Module 3-02 Challenge Flashcards

1
Q

Which of the following statements correctly describe logs? Select all that apply.

  • Actions such as using a username or password are recorded in a firewall log.
  • A network log is a record of all computers and devices that enter and leave a network.
  • Events related to websites, emails, or file shares are recorded in a server log.
  • A log is a record of events that occur within an organization’s systems and networks.
  • Security teams monitor logs to identify vulnerabilities and potential data breaches.
  • Connections between devices and services on a network are recorded in a firewall log.
  • Outbound requests to the internet from within a network are recorded in a firewall log.
  • Actions such as login requests are recorded in a server log.
A
  • A network log is a record of all computers and devices that enter and leave a network.
  • Events related to websites, emails, or file shares are recorded in a server log.
  • A log is a record of events that occur within an organization’s systems and networks.
  • Security teams monitor logs to identify vulnerabilities and potential data breaches.
  • Outbound requests to the internet from within a network are recorded in a firewall log.
  • Actions such as login requests are recorded in a server log.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some of the key benefits of SIEM tools? Select all that apply.

  • Store all log data in a centralized location
  • Automatic updates customized to new threats and vulnerabilities
  • Provide visibility
  • Monitor critical activities in an organization
  • Increase efficiency
  • Automatic customization to changing security needs
  • Deliver automated alerts
  • Minimize the number of logs to be manually reviewed
A
  • Store all log data in a centralized location
  • Provide visibility
  • Monitor critical activities in an organization
  • Increase efficiency
  • Automatic customization to changing security needs
  • Minimize the number of logs to be manually reviewed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To assess the performance of a software application, security professionals use _____, including response time, availability, and failure rate.

  • logs
  • SIEM tools
  • metrics
  • dashboards
A

metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A security team chooses to implement a SIEM tool that will be managed and maintained by the organization’s IT department, rather than a third-party vendor. What type of tool are they using?

  • Department-hosted
  • Cloud-hosted
  • Self-hosted
  • Hybrid
A

Self-hosted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are a security professional, and you want a SIEM tool that will require both on-site infrastructure and internet-based solutions. What type of tool do you choose?

  • Hybrid
  • Cloud-hosted
  • Component-hosted
  • Self-hosted
A

Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fill in the blank: _____ are used to retain, analyze, and search an organization’s log data to provide security information and alerts in real-time.

  • network protocol analyzers (packet sniffers)
  • SIEM tools
  • Playbooks
  • Operating systems
A

SIEM tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

After receiving an alert about a suspicious login attempt, a security analyst can access their _____ to gather information about the alert.

  • internal infrastructure
  • SIEM tool dashboard
  • network protocol analyzer (packet sniffer)
  • playbook
A

SIEM tool dashboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ tools are often free to use.

  • Command-line
  • Open-source
  • Cloud-hosted
  • Proprietary
A

Open-source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SIEM tools retain, analyze, and search an organization’s _____ to provide security information and alerts.

  • cloud applications
  • log data
  • hardware
  • database
A

log data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A security analyst receives an alert about hundreds of login attempts from unusual geographic locations within the last few minutes. What can the analyst use to review a timeline of the login attempts, locations, and time of activity?

  • A SIEM tool dashboard
  • An operating system
  • A playbook
  • A network protocol analyzer (packet sniffer)
A

A SIEM tool dashboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of tool typically requires users to pay for usage?

  • Cloud native
  • Self-hosted
  • Proprietary
  • Open-source
A

Proprietary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Software application _____ are technical attributes, such as response time, availability, and failure rate.

  • dashboards
  • logs
  • metrics
  • SIEM tools
A

metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A security team chooses to implement a SIEM tool that they will install, operate, and maintain using their own physical infrastructure. What type of tool are they using?

  • Log-hosted
  • Self-hosted
  • Hybrid
  • Cloud-hosted
A

Self-hosted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are a security analyst, and you want a security solution that will be fully maintained and managed by your SIEM tool provider. What type of tool do you choose?

  • Self-hosted
  • Hybrid
  • Solution-hosted
  • Cloud-hosted
A

Cloud-hosted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SIEM tools are used to search, analyze, and _____ an organization’s log data to provide security information and alerts in real-time.

  • release
  • retain
  • separate
  • modify
A

retain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly