Kahoots 5 - SIEM Flashcards
Which of the following are attack vectors? [Multi-select]
a. ) Data
b. ) Log systems
c. ) Software
d. ) Rootkits
a.) & c.)
What of the following are the two primary components of SIEM?
a. ) Security Enterprise Management
b. ) Security Event Management
c. ) Security Information Management
d. ) Security Interface Management
b.) & c.)
Which of the following are components of a SIEM (Select 3)
a. ) Correlation Engine
b. ) Vulnerability Scanner
c. ) Collectors
d. ) API
a, c, & d
A SOC uses control systems, quality management and tracking tools T or F
False
Which of the following are popular SIEM vendors?
a. ) Splunk
b. ) Oracle
c. ) AWS
d. ) Arcsight
a & d
Splunk only runs on Linux T or F
False
Database, WAF & Firewalls all provide application logs for SIEMs T or F
True
Which of the following are valid Windows Event logs categories? Select 2
a. ) Setup
b. ) Startup
c. ) Security
d. ) Syslog
a & c