
SOC Monthly quiz
Authored by Anonymous Anonymous
Information Technology (IT)
Professional Development
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user reports receiving a suspicious email containing a link prompting them to enter their credentials. What is the FIRST step in investigating this phishing attempt?
Immediately block the user’s account
Click the link to check where it leads
Ask the user to reply to the email for verification
Analyze the email headers for sender details and authentication records
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user reports that all their files have been encrypted with the .locked extension, and a ransom note is present. What is the IMMEDIATE action to take?
Pay the ransom to retrieve the files
Disconnect the infected machine from the network
Run a full antivirus scan while keeping the system online
Ask the user to rename the encrypted files
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your IDS detects multiple SQL injection attempts on a public-facing web server. What is the BEST response?
Review web server logs and check for signs of successful exploitation
Contact the attacker to negotiate
Upgrade the server hardware
Block IP to prevent SQL attacks
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the command
netsh advfirewall set allprofiles state off
do?
It turns off the Windows Defender Firewall for all network profiles (Domain, Private, and Public).
It disables only the Domain profile of Windows Firewall, leaving Private and Public profiles active.
It blocks all incoming and outgoing traffic by setting the firewall to its strictest mode.
It resets the firewall rules to their default settings without disabling the firewall.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A brute-force attack has been detected against an exposed RDP server. What is the BEST mitigation strategy?
Block the attacker's IP, enforce account lockout policies, and enable multi-factor authentication (MFA).
Change the RDP port from 3389 to a random high-number port to evade attackers.
Disable failed login alerts in the SIEM to reduce noise from brute-force attempts.
Add the attacker’s IP to a global "safe list" to monitor their activity.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your DLP (Data Loss Prevention) alerts show large data uploads to an unauthorized cloud storage service. What should you do FIRST?
Immediately block the user’s account and delete all transferred files from the cloud provider.
Contact the employee FLM directly and ask them to explain their activity.
Disable all outbound internet access to prevent further uploads.
Review SIEM and proxy logs to confirm the source, destination, and nature of the data transfer.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Your SIEM system has flagged an alert indicating a high volume of failed login attempts followed by a successful login to an internal system using a corporate user's credentials. The account owner reports they did not attempt to log in, and the login was from an unrecognized IP address. What should be your FIRST course of action to mitigate the ATO attack?
Immediately lock the account, force a password reset, and review the account's recent activity.
Notify the account owner to change their password immediately and continue monitoring the account for further activity.
Reset the password for all users in the organization to prevent widespread compromise.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Mastering the Mouse
Quiz
•
Professional Development
10 questions
SQL Exercise #1
Quiz
•
Professional Development
11 questions
Technical Knowledge
Quiz
•
Professional Development
10 questions
Ethical Hacking Kali Linux Part 3
Quiz
•
Professional Development
10 questions
Python Chapter 4: Loops
Quiz
•
Professional Development
15 questions
Sharing Session - Security Operation
Quiz
•
Professional Development
10 questions
Confluent
Quiz
•
Professional Development
10 questions
Dia 4 Webinar Hackers vs Empresas
Quiz
•
Professional Development
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Information Technology (IT)
44 questions
Would you rather...
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
14 questions
Valentine's Day Trivia!
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
11 questions
NFL Football logos
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development