Detection and Response: Quiz 2

Detection and Response: Quiz 2

Professional Development

13 Qs

quiz-placeholder

Similar activities

Intrusion Detection and Prevention Quiz

Intrusion Detection and Prevention Quiz

Professional Development

10 Qs

GDBD Parte 3

GDBD Parte 3

Professional Development

15 Qs

Cyberops Day7 KC1

Cyberops Day7 KC1

Professional Development

10 Qs

AWS SQS and SNS Quiz

AWS SQS and SNS Quiz

Professional Development

10 Qs

GIS Enablement Knowledge Check

GIS Enablement Knowledge Check

Professional Development

9 Qs

Fondamentaux - Sujets des présentations

Fondamentaux - Sujets des présentations

Professional Development

10 Qs

SOC ANALYST

SOC ANALYST

Professional Development

15 Qs

Implementing Cloud Security

Implementing Cloud Security

Professional Development

10 Qs

Detection and Response: Quiz 2

Detection and Response: Quiz 2

Assessment

Quiz

Computers

Professional Development

Hard

Created by

John Coder

FREE Resource

13 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

doc__________________ is any from of recorded content that is used for a specific purpose and can be audio, digital, or handwritten instructions and even videos.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

??? is an application that monitors system and network activity and produces alerts on possible intrusions

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Here are examples of ???? tools.

  1. AlienVault, Chronicle, Elastic, Exabeam, IBM QRadar, LogRhythm, Splunk

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

SIEM tools require data for them to be effectively used. During the first step, the SIEM collects event data from various sources like firewalls, servers, routers. This data is known as logs and contains event details like timestamps, IP addresses. Logs are a record of events that occur within a organization's systems. After all this log data is collected, it gets aggr____________ in one location.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

par_____________ maps data according to their fields and corresponding values.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

SIEM process

1. collect and agg__________________ data

  1. 2. nor____________ data

    1. 3. ana_____________

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

an IPS or ? ? ? is an application that monitors system activity for intrusive activity and takes action to stop activity. It is similar to IDS but IPS takes action to prevent the activity and minimize its effects. An IPS can send an alert and modify an access control list on a router to block specific traffic on a server.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?