Security
Information Quiz Answers NSE 2
Fig 1:Security Information Quiz Answers NSE 2 |
Question 1: How did SIEM evolve?
·
As an information platform only
·
From an information platform to a threat intelligence center
·
From an information platform to a fully
integrated and automated center for security and network operations
·
As a threat intelligence center only
Question 2: Which three regulatory standards and acts must
businesses, hospitals, and other organizations comply with? (Choose three.)
·
HIPAA
·
PCI
·
SPML
·
XSLT
·
GDPR
Question 3: Which three problems does SIEM solve? (Choose
three.)
·
The complexity of technology and the
difficulty with identifying attacks
·
The lack of implementation of authentication methods
·
The lack of security awareness by employees
·
The long delay in discovering security
breaches by security teams
·
More sophisticated and stealthy cyber attacks
Question 4: Which two requirements led to the development of
SIEM? (Choose two.)
·
To perform vulnerability scanning
·
To measure and prove compliance to various
legislations
·
To contend with the flood of alerts issued
from IPSs and IDSs
·
To simulate phishing attacks
Question 5: What does the term SIEM stand for?
·
Security Information and Email Management
·
Security Information and Electronic Messaging
·
Security Information and Emergency Management
·
Security Information and Event Manager
Question 6: Which three tasks must technology perform to satisfy
network security compliance requirements? (Choose three.)
·
Monitor, correlate, and notify events in
real-time
·
Aggregate logs from many network sources
·
Prevent employees from accessing the internet
·
Store log data for a length of time that
satisfies auditing requirements
·
Allow public access to aggregated logs
Question 7:What does SIEM do primarily?
Select one:
·
Collect, normalize, and store log events and alerts
·
Connect all security tools together into defined workflows
·
Manage network events and alerts/
·
Manage network information and alerts/
Question 8 :What was the impetus for more automation and machine
learning in later SIEM devices?
Select one:
·
Requirement to manage Big Data
·
Shortage of trained personnel
·
Need to improve MIS efficiency
·
Demand to reduce MIS costs
Question 9 :Which two requirements were the motivation for SIEM?
(Choose two.)
Select one or more:
·
Complying to regulations*
·
Exploiting Big Data
·
Remaining competitive
·
Increasing number of alerts*
Question 10: Which feature is a characteristic of later SIEMs?
Select one:
·
Automatic backups and integrity checking/
·
Collect, normalize, and store log events and alerts/
·
User and entity behavior analytics (UEBA)
·
Deciphering encrypted data flows
Question 11: Which compliance, if ignored by businesses,
hospitals, and other organizations, can result in punitive fines?
Select one:
·
Complying to regulations
·
Complying to User and entity behavior analytics (UEBA)
·
Complying to machine learning checks
·
Complying to automatic backups and integrity checks
Question 12 :What was the primary driver for purchasing SIEM?
Select one:
·
Collect information about customers
·
Comply with regulations
·
Improve MIS efficiency
·
Compensate for the skills-gap labor shortage
Question 13 :What is one method that SIEM uses to analyze data?
Select one:
·
Decipher encrypted logs and alerts
·
Apply security controls
·
Decipher encrypted data flows
·
Watch for known indicators of compromise (IoC)
Question 14 :Which feature provides SIEM greater visibility into
the entire network?
Select one:
·
Complying with regulations
·
Sharing of logs by IoTs and BYODs
·
Deciphering encrypted logs and alerts
·
Analyzing logs and alerts from a
single-pane-of-glass
Question 15 :Which problem was a barrier to the general
acceptance of first-generation SIEM?
Select one:
·
Cost to purchase was prohibitive/
·
High-level of skill was required
·
The point solution approach to network security/
·
Did not have the features needed by organizations
Question 16 :Which three compliance regulations are legislative
and industry-sponsored? (Choose three.)
Select one or more:
·
Payment Industry Card (PIC) standard/
·
Health Portability Insurance and Accountability Act (HPIAA)/
·
Payment Card Industry (PCI) standard
·
General Data Protection Regulation (GDPR)
·
Health Insurance Portability and
Accountability Act (HIPAA)
Question 17 :What is one method that SIEM uses to analyze data?
Select one:
·
Decipher encrypted data flows/
·
Apply security controls
·
Decipher encrypted logs and alerts
·
Watch for known indicators of compromise (IoC)
Question 18 :What was the primary driver for purchasing SIEM?
Select one:
·
Compensate for the skills-gap labor shortage
·
Comply with regulations
·
Improve MIS efficiency
·
Collect information about customers
Question 19 :What is one method that SIEM uses to analyze data?
Select one:
·
Decipher encrypted logs and alerts
·
Apply security controls/
·
Decipher encrypted data flows
·
Watch for known indicators of compromise (IoC)
0 Comments