Q: 1
John as a SOC analyst is worried about the amount of Tor traffic hitting the network. He wants to
prepare a dashboard in the SIEM to get a graph to identify the locations from where the TOR traffic is
coming.
Which of the following data source will he use to prepare the dashboard?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
An organization wants to implement a SIEM deployment architecture. However, they have the
capability to do only log collection and the rest of the SIEM functions must be managed by an MSSP.
Which SIEM deployment architecture will the organization adopt?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
Which of the following is a report writing tool that will help incident handlers to generate efficient
reports on detected incidents during incident response process?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
Sam, a security analyst with INFOSOL INC., while monitoring and analyzing IIS logs, detected an
event matching regex /\\w*((\%27)|(\’))((\%6F)|o|(\%4F))((\%72)|r|(\%52))/ix.
What does this event log indicate?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
Which of the following factors determine the choice of SIEM architecture?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
Juliea a SOC analyst, while monitoring logs, noticed large TXT, NULL payloads.
What does this indicate?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
Which of the following security technology is used to attract and trap people who attempt
unauthorized or illicit utilization of the host system?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
An organization is implementing and deploying the SIEM with following capabilities.
What kind of SIEM deployment architecture the organization is planning to implement?
What kind of SIEM deployment architecture the organization is planning to implement?Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
Banter is a threat analyst in Christine Group of Industries. As a part of the job, he is currently
formatting and structuring the raw data.
He is at which stage of the threat intelligence life cycle?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2