Kahoots 5 - SIEM Flashcards

1
Q

Which of the following are attack vectors? [Multi-select]

a. ) Data
b. ) Log systems
c. ) Software
d. ) Rootkits

A

a.) & c.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What of the following are the two primary components of SIEM?

a. ) Security Enterprise Management
b. ) Security Event Management
c. ) Security Information Management
d. ) Security Interface Management

A

b.) & c.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following are components of a SIEM (Select 3)

a. ) Correlation Engine
b. ) Vulnerability Scanner
c. ) Collectors
d. ) API

A

a, c, & d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A SOC uses control systems, quality management and tracking tools T or F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following are popular SIEM vendors?

a. ) Splunk
b. ) Oracle
c. ) AWS
d. ) Arcsight

A

a & d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Splunk only runs on Linux T or F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Database, WAF & Firewalls all provide application logs for SIEMs T or F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following are valid Windows Event logs categories? Select 2

a. ) Setup
b. ) Startup
c. ) Security
d. ) Syslog

A

a & c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly