Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?
Answer : C
Reference: https://www.kaspersky.com/resource-center/threats/what-is-a-honeypot
Identify the event severity level in Windows logs for the events that are not necessarily significant, but may indicate a possible future problem.
Answer : B
Reference: https://docs.microsoft.com/en-us/windows/win32/eventlog/event-types
Which of the following factors determine the choice of SIEM architecture?
Answer : C
What does HTTPS Status code 403 represents?
Answer : D
Reference: https://en.wikipedia.org/wiki/HTTP_403
Which of the following Windows event is logged every time when a user tries to access the "Registry" key?
Answer : D
Reference: https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4657
Which of the following are the responsibilities of SIEM Agents?
1. Collecting data received from various devices sending data to SIEM before forwarding it to the central engine.
2. Normalizing data received from various devices sending data to SIEM before forwarding it to the central engine.
3. Co-relating data received from various devices sending data to SIEM before forwarding it to the central engine.
4. Visualizing data received from various devices sending data to SIEM before forwarding it to the central engine.
Answer : C
Sam, a security analyst with INFOSOL INC., while monitoring and analyzing IIS logs, detected an event matching regex /\\w*((\%27)|(\’))((\%6F)|o|(\%4F))((\%72)|r|(\%52))/ix.
What does this event log indicate?
Answer : A
Reference: https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=001f5e09-88b4-4a9a-b310-4c20578eecf9&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
Which of the following framework describes the essential characteristics of an organization's security engineering process that must exist to ensure good security engineering?
Answer : C
Reference: https://www.iso.org/standard/44716.html
What does Windows event ID 4740 indicate?
Answer : A
Reference: https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4740#:~:text=For%204740(S)%3A%20A,Security%20ID”%20is%20not%20SYSTEM.
Which of the following is a Threat Intelligence Platform?
Answer : A
Reference: https://www.esecurityplanet.com/products/threat-intelligence-platforms/
A type of threat intelligent that find out the information about the attacker by misleading them is known as __________.
Answer : C
Reference: https://www.recordedfuture.com/threat-intelligence/
Chloe, a SOC analyst with Jake Tech, is checking Linux systems logs. She is investigating files at /var/log/wtmp.
What Chloe is looking at?
Answer : D
Reference: https://stackify.com/linux-logs/
Which of the following threat intelligence is used by a SIEM for supplying the analysts with context and "situational awareness" by using threat actor TTPs, malware campaigns, tools used by threat actors.
1. Strategic threat intelligence
2. Tactical threat intelligence
3. Operational threat intelligence
4. Technical threat intelligence
Answer : A
Reference: https://hodigital.blog.gov.uk/wp-content/uploads/sites/161/2020/03/Cyber-Threat-Intelligence-A-Guide-For-Decision-Makers-and-Analysts-v2.0.pdf (38)
Properly applied cyber threat intelligence to the SOC team help them in discovering TTPs.
What does these TTPs refer to?
Answer : A
Reference: https://www.crest-approved.org/wp-content/uploads/CREST-Cyber-Threat-Intelligence.pdf
Which of the following data source can be used to detect the traffic associated with Bad Bot User-Agents?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us