58.
Question 58
Which three (3) of these are Solution Building Blocks (SBBs)? (Select 3)
1 point
Virus Protection
Identity and Access Management
Spam Filter
Application Firewall
59.
Question 59
A robust cybersecurity defense includes contributions from 3 areas, human expertise, security analytics and artificial intelligence. Which of these areas would contain the ability for unstructured analysis?
1 point
Human expertise
Artificial intelligence
Security analytics
60.
Question 60
How would a SIEM flag a user who is trying to log in to the network from computers located in 2 different countries at the same time?
1 point
A vulnerability
An incident
An offense
A threat
61.
Question 61
Which of these is a good definition for cyber threat hunting?
1 point
The act of simulating attacks to identify vulnerabilities, testing new software to help protect the company's data, and helping users adhere to new regulations and processes to ensure the network stays safe.
The act of proactively and aggressively identifying, intercepting, tracking, investigating and eliminating cyber adversaries as early as possible in the cyber kill chain.
The act of creating and maintaining corporate security structures and ensuring that they function as designed. As high-level leaders, they also supervise security teams and have a hand in creating security-related policies and procedures.
The act of detecting, investigating, and responding to incidents, including planning and implementing preventative security measures building disaster recovery plans.
62.
Question 62
The cyber hunting team and the SOC analysts are informally referred to as the ____ and ____ teams, respectively.
1 point
Visitors, Home
Red, Blue
Blue. Red
Attack, Defense
63.
Question 63
Which three (3) soft skills are important to have in an organization's incident response team? (Select 3)
1 point
Problem solving and Critical thinking
Communication
Motivational
Teamwork
64.
Question 64
According to the IRIS Framework, during which stage of an attack would the attacker attempt to escalate their privileges, move laterally and conduct internal reconnaissance?
1 point
Attack beginnings.
Attack objective execution.
Continuous phases occur.
Continue the attack, expand network access.
Launch and execute the attack.
ANSWERS :
ANS 58. a) Virus Protection
b) Identity and Access Management
d) Application Firewall
ANS 59. a) Human expertise
ANS 60. a) A vulnerability
ANS 61. b) The act of proactively and aggressively identifying, intercepting, tracking, investigating and eliminating cyber adversaries as early as possible in the cyber kill chain.
ANS 62. b) Red, Blue
ANS 63. a) Problem solving and Critical thinking
b) Communication
d) Teamwork
ANS 64. d) Continue the attack, expand network access.
Get Answers For Free
Most questions answered within 1 hours.