Security Operations
Security monitoring, threat intelligence, and security operations center activities
Question 1
Which of the following tools would work best to prevent the exposure of PII outside of an organization?
Question 2
A security analyst recently joined the team and is trying to determine which scripting language is being used in a production script to determine if it is malicious. Given the following script:
foreach ($user in Get-Content .\this.txt){Get-ADUser $user -Properties primaryGroupID | select-object primaryGroupIDAdd-ADGroupMember "Domain Users" -Members $userSet-ADUser $user -Replace @{primaryGroupID=5131}}
Which of the following scripting languages was used in the script?
Question 3
A security program was able to achieve a 30% improvement in MTTR by integrating security controls into a SIEM. The analyst no longer had to jump between tools. Which of the following best describes what the security program did?
Question 4
Which of the following describes how a CSIRT lead determines who should be communicated with and when during a security incident?
Question 5
In which of the following orders of volatility must evidence be collected?
Viewing page 1 out of 38 pages.
Viewing questions 1-5 out of 189 questions
Progress Summary
0
Questions Answered
0
Correct Answers
0%
Accuracy
