cyberops

cyberops

University

9 Qs

quiz-placeholder

Similar activities

AZ-900 Modulo 2

AZ-900 Modulo 2

KG - Professional Development

14 Qs

Section 2: Imperative Commands with Kubectl

Section 2: Imperative Commands with Kubectl

University

11 Qs

The Outsiders Character list

The Outsiders Character list

KG - Professional Development

14 Qs

JARINGAN KOMPUTER

JARINGAN KOMPUTER

University

10 Qs

Physical Security

Physical Security

1st Grade - University

10 Qs

CS0005 - Data Warehouse (Types of Data Warehouse)

CS0005 - Data Warehouse (Types of Data Warehouse)

University

13 Qs

Quiz Organisation analyse d'un SoC

Quiz Organisation analyse d'un SoC

University

10 Qs

EDUCM102- Session 2- LRE and IEP

EDUCM102- Session 2- LRE and IEP

University

14 Qs

cyberops

cyberops

Assessment

Quiz

Special Education, Computers, Life Skills

University

Medium

Created by

S. Lestariningati

Used 8+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which personnel in a SOC is assigned the task of verifying whether an alert triggered by monitoring software represents a true security incident?

Tier 1 Personnel

Tier 2 Personnel

Tier 3 Personnel

SOC Manager

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After a security incident is verified in a SOC, an incident responder reviews the incident but cannot identify the source of the incident and form an effective mitigation procedure. To whom should the incident ticket be escalated?

the SOC manager to ask other personnel to be assigned

an alert analyst for further analysis

a cyberoperations analyst for help

a SME for further investigation

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two services are provided by security operations centers? (Choose two.)

responding to data center physical break-ins

monitoring network security threats

managing comprehensive threat solutions

ensuring secure routing packet exchanges

providing secure internet connections

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which organization is an international nonprofit organization that offers the CISSP certification?

CompTIA

(ISC)2

IEEE

GIAC

Answer explanation

(ISC)2 is an international nonprofit organization that offers the CISSP certification.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a benefit to an organization of using SOAR as part of the SIEM system?

SOAR was designed to address critical security events and high-end investigation.

SOAR would benefit smaller organizations because it requires no cybersecurity analyst involvement once installed.

SOAR automates incident investigation and responds to workflows based on playbooks

SOAR automation guarantees an uptime factor of “5 nines”.

Answer explanation

Explanation: SIEM systems are used for collecting and filtering data, detecting and classifying threats, and analyzing and investigating threats. SOAR technology does the same as SIEMs but it also includes automation. SOAR integrates threat intelligence and automates incident investigation. SOAR also responds to events using response workflows based on previously developed playbooks.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which personnel in a SOC are assigned the task of hunting for potential threats and implementing threat detection tools?

Tier 3 SME

Tier 2 Incident Reporter

Tier 1 Analyst

SOC Manager

Answer explanation

In a SOC, Tier 3 SMEs have expert-level skills in network, endpoint, threat intelligence, and malware reverse engineering (RE). They are deeply involved in hunting for potential security threats and implementing threat detection tools.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An SOC is searching for a professional to fill a job opening. The employee must have expert-level skills in networking, endpoint, threat intelligence, and malware reverse engineering in order to search for cyber threats hidden within the network. Which job within an SOC requires a professional with those skills?

Incident Responder

Alert Analyst

SOC Manager

Threat Hunter

Answer explanation

Tier 3 professionals called Threat Hunters must have expert-level skills in networking, endpoint, threat intelligence, and malware reverse engineering. They are experts at tracing the processes of malware to determine the impact of the malware and how it can be removed.

8.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three are major categories of elements in a security operations center? (Choose three.)

technologies

people

processes

data center

database engine

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which KPI metric does SOAR use to measure the time required to stop the spread of malware in the network?

MITR

Time to Control

Time to Control

MITC

MTTD

Answer explanation

The common key performance indicator (KPI) metrics compiled by SOC managers are as follows:• Dwell Time: the length of time that threat actors have access to a network before they are detected and the access of the threat actors stopped