What is a difference between SIEM and SOAR?
Cyberops quiz

Quiz
•
Computers
•
Professional Development
•
Medium
Dove Soap
Used 9+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
SOAR predicts and prevents security alerts, while SIEM checks attack patterns and applies the mitigation.
SIEM predicts and prevents security alerts, while SOAR checks attack patterns and applies the mitigation.
SOAR's primary function is to collect and detect anomalies, while SIEM is more focused on security operations automation and response.
SIEM's primary function is to collect and detect anomalies, while SOAR is more focused on security operations automation and response.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is a difference between data obtained from Tap and SPAN ports?
SPAN improves the detection of media errors, while Tap provides direct access to traffic with lowered data visibility.
SPAN passively splits traffic between a network device and the network without altering it, while Tap alters response times.
Tap mirrors existing traffic from specified ports, while SPAN presents more structured data for deeper analysis.
Tap sends traffic from physical layers to the monitoring device, while SPAN provides a copy of network traffic from switch to destination.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An engineer received an alert affecting the degraded performance of a critical server. Analysis showed a heavy CPU and memory load. What is the next step the engineer should take to investigatethis resource usage?
Run ps -m to capture the existing state of daemons and map required processes to find the gap
Run ps -d to decrease the priority state of high load processes to avoid resource exhaustion
Run ps -u to find out who executed additional processes that caused a high load on a server
Run ps -ef to understand which processes are taking a high amount of resources
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is an incident response plan?
an organizational approach to events that could lead to asset loss or disruption of operations
an organizational approach to system backup and data archiving aligned to regulations
an organizational approach to disaster recovery and timely restoration of operational services
an organizational approach to security management to ensure a service lifecycle and continuous improvements
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two symmetric encryption algorithms? (Choose two.)
3DES
HMAC
MD5
AES
SHA
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which antimalware software approach can recognize various characteristics of known malware files to detect a threat?
heuristics-based
behaviour-based
signature-based
routing-based
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack?
DHCP
DNS
ICMP
HTTP/HTTPS
Create a free account and access millions of resources
Similar Resources on Quizizz
12 questions
CySA+ Tools

Quiz
•
Professional Development
9 questions
GIS Enablement Knowledge Check

Quiz
•
Professional Development
13 questions
CySA Week 2

Quiz
•
Professional Development
13 questions
Cybersecurity: Core Skills

Quiz
•
Professional Development
15 questions
Sec+ CH.1 Review Test

Quiz
•
Professional Development
11 questions
CyQuiz - Partner Roadshow 2023

Quiz
•
Professional Development
7 questions
Sec+ CH.1 Pre-Assessment

Quiz
•
Professional Development
10 questions
3) Kursus Teknikal Day 2

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade