Chapter 1 - Defining Security Operations Flashcards

1
Q

The type of SOC which proactively hunts for malicious threats on the network.

A

Threat-Centric SOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The type of SOC that is focused on comparing the network system to reference templates and standard system builds.

A

Compliance-Based SOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The type of SOC that is focused on monitoring the current status of the organizations security posture.

A

Operational-Based SOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name the three types of SOC’s

A

Operational-Based, Compliance-Based, and Threat-Centric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the science of examining and deciphering raw data or data sets with the purpose of drawing conclusions.

A

Data Analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of log mining is reconstructing or following the network traffic flow?

A

Sequencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of log mining is an interpretation of a chain of consecutive events that occur during a set period of time?

A

Path Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of log mining is used to go through large amounts of log data to build profiles and to identify anomalous behaviour?

A

Log Clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a branch of digital forensics that relates to the monitoring and analysis of network traffic, with the purpose of evidence gathering or intrusion detection?

A

Network Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who’s role is it to prioritize work and organize resources with the goal of detecting, investigating, and mitigating incidents that could impact the business?

A

SOC Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly