SOC Monthly Quiz

SOC Monthly Quiz

Professional Development

10 Qs

quiz-placeholder

Similar activities

Basics in Active Directory for IT Helpdesk Quiz

Basics in Active Directory for IT Helpdesk Quiz

Professional Development

15 Qs

CCNP-Sec-SISAS-Post-Assessment

CCNP-Sec-SISAS-Post-Assessment

Professional Development

10 Qs

IT Professionals A+ Review

IT Professionals A+ Review

Professional Development

15 Qs

security+ (601)

security+ (601)

9th Grade - Professional Development

15 Qs

CyberCamp 4 Security and the Command Line Review (Standard)

CyberCamp 4 Security and the Command Line Review (Standard)

KG - Professional Development

8 Qs

Securing Source Code

Securing Source Code

Professional Development

10 Qs

CCNA Security Pre-Assessment

CCNA Security Pre-Assessment

Professional Development

15 Qs

CCNA Intro

CCNA Intro

Professional Development

15 Qs

SOC Monthly Quiz

SOC Monthly Quiz

Assessment

Quiz

Computers

Professional Development

Medium

Created by

yusuf ishkan

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A user reports receiving a suspicious email containing a link prompting them to enter their credentials. What is the FIRST step in investigating this phishing attempt?

Analyze the email headers for sender details and authentication records

Immediately block the user’s account

Click the link to check where it leads

Ask the user to reply to the email for verification

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A user reports that all their files have been encrypted with the .locked extension, and a ransom note is present. What is the IMMEDIATE action to take?

Pay the ransom to retrieve the files

Re-image the device

Ask the user to rename the encrypted files

Disconnect the infected machine from the network

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your IDS detects multiple SQL injection attempts on a public-facing web server. What is the BEST response?

Upgrade the server hardware

Upgrade rule on WAF

Review web server logs and check for signs of successful exploitation

Block IP to prevent SQL attacks

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does the command
netsh advfirewall set allprofiles state off
do?

It blocks all incoming and outgoing traffic by setting the firewall to its strictest mode.

It turns off the Windows Defender Firewall for all network profiles (Domain, Private, and Public).

It disables only the Domain profile of Windows Firewall, leaving Private and Public profiles active.

It resets the firewall rules to their default settings without disabling the firewall.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A brute-force attack has been detected against an exposed RDP server. What is the BEST mitigation strategy?

Disable failed login alerts in the SIEM to reduce noise from brute-force attempts.

Add the attacker’s IP to a global "safe list" to monitor their activity.

Block the attacker's IP, enforce account lockout policies, and enable multi-factor authentication (MFA).

Change the RDP port from 3389 to a random high-number port to evade attackers

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your DLP (Data Loss Prevention) alerts show large data uploads to a cloud storage service. What is the next step of action?

Review SIEM and proxy logs to confirm the source, destination, and nature of the data transfer.

Contact the employee FLM directly and ask them to explain their activity.

Disable all outbound internet access to prevent further uploads.

Immediately block the user’s account

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your SIEM system has flagged an alert indicating a high volume of failed login attempts followed by a successful login to an internal system using a corporate user's credentials. The account owner reports they did not attempt to log in, and the login was from an unrecognized IP address. What should be your FIRST course of action to mitigate the ATO attack?

Reset the password for all users in the organization to prevent widespread compromise.

Immediately lock the account, force a password reset, and review the account's recent activity.

Notify the account owner to change their password immediately and continue monitoring the account for further activity.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?