1. What is cyberwarfare?
o It is an attack only on military targets.
o It is an attack on a major corporation.
o It is an attack that only involves robots and bots.
o It is an attack designed to disrupt, corrupt, or exploit national interests. *
2. Which statement describes cyberwarfare?
o Cyberwarfare is an attack carried out by a group of script kiddies.
o It is a series of personal protective equipment developed for soldiers involved in nuclear
war.
o It is simulation software for Air Force pilots that allows them to practice under a simulated
war scenario.
o It is Internet-based conflict that involves the penetration of information systems of
other nations.
3. in the operation of a SOC, which system is frequently used to let an analyst select alerts
from a pool to investigate?
o syslog server
o registration system
o ticketing system
o security alert knowledge-based system
4. How can a security information and event management system in an SOC be used to help
personnel fight against security threats?
o By collecting and filtering data *
o By filtering network traffic
o By authenticating users to network resources
o By encrypting communications to remote sites
5. Which statement best describes a motivation of hacktivists?
o They are part of a protest group behind a political cause.
o They are curious and learning hacking skills.
o They are trying to show off their hacking skills.
o They are interested in discovering new exploits.
6. If a SOC has a goal of 99.999% uptime, how many minutes of downtime a year would be
considered within its goal?
o Approximately 5 minutes per year.
o Approximately 10 minutes per year.
o Approximately 20 minutes per year.
o Approximately 30 minutes per year.
7. Why do IoT devices pose a greater risk than other computing devices on a network?
o Most IoT devices do not require an Internet connection and are unable to receive new
updates.
o IoT devices cannot function on an isolated network with only an Internet connection.
o Most IoT devices do not receive frequent firmware updates.
o IoT devices require unencrypted wireless connections.
8. Which two services are provided by security operations centers? (Choose two.)
o managing comprehensive threat solutions
o ensuring secure routing packet exchanges
o responding to data center physical break-ins
o monitoring network security threats
Página 1 de 3
o providing secure Internet connections
9. What name is given to hackers who hack for a political or social cause?
o White hat
o Hacker
o Hacktivist *
o Blue hat
10. The term Alert Analyst refers to which group of personnel in an SOC?
o Tier 1 personnel *
o Tier 2 personnel
o Tier 3 personnel
o SOC managers
11. What is a rogue wireless hotspot?
o It is a hotspot that was set up with outdated devices.
o It is a hotspot that does not encrypt network user traffic.
o It is a hotspot that does not implement strong user authentication mechanisms.
o It is a hotspot that appears to be from a legitimate business but was actually set up
by someone without the permission from the business. *
12. What is a potential risk when using a free and open wireless hotspot in a public location?
o Too many users trying to connect to the Internet may cause a network traffic jam.
o The Internet connection can become too slow when many users access the wireless
hotspot.
o Network traffic might be hijacked and information stolen.
o Purchase of products from vendors might be required in exchange for the Internet access.
13. How does a security information and event management system (SIEM) in a SOC help the
personnel fight against security threats?
o by integrating all security devices and appliances in an organization
o by analyzing logging data in real time
o by combining data from multiple technologies
o by dynamically implementing firewall rules
14. Users report that a database file on the main server cannot be accessed. A database
administrator verifies the issue and notices that the database file is now encrypted. The
organization receives a threatening email demanding payment for the decryption of the
database file. What type of attack has the organization experienced?
o man-in-the-middle attack
o DoS attack
o ransomware
o Trojan horse
15. Which organization offers the vendor-neutral CySA+ certification?
o IEEE
o CompTIA
o (ISC)²
o GIAC
16. What was used as a cyberwarfare weapon to attack a uranium enrichment facility in Iran?
o DDoS
o SQL injection
o PSYOPS
o Stuxnet
Página 2 de 3
17. Which three technologies should be included in a SOC security information and event
management system? (Choose three.)
o firewall appliance
o security monitoring
o log management
o intrusion prevention
o proxy service
o threat intelligence
18. Which personnel in a SOC is assigned the task of verifying whether an alert triggered by
monitoring software represents a true security incident?
o SOC Manager
o Tier 2 personnel
o Tier 3 personnel
o Tier 1 personnel
19. What name is given to an amateur hacker?
o red hat
o script kiddie
o black hat
o blue team
20. Which personnel in a SOC are assigned the task of hunting for potential threats and
implementing threat detection tools?
o Tier 1 Analyst
o SOC Manager
o Tier 2 Incident Reporter
o Tier 3 SME
21. Match the components to the major categories in a SOC.
Question:
Answer:
Página 3 de 3