Cyberops quiz

Cyberops quiz

Professional Development

10 Qs

quiz-placeholder

Similar activities

Sec+ Quiz - 3

Sec+ Quiz - 3

Professional Development

15 Qs

Fortinet Overview - Cybersecurity Flow

Fortinet Overview - Cybersecurity Flow

Professional Development

7 Qs

Sorular 11-20

Sorular 11-20

Professional Development

10 Qs

CyberSecurity

CyberSecurity

Professional Development

13 Qs

SEC+ Ch.7 Review Test

SEC+ Ch.7 Review Test

Professional Development

15 Qs

AWS ACF Módulo 5 - Redes e entrega de conteúdo

AWS ACF Módulo 5 - Redes e entrega de conteúdo

Professional Development

10 Qs

WOF Chp 1.1 - Website Optimisation

WOF Chp 1.1 - Website Optimisation

Professional Development

10 Qs

CCNA Security Pre-Assessment

CCNA Security Pre-Assessment

Professional Development

15 Qs

Cyberops quiz

Cyberops quiz

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Dove Soap

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is a difference between SIEM and SOAR? 

SOAR predicts and prevents security alerts, while SIEM checks attack patterns and applies the mitigation.

SIEM predicts and prevents security alerts, while SOAR checks attack patterns and applies the mitigation.

SOAR's primary function is to collect and detect anomalies, while SIEM is more focused on security operations automation and response.

SIEM's primary function is to collect and detect anomalies, while SOAR is more focused on security operations automation and response.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a difference between data obtained from Tap and SPAN ports?

SPAN improves the detection of media errors, while Tap provides direct access to traffic with lowered data visibility.

SPAN passively splits traffic between a network device and the network without altering it, while Tap alters response times.

Tap mirrors existing traffic from specified ports, while SPAN presents more structured data for deeper analysis.

Tap sends traffic from physical layers to the monitoring device, while SPAN provides a copy of network traffic from switch to destination.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An engineer received an alert affecting the degraded performance of a critical server. Analysis showed a heavy CPU and memory load. What is the next step the engineer should take to investigatethis resource usage?

Run ps -m to capture the existing state of daemons and map required processes to find the gap

Run ps -d to decrease the priority state of high load processes to avoid resource exhaustion

Run ps -u to find out who executed additional processes that caused a high load on a server

Run ps -ef to understand which processes are taking a high amount of resources

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is an incident response plan?

an organizational approach to events that could lead to asset loss or disruption of operations

an organizational approach to system backup and data archiving aligned to regulations

an organizational approach to disaster recovery and timely restoration of operational services

an organizational approach to security management to ensure a service lifecycle and continuous improvements

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two symmetric encryption algorithms? (Choose two.)

3DES

HMAC

MD5

AES

SHA

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which antimalware software approach can recognize various characteristics of known malware files to detect a threat?

heuristics-based

behaviour-based

signature-based

routing-based

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack?

DHCP

DNS

ICMP

HTTP/HTTPS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?