Check Your Understanding
Complete all the review questions listed here to test your understanding of the topics and concepts in this chapter. The appendix “Answers to the ‘Check Your Understanding’ Questions” lists the answers.
A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?
A type of virus
A type of logic bomb
A type of ransomware
A type of worm
What is cyberwarfare?
It is an attack only on military targets.
It is an attack on a major corporation.
It is an attack that only involves robots and bots.
It is an attack designed to disrupt, corrupt, or exploit national interests.
How can a security information and event management system in an SOC be used to help personnel fight against security threats?
By collecting and filtering data
By filtering network traffic
By authenticating users to network resources
By encrypting communications to remote sites
Which three technologies should be included in an SOC security information and event management system? (Choose three.)
Proxy service
User authentication
Threat intelligence
Security monitoring
Intrusion prevention
Event collection, correlation, and analysis
What name is given to hackers who hack for a political or social cause?
White hat
Hacker
Hacktivist
Blue hat
Which organization is an international nonprofit organization that offers the CISSP certification?
(ISC)2
IEEE
GIAC
CompTIA
After a security incident is verified in a SOC, an incident responder reviews the incident but cannot identify the source of the incident and form an effective mitigation procedure. To whom should the incident ticket be escalated?
A cyberoperations analyst for help
An SME for further investigation
An alert analyst for further analysis
The SOC manager to ask for other personnel to be assigned
The term Alert Analyst refers to which group of personnel in an SOC?
Tier 1 personnel
Tier 2 personnel
Tier 3 personnel
SOC managers
What is a rogue wireless hotspot?
It is a hotspot that was set up with outdated devices.
It is a hotspot that does not encrypt network user traffic.
It is a hotspot that does not implement strong user authentication mechanisms.
It is a hotspot that appears to be from a legitimate business but was actually set up by someone without the permission from the business.