
Cyberops quiz
Authored by Dove Soap
Computers
Professional Development
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
What is a difference between SIEM and SOAR?
SOAR predicts and prevents security alerts, while SIEM checks attack patterns and applies the mitigation.
SIEM predicts and prevents security alerts, while SOAR checks attack patterns and applies the mitigation.
SOAR's primary function is to collect and detect anomalies, while SIEM is more focused on security operations automation and response.
SIEM's primary function is to collect and detect anomalies, while SOAR is more focused on security operations automation and response.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is a difference between data obtained from Tap and SPAN ports?
SPAN improves the detection of media errors, while Tap provides direct access to traffic with lowered data visibility.
SPAN passively splits traffic between a network device and the network without altering it, while Tap alters response times.
Tap mirrors existing traffic from specified ports, while SPAN presents more structured data for deeper analysis.
Tap sends traffic from physical layers to the monitoring device, while SPAN provides a copy of network traffic from switch to destination.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An engineer received an alert affecting the degraded performance of a critical server. Analysis showed a heavy CPU and memory load. What is the next step the engineer should take to investigatethis resource usage?
Run ps -m to capture the existing state of daemons and map required processes to find the gap
Run ps -d to decrease the priority state of high load processes to avoid resource exhaustion
Run ps -u to find out who executed additional processes that caused a high load on a server
Run ps -ef to understand which processes are taking a high amount of resources
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is an incident response plan?
an organizational approach to events that could lead to asset loss or disruption of operations
an organizational approach to system backup and data archiving aligned to regulations
an organizational approach to disaster recovery and timely restoration of operational services
an organizational approach to security management to ensure a service lifecycle and continuous improvements
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two symmetric encryption algorithms? (Choose two.)
3DES
HMAC
MD5
AES
SHA
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which antimalware software approach can recognize various characteristics of known malware files to detect a threat?
heuristics-based
behaviour-based
signature-based
routing-based
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack?
DHCP
DNS
ICMP
HTTP/HTTPS
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?