Check answers here:
Modules 1 – 2: Threat Actors and Defenders Group Exam (Answers)
Quiz-summary
0 of 28 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
Information
Modules 1 - 2: Threat Actors and Defenders Group Exam - Test online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 28 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- Answered
- Review
-
Question 1 of 28
1. Question
1 pointsWhich organization is an international nonprofit organization that offers the CISSP certification?Correct
Incorrect
-
Question 2 of 28
2. Question
1 pointsWhat is a benefit to an organization of using SOAR as part of the SIEM system?Correct
Incorrect
-
Question 3 of 28
3. Question
1 pointsWhich personnel in a SOC are assigned the task of hunting for potential threats and implementing threat detection tools?Correct
Incorrect
-
Question 4 of 28
4. Question
1 pointsWhich three technologies should be included in a SOC security information and event management system? (Choose three.)Correct
Incorrect
-
Question 5 of 28
5. Question
1 pointsThe term cyber operations analyst refers to which group of personnel in a SOC?Correct
Incorrect
-
Question 6 of 28
6. Question
1 pointsHow does a security information and event management system (SIEM) in a SOC help the personnel fight against security threats?Correct
Incorrect
-
Question 7 of 28
7. Question
1 pointsAn SOC is searching for a professional to fill a job opening. The employee must have expert-level skills in networking, endpoint, threat intelligence, and malware reverse engineering in order to search for cyber threats hidden within the network. Which job within an SOC requires a professional with those skills?Correct
Incorrect
-
Question 8 of 28
8. Question
1 pointsWhich three are major categories of elements in a security operations center? (Choose three.)Correct
Incorrect
-
Question 9 of 28
9. Question
1 pointsWhich KPI metric does SOAR use to measure the time required to stop the spread of malware in the network?Correct
Incorrect
-
Question 10 of 28
10. Question
1 pointsWhat job would require verification that an alert represents a true security incident or a false positive?Correct
Incorrect
-
Question 11 of 28
11. Question
1 pointsWhen a user turns on the PC on Wednesday, the PC displays a message indicating that all of the user files have been locked. In order to get the files unencrypted, the user is supposed to send an email and include a specific ID in the email title. The message also includes ways to buy and submit bitcoins as payment for the file decryption. After inspecting the message, the technician suspects a security breach occurred. What type of malware could be responsible?Correct
Incorrect
-
Question 12 of 28
12. Question
1 pointsAn employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?Correct
Incorrect
-
Question 13 of 28
13. Question
1 pointsWhat are two examples of personally identifiable information (PII)? (Choose two.)Correct
Incorrect
-
Question 14 of 28
14. Question
1 pointsWhat is the dark web?Correct
Incorrect
-
Question 15 of 28
15. Question
1 pointsA company has just had a cybersecurity incident. The threat actor appeared to have a goal of network disruption and appeared to use a common security hack tool that overwhelmed a particular server with a large amount of traffic. This traffic rendered the server inoperable. How would a certified cybersecurity analyst classify this type of threat actor?Correct
Incorrect
-
Question 16 of 28
16. Question
1 pointsA user calls the help desk complaining that the password to access the wireless network has changed without warning. The user is allowed to change the password, but an hour later, the same thing occurs. What might be happening in this situation?Correct
Incorrect
-
Question 17 of 28
17. Question
1 pointsWhich regulatory law regulates the identification, storage, and transmission of patient personal healthcare information?Correct
Incorrect
-
Question 18 of 28
18. Question
1 pointsA worker in the records department of a hospital accidentally sends a medical record of a patient to a printer in another department. When the worker arrives at the printer, the patient record printout is missing. What breach of confidentiality does this situation describe?Correct
Incorrect
-
Question 19 of 28
19. Question
1 pointsWhat type of cyberwarfare weapon was Stuxnet?Correct
Incorrect
-
Question 20 of 28
20. Question
1 pointsWhich example illustrates how malware might be concealed?Correct
Incorrect
-
Question 21 of 28
21. Question
1 pointsWhat websites should a user avoid when connecting to a free and open wireless hotspot?Correct
Incorrect
-
Question 22 of 28
22. Question
1 pointsIn a smart home, an owner has connected many home devices to the Internet, such as the refrigerator and the coffee maker. The owner is concerned that these devices will make the wireless network vulnerable to attacks. What action could be taken to address this issue?Correct
Incorrect
-
Question 23 of 28
23. Question
1 pointsMatch the SOC metric to the description. (Not all options are used.)Correct
Incorrect
-
Question 24 of 28
24. Question
1 pointsA group of users on the same network are all complaining about their computers running slowly. After investigating, the technician determines that these computers are part of a zombie network. Which type of malware is used to control these computers?Correct
Incorrect
-
Question 25 of 28
25. Question
1 pointsWhich statement describes cyberwarfare?Correct
Incorrect
-
Question 26 of 28
26. Question
1 pointsWhy do IoT devices pose a greater risk than other computing devices on a network?Correct
Incorrect
-
Question 27 of 28
27. Question
1 pointsWhich cyber attack involves a coordinated attack from a botnet of zombie computers?Correct
Incorrect
-
Question 28 of 28
28. Question
1 pointsWhat is the main purpose of cyberwarfare?Correct
Incorrect
easy