Cyber Ops 1

Cyber Ops 1

University - Professional Development

20 Qs

quiz-placeholder

Similar activities

Cloud services

Cloud services

Professional Development

20 Qs

Sec+ Quiz - 1

Sec+ Quiz - 1

Professional Development

15 Qs

SEC+ Ch.9 Review Test

SEC+ Ch.9 Review Test

Professional Development

15 Qs

Final practice test mod 7

Final practice test mod 7

Professional Development

17 Qs

Examen Final USMP

Examen Final USMP

Professional Development

20 Qs

IAS_1-Quiz No.3 (final term)

IAS_1-Quiz No.3 (final term)

University

15 Qs

Módulo 2: Combatientes en la guerra contra el cibercrimen

Módulo 2: Combatientes en la guerra contra el cibercrimen

University

18 Qs

DWDM Unit1 Quiz

DWDM Unit1 Quiz

University

21 Qs

Cyber Ops 1

Cyber Ops 1

Assessment

Quiz

Computers

University - Professional Development

Hard

Created by

S. Lestariningati

Used 9+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?

A type of virus

A type of logic bomb

A type of Ransomware

A type of worm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is cyberwarfare?

It is an attack only on military targets

It is an attack on a major corporation

It is an attack that only invloves robots and bots

It is an attack designed to disrupt, corrupt, or exploit national interests

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can a security information and event management system in an SOC be used to help personnel fight against security threats?

By collecting and filtering data

By filtering network traffic

By authenticating users to network resources

By encrypting communications to remote sites

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three technologies should be included in an SOC security information and event management system? (Choose three.)

Proxy Service

User authentication

Threat Intelligence

Security Monitoring

Event collection, correlation and analysis

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to hackers who hack for a political or social cause?

White Hat

Hacker

Hacktivist

Blue Hat

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After a security incident is verified in a SOC, an incident responder reviewsthe incident but cannot identify the source of the incident and form an effective mitigation procedure. To whom should the incident ticket be escalated?

A cyberoperations analyst for help

An SME for further investigation

An alert analyst for further analysis

The SOC manager to ask for other personnel to be assigned

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term Alert Analyst refers to which group of personnel in an SOC?

Tier 1 Personnel

Tier 2 Personnel

Tier 3 Personnel

SOC Managers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?