What is a difference between SIEM and SOAR?
Cyberops quiz

Quiz
•
Computers
•
Professional Development
•
Medium
Dove Soap
Used 9+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
SOAR predicts and prevents security alerts, while SIEM checks attack patterns and applies the mitigation.
SIEM predicts and prevents security alerts, while SOAR checks attack patterns and applies the mitigation.
SOAR's primary function is to collect and detect anomalies, while SIEM is more focused on security operations automation and response.
SIEM's primary function is to collect and detect anomalies, while SOAR is more focused on security operations automation and response.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is a difference between data obtained from Tap and SPAN ports?
SPAN improves the detection of media errors, while Tap provides direct access to traffic with lowered data visibility.
SPAN passively splits traffic between a network device and the network without altering it, while Tap alters response times.
Tap mirrors existing traffic from specified ports, while SPAN presents more structured data for deeper analysis.
Tap sends traffic from physical layers to the monitoring device, while SPAN provides a copy of network traffic from switch to destination.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An engineer received an alert affecting the degraded performance of a critical server. Analysis showed a heavy CPU and memory load. What is the next step the engineer should take to investigatethis resource usage?
Run ps -m to capture the existing state of daemons and map required processes to find the gap
Run ps -d to decrease the priority state of high load processes to avoid resource exhaustion
Run ps -u to find out who executed additional processes that caused a high load on a server
Run ps -ef to understand which processes are taking a high amount of resources
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is an incident response plan?
an organizational approach to events that could lead to asset loss or disruption of operations
an organizational approach to system backup and data archiving aligned to regulations
an organizational approach to disaster recovery and timely restoration of operational services
an organizational approach to security management to ensure a service lifecycle and continuous improvements
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two symmetric encryption algorithms? (Choose two.)
3DES
HMAC
MD5
AES
SHA
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which antimalware software approach can recognize various characteristics of known malware files to detect a threat?
heuristics-based
behaviour-based
signature-based
routing-based
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack?
DHCP
DNS
ICMP
HTTP/HTTPS
Create a free account and access millions of resources
Similar Resources on Quizizz
12 questions
CySA+ Tools

Quiz
•
Professional Development
15 questions
Sec+ Quiz - 3

Quiz
•
Professional Development
13 questions
Cybersecurity: Core Skills

Quiz
•
Professional Development
15 questions
ISC2 - Chapter 4 - Module 2

Quiz
•
Professional Development
10 questions
CNS QUIZ

Quiz
•
Professional Development
7 questions
Fortinet Overview - Cybersecurity Flow

Quiz
•
Professional Development
10 questions
Introduction to AI and Cyber security

Quiz
•
University - Professi...
10 questions
Sorular 11-20

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade