Comptia Security+ Understanding Monitoring and Auditing

Comptia Security+ Understanding Monitoring and Auditing

Professional Development

30 Qs

quiz-placeholder

Similar activities

Cyber Security

Cyber Security

Professional Development

30 Qs

Part 1.2

Part 1.2

Professional Development

25 Qs

AI in Cybersecurity

AI in Cybersecurity

Professional Development

27 Qs

Deploying ethernet switching quiz

Deploying ethernet switching quiz

Professional Development

30 Qs

CompTIA Security+ Certification Exam SY0-701 Practice Test 1

CompTIA Security+ Certification Exam SY0-701 Practice Test 1

Professional Development

25 Qs

Part 1.3

Part 1.3

Professional Development

25 Qs

SY0-501 Practice Quiz 2

SY0-501 Practice Quiz 2

Professional Development

29 Qs

1.4 and 1.5

1.4 and 1.5

1st Grade - Professional Development

25 Qs

Comptia Security+ Understanding Monitoring and Auditing

Comptia Security+ Understanding Monitoring and Auditing

Assessment

Quiz

Computers

Professional Development

Hard

Created by

J. Hines

Used 11+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst is reviewing a log file that shows multiple failed login attempts to a server within a short period of time. Which monitoring technique would be most effective in identifying the source of these attempts?
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
Security Information and Event Management (SIEM)
Network Traffic Analyzer
Packet Capture and Analysis

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following methods is commonly used to detect unauthorized changes to critical system files?
Data loss prevention
File integrity monitoring
Port scanning
Network intrusion detection
Vulnerability scanning

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key characteristic of a continuous monitoring strategy?
Periodic review of audit logs
Retention of log files for 1 year
Manual review of incidents
Real-time monitoring
Conducting periodic assessments

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator is configuring a SIEM solution to monitor the network for possible security incidents. Which of the following should be the primary focus when defining correlation rules for the SIEM solution?
Incident response procedures
Network traffic analysis
Network architecture diagrams
Regulatory compliance requirements
Security policies and procedures

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an auditing technique that focuses on the identification of vulnerabilities in a system by simulating an attack?
Vulnerability scanning
Port scanning
Penetration testing
Log file analysis
Security Information and Event Management (SIEM)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an activity that can be monitored using a Network Intrusion Detection System (NIDS)?
Application performance issues
System downtime incidents
Failed login attempts
Unauthorized access attempts
Firewall rule changes

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator wants to monitor suspicious network traffic and detect any potentially malicious activities. Which of the following tools would be the most appropriate for this purpose?
Security Information and Event Management (SIEM)
Digital certificate authority
Firewall logs analysis
Intrusion Detection System (IDS)
Penetration testing tool

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?