP/HTTPS
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
#01 Security Principle

Quiz
•
Professional Development
15 questions
Encryption

Quiz
•
Professional Development
15 questions
It jobs

Quiz
•
Professional Development
15 questions
CAMBRIDGE - A Level - IT - Network Security

Quiz
•
12th Grade - Professi...
14 questions
isc2 sample questions

Quiz
•
Professional Development
10 questions
Gordon's Review: Mod 1 Intro to Cybersecurity

Quiz
•
Professional Development
10 questions
Quiz on Module 1

Quiz
•
Professional Development
15 questions
Activity2

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade