Questions
Questions
Q 1. What will be the correct order of the steps to be followed with respect to user
authentication issues in network security?
b Set up threshold values for the failed login event to prevent false alarms.
Refer to the given list and select the option with the correct sequence.
1. 1.b
2.a
3.c
2. 1.c
2.b
3.a
3. 1.b
2.c
3.a
4. 1.a
2.c
3.b
Q 1. What is the right sequence of tasks that are performed by the intrusion detection system
(IDS)?
Refer to the given list and select option with the cotted sequence.
1) 2-4-1-3
2) 3-1-4-2
3) 3-4-1-2
4) 3-2-1-4
Q 2. Which data source will holp identify events in the network that may breach security?
Q 3. Which option indicates the detection use case that might have been used by the SIEM in
reporting the anomaly of a user account that is found to be compromised?
1. A service account login that had carried out some software updates and patches
2. A device that has been transmitting lesser than usual amount of data over a period of
time to an external source
3. An administrator account that was trying to access sensitive data
4. User login was taking place from unusual locations
Q 5. What will be the type of log if a particular log shows various applications and files used
on various devices on the network?
Q 6. Which one of the following log analysis method is used to convert diverse log entities
into a standard format that can be used for pattern recognition?
1. Normalization
2. Classification
3. Correlation
4. Tagging
Q 7. What is the correct order of steps that will carried out during incident management?
to the given list and select the option with the correct
Q 8. Which type of request from the employees in an organization will be handled by the
Service Request Management team?
1. Requests
2. Alarms
3. Events
4. Incidents
Q 11. Which option indicates an important item that is included in the Shift Handover form
for effective shift handover among employees?
Q 16. Which type of cybersecurity attack downloads programs without the user’s knowledge
in order to infect the device or hack data?
1. Drive-by-attack
2. Password Attack
3. Session hijacking
4. phishing
Q 17. Which option indicates an important feature of the SIEM system that will be developed?