Search Header Logo

SOC Monthly Quiz

Authored by yusuf ishkan

Computers

Professional Development

Used 3+ times

SOC Monthly Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A user reports receiving a suspicious email containing a link prompting them to enter their credentials. What is the FIRST step in investigating this phishing attempt?

Analyze the email headers for sender details and authentication records

Immediately block the user’s account

Click the link to check where it leads

Ask the user to reply to the email for verification

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A user reports that all their files have been encrypted with the .locked extension, and a ransom note is present. What is the IMMEDIATE action to take?

Pay the ransom to retrieve the files

Re-image the device

Ask the user to rename the encrypted files

Disconnect the infected machine from the network

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your IDS detects multiple SQL injection attempts on a public-facing web server. What is the BEST response?

Upgrade the server hardware

Upgrade rule on WAF

Review web server logs and check for signs of successful exploitation

Block IP to prevent SQL attacks

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does the command
netsh advfirewall set allprofiles state off
do?

It blocks all incoming and outgoing traffic by setting the firewall to its strictest mode.

It turns off the Windows Defender Firewall for all network profiles (Domain, Private, and Public).

It disables only the Domain profile of Windows Firewall, leaving Private and Public profiles active.

It resets the firewall rules to their default settings without disabling the firewall.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A brute-force attack has been detected against an exposed RDP server. What is the BEST mitigation strategy?

Disable failed login alerts in the SIEM to reduce noise from brute-force attempts.

Add the attacker’s IP to a global "safe list" to monitor their activity.

Block the attacker's IP, enforce account lockout policies, and enable multi-factor authentication (MFA).

Change the RDP port from 3389 to a random high-number port to evade attackers

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your DLP (Data Loss Prevention) alerts show large data uploads to a cloud storage service. What is the next step of action?

Review SIEM and proxy logs to confirm the source, destination, and nature of the data transfer.

Contact the employee FLM directly and ask them to explain their activity.

Disable all outbound internet access to prevent further uploads.

Immediately block the user’s account

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your SIEM system has flagged an alert indicating a high volume of failed login attempts followed by a successful login to an internal system using a corporate user's credentials. The account owner reports they did not attempt to log in, and the login was from an unrecognized IP address. What should be your FIRST course of action to mitigate the ATO attack?

Reset the password for all users in the organization to prevent widespread compromise.

Immediately lock the account, force a password reset, and review the account's recent activity.

Notify the account owner to change their password immediately and continue monitoring the account for further activity.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?