Security Information Quiz Answers NSE 2

Security Information Quiz Answers NSE 2

Security Information Quiz Answer NSE 2
Fig 1:Security Information Quiz Answers NSE 2

Question 1: How did SIEM evolve?

·         As an information platform only

·         From an information platform to a threat intelligence center

·         From an information platform to a fully integrated and automated center for security and network operations

·         As a threat intelligence center only

Question 2: Which three regulatory standards and acts must businesses, hospitals, and other organizations comply with? (Choose three.)

·         HIPAA

·         PCI

·         SPML

·         XSLT

·         GDPR

Question 3: Which three problems does SIEM solve? (Choose three.)

·         The complexity of technology and the difficulty with identifying attacks

·         The lack of implementation of authentication methods

·         The lack of security awareness by employees

·         The long delay in discovering security breaches by security teams

·         More sophisticated and stealthy cyber attacks

Question 4: Which two requirements led to the development of SIEM? (Choose two.)

·         To perform vulnerability scanning

·         To measure and prove compliance to various legislations

·         To contend with the flood of alerts issued from IPSs and IDSs

·         To simulate phishing attacks

Question 5: What does the term SIEM stand for?

·         Security Information and Email Management

·         Security Information and Electronic Messaging

·         Security Information and Emergency Management

·         Security Information and Event Manager

Question 6: Which three tasks must technology perform to satisfy network security compliance requirements? (Choose three.)

·         Monitor, correlate, and notify events in real-time

·         Aggregate logs from many network sources

·         Prevent employees from accessing the internet

·         Store log data for a length of time that satisfies auditing requirements

·         Allow public access to aggregated logs

Question 7:What does SIEM do primarily?

Select one:

·         Collect, normalize, and store log events and alerts

·         Connect all security tools together into defined workflows

·         Manage network events and alerts/

·         Manage network information and alerts/

Question 8 :What was the impetus for more automation and machine learning in later SIEM devices?

Select one:

·         Requirement to manage Big Data

·         Shortage of trained personnel

·         Need to improve MIS efficiency

·         Demand to reduce MIS costs

Question 9 :Which two requirements were the motivation for SIEM? (Choose two.)

Select one or more:

·         Complying to regulations*

·         Exploiting Big Data

·         Remaining competitive

·         Increasing number of alerts*

Question 10: Which feature is a characteristic of later SIEMs?

Select one:

·         Automatic backups and integrity checking/

·         Collect, normalize, and store log events and alerts/

·         User and entity behavior analytics (UEBA)

·         Deciphering encrypted data flows

Question 11: Which compliance, if ignored by businesses, hospitals, and other organizations, can result in punitive fines?

Select one:

·         Complying to regulations

·         Complying to User and entity behavior analytics (UEBA)

·         Complying to machine learning checks

·         Complying to automatic backups and integrity checks

Question 12 :What was the primary driver for purchasing SIEM?

Select one:

·         Collect information about customers

·         Comply with regulations

·         Improve MIS efficiency

·         Compensate for the skills-gap labor shortage

Question 13 :What is one method that SIEM uses to analyze data?

Select one:

·         Decipher encrypted logs and alerts

·         Apply security controls

·         Decipher encrypted data flows

·         Watch for known indicators of compromise (IoC)

Question 14 :Which feature provides SIEM greater visibility into the entire network?

Select one:

·         Complying with regulations

·         Sharing of logs by IoTs and BYODs

·         Deciphering encrypted logs and alerts

·         Analyzing logs and alerts from a single-pane-of-glass

Question 15 :Which problem was a barrier to the general acceptance of first-generation SIEM?

Select one:

·         Cost to purchase was prohibitive/

·         High-level of skill was required

·         The point solution approach to network security/

·         Did not have the features needed by organizations

Question 16 :Which three compliance regulations are legislative and industry-sponsored? (Choose three.)

Select one or more:

·         Payment Industry Card (PIC) standard/

·         Health Portability Insurance and Accountability Act (HPIAA)/

·         Payment Card Industry (PCI) standard

·         General Data Protection Regulation (GDPR)

·         Health Insurance Portability and Accountability Act (HIPAA)

Question 17 :What is one method that SIEM uses to analyze data?

Select one:

·         Decipher encrypted data flows/

·         Apply security controls

·         Decipher encrypted logs and alerts

·         Watch for known indicators of compromise (IoC)

Question 18 :What was the primary driver for purchasing SIEM?

Select one:

·         Compensate for the skills-gap labor shortage

·         Comply with regulations

·         Improve MIS efficiency

·         Collect information about customers

Question 19 :What is one method that SIEM uses to analyze data?

Select one:

·         Decipher encrypted logs and alerts

·         Apply security controls/

·         Decipher encrypted data flows

·         Watch for known indicators of compromise (IoC)

 

Post a Comment

0 Comments