A SOC is currently being outsourced. Which of the following is being used?

SPQ5

Quiz
•
Fun
•
Professional Development
•
Hard
Caitrin Catalan-Padilla
FREE Resource
Student preview

31 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Microservices
SaaS
MSSP
PaaS
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security analyst is investigating a phishing email that contains a malicious document directed to the company's Chief Executive Officer (CEO). Which of the following should the analyst perform to understand the threat and retrieve possible IoCs?
Run a vulnerability scan against the CEOs computer to find possible vulnerabilities
Install a sandbox to run the malicious payload in a safe environment
Perform a traceroute to identify the communication path
Use netstat to check whether communication has been made with a remote host
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following controls would BEST identify and report malicious insider activities?
An intrusion detection system
A proxy
Audit trails
Strong authentication
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A user's PC was recently infected by malware. The user has a legacy printer without vendor support, and the user's OS is fully patched. The user downloaded a driver package from the internet. No threats were found on the downloaded file, but during file installation, a malicious runtime threat was detected. Which of the following is MOST likely cause of the infection?
The driver has malware installed and was refactored upon download to avoid detection.
The user's computer has a rootkit installed that has avoided detection until the new driver overwrote key files.
The user's antivirus software definition were out of date and were damaged by the installation of the driver
The user's computer has been infected with a logic bomb set to run when new driver was installed.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A company's cybersecurity department is looking for a new solution to maintain high availability. Which of the following can be utilized to build a solution? (Select Two)
A stateful inspection
IP hashes
A round robin
A VLAN
A DMZ
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A network analyst is investigating compromised corporate information. The analyst leads to a theory that network traffic was intercepted before being transmitted to the internet. The following output was captured on an internal host. (See attached image)
Based on the IoCS, which of the following was the MOST likely attack used to compromise the network communication?
Denial of service
ARP poisoning
Command injection
MAC flooding
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Users reported several suspicious activities within the last two weeks that resulted in several unauthorized transactions. Upon investigation, the security analyst found the following. (See attached image) Multiple reports of breached credentials within that time period Traffic being redirected in certain parts of the network Fraudulent emails being sent by various internal users without their consent Which of the following types of attacks was MOST likely used?
Replay attack
Race condition
Cross site scripting
Request forgeries
Create a free account and access millions of resources
Popular Resources on Wayground
25 questions
Equations of Circles

Quiz
•
10th - 11th Grade
30 questions
Week 5 Memory Builder 1 (Multiplication and Division Facts)

Quiz
•
9th Grade
33 questions
Unit 3 Summative - Summer School: Immune System

Quiz
•
10th Grade
10 questions
Writing and Identifying Ratios Practice

Quiz
•
5th - 6th Grade
36 questions
Prime and Composite Numbers

Quiz
•
5th Grade
14 questions
Exterior and Interior angles of Polygons

Quiz
•
8th Grade
37 questions
Camp Re-cap Week 1 (no regression)

Quiz
•
9th - 12th Grade
46 questions
Biology Semester 1 Review

Quiz
•
10th Grade