Security Operations

Security monitoring, threat intelligence, and security operations center activities

Question 1

Which of the following tools would work best to prevent the exposure of PII outside of an organization?

Question 2

A security analyst recently joined the team and is trying to determine which scripting language is being used in a production script to determine if it is malicious. Given the following script:

foreach ($user in Get-Content .\this.txt){Get-ADUser $user -Properties primaryGroupID | select-object primaryGroupIDAdd-ADGroupMember "Domain Users" -Members $userSet-ADUser $user -Replace @{primaryGroupID=5131}}
Which of the following scripting languages was used in the script?

Question 3

A security program was able to achieve a 30% improvement in MTTR by integrating security controls into a SIEM. The analyst no longer had to jump between tools. Which of the following best describes what the security program did?

Question 4

Which of the following describes how a CSIRT lead determines who should be communicated with and when during a security incident?

Question 5

In which of the following orders of volatility must evidence be collected?

Viewing page 1 out of 38 pages.
Viewing questions 1-5 out of 189 questions

Progress Summary

0
Questions Answered
0
Correct Answers
0%
Accuracy

Premium Features

Track your progress, identify weak areas, and get personalized study recommendations.