SOC Monthly quiz

SOC Monthly quiz

Professional Development

10 Qs

quiz-placeholder

Similar activities

Understanding BOM in JavaScript(14R)

Understanding BOM in JavaScript(14R)

Professional Development

15 Qs

LINKS Cyber Youth Challenge - Round 3

LINKS Cyber Youth Challenge - Round 3

Professional Development

10 Qs

Knowing the Cyber Threat

Knowing the Cyber Threat

Professional Development

6 Qs

cyber Security Awareness

cyber Security Awareness

Professional Development

15 Qs

Cybersecurity Core Functions

Cybersecurity Core Functions

Professional Development

15 Qs

Cloud Practitioner Essentials Quiz

Cloud Practitioner Essentials Quiz

Professional Development

10 Qs

Security Coding Quiz

Security Coding Quiz

Professional Development

14 Qs

Online Communication and Media Literacy Quiz

Online Communication and Media Literacy Quiz

Professional Development

10 Qs

SOC Monthly quiz

SOC Monthly quiz

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Created by

Anonymous Anonymous

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user reports receiving a suspicious email containing a link prompting them to enter their credentials. What is the FIRST step in investigating this phishing attempt?

Immediately block the user’s account

Click the link to check where it leads

Ask the user to reply to the email for verification

Analyze the email headers for sender details and authentication records

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user reports that all their files have been encrypted with the .locked extension, and a ransom note is present. What is the IMMEDIATE action to take?

Pay the ransom to retrieve the files

Disconnect the infected machine from the network

Run a full antivirus scan while keeping the system online

Ask the user to rename the encrypted files

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your IDS detects multiple SQL injection attempts on a public-facing web server. What is the BEST response?

Review web server logs and check for signs of successful exploitation

Contact the attacker to negotiate

Upgrade the server hardware

Block IP to prevent SQL attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the command
netsh advfirewall set allprofiles state off
do?

It turns off the Windows Defender Firewall for all network profiles (Domain, Private, and Public).

It disables only the Domain profile of Windows Firewall, leaving Private and Public profiles active.

It blocks all incoming and outgoing traffic by setting the firewall to its strictest mode.

It resets the firewall rules to their default settings without disabling the firewall.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A brute-force attack has been detected against an exposed RDP server. What is the BEST mitigation strategy?

Block the attacker's IP, enforce account lockout policies, and enable multi-factor authentication (MFA).

Change the RDP port from 3389 to a random high-number port to evade attackers.

Disable failed login alerts in the SIEM to reduce noise from brute-force attempts.

Add the attacker’s IP to a global "safe list" to monitor their activity.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your DLP (Data Loss Prevention) alerts show large data uploads to an unauthorized cloud storage service. What should you do FIRST?

Immediately block the user’s account and delete all transferred files from the cloud provider.

Contact the employee FLM directly and ask them to explain their activity.

Disable all outbound internet access to prevent further uploads.

Review SIEM and proxy logs to confirm the source, destination, and nature of the data transfer.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your SIEM system has flagged an alert indicating a high volume of failed login attempts followed by a successful login to an internal system using a corporate user's credentials. The account owner reports they did not attempt to log in, and the login was from an unrecognized IP address. What should be your FIRST course of action to mitigate the ATO attack?

Immediately lock the account, force a password reset, and review the account's recent activity.

Notify the account owner to change their password immediately and continue monitoring the account for further activity.

Reset the password for all users in the organization to prevent widespread compromise.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?