0% found this document useful (0 votes)
194 views3 pages

Understanding Cyberwarfare and SOC Roles

The document discusses cybersecurity concepts related to security operations centers (SOCs). It covers topics like cyberwarfare, security information and event management (SIEM) systems, threats from IoT devices, and roles in a SOC. Multiple choice questions test understanding of these topics, with answers related to collecting and filtering data with SIEMs, hacktivists protesting for political causes, and tier 1 analysts initially handling alerts.

Uploaded by

Jorge Yavorski
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
194 views3 pages

Understanding Cyberwarfare and SOC Roles

The document discusses cybersecurity concepts related to security operations centers (SOCs). It covers topics like cyberwarfare, security information and event management (SIEM) systems, threats from IoT devices, and roles in a SOC. Multiple choice questions test understanding of these topics, with answers related to collecting and filtering data with SIEMs, hacktivists protesting for political causes, and tier 1 analysts initially handling alerts.

Uploaded by

Jorge Yavorski
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

1. What is cyberwarfare?

o It is an attack only on military targets.


o It is an attack on a major corporation.
o It is an attack that only involves robots and bots.
o It is an attack designed to disrupt, corrupt, or exploit national interests. *
2. Which statement describes cyberwarfare?
o Cyberwarfare is an attack carried out by a group of script kiddies.
o It is a series of personal protective equipment developed for soldiers involved in nuclear
war.
o It is simulation software for Air Force pilots that allows them to practice under a simulated
war scenario.
o It is Internet-based conflict that involves the penetration of information systems of
other nations.
3. in the operation of a SOC, which system is frequently used to let an analyst select alerts
from a pool to investigate?
o syslog server
o registration system
o ticketing system
o security alert knowledge-based system
4. How can a security information and event management system in an SOC be used to help
personnel fight against security threats?
o By collecting and filtering data *
o By filtering network traffic
o By authenticating users to network resources
o By encrypting communications to remote sites
5. Which statement best describes a motivation of hacktivists?
o They are part of a protest group behind a political cause.
o They are curious and learning hacking skills.
o They are trying to show off their hacking skills.
o They are interested in discovering new exploits.
6. If a SOC has a goal of 99.999% uptime, how many minutes of downtime a year would be
considered within its goal?
o Approximately 5 minutes per year.
o Approximately 10 minutes per year.
o Approximately 20 minutes per year.
o Approximately 30 minutes per year.
7. Why do IoT devices pose a greater risk than other computing devices on a network?
o Most IoT devices do not require an Internet connection and are unable to receive new
updates.
o IoT devices cannot function on an isolated network with only an Internet connection.
o Most IoT devices do not receive frequent firmware updates.
o IoT devices require unencrypted wireless connections.
8. Which two services are provided by security operations centers? (Choose two.)
o managing comprehensive threat solutions
o ensuring secure routing packet exchanges
o responding to data center physical break-ins
o monitoring network security threats

Página 1 de 3
o providing secure Internet connections
9. What name is given to hackers who hack for a political or social cause?
o White hat
o Hacker
o Hacktivist *
o Blue hat
10. The term Alert Analyst refers to which group of personnel in an SOC?
o Tier 1 personnel *
o Tier 2 personnel
o Tier 3 personnel
o SOC managers
11. What is a rogue wireless hotspot?
o It is a hotspot that was set up with outdated devices.
o It is a hotspot that does not encrypt network user traffic.
o It is a hotspot that does not implement strong user authentication mechanisms.
o It is a hotspot that appears to be from a legitimate business but was actually set up
by someone without the permission from the business. *
12. What is a potential risk when using a free and open wireless hotspot in a public location?
o Too many users trying to connect to the Internet may cause a network traffic jam.
o The Internet connection can become too slow when many users access the wireless
hotspot.
o Network traffic might be hijacked and information stolen.
o Purchase of products from vendors might be required in exchange for the Internet access.
13. How does a security information and event management system (SIEM) in a SOC help the
personnel fight against security threats?
o by integrating all security devices and appliances in an organization
o by analyzing logging data in real time
o by combining data from multiple technologies
o by dynamically implementing firewall rules
14. Users report that a database file on the main server cannot be accessed. A database
administrator verifies the issue and notices that the database file is now encrypted. The
organization receives a threatening email demanding payment for the decryption of the
database file. What type of attack has the organization experienced?
o man-in-the-middle attack
o DoS attack
o ransomware
o Trojan horse
15. Which organization offers the vendor-neutral CySA+ certification?
o IEEE
o CompTIA
o (ISC)²
o GIAC
16. What was used as a cyberwarfare weapon to attack a uranium enrichment facility in Iran?
o DDoS
o SQL injection
o PSYOPS
o Stuxnet

Página 2 de 3
17. Which three technologies should be included in a SOC security information and event
management system? (Choose three.)
o firewall appliance
o security monitoring
o log management
o intrusion prevention
o proxy service
o threat intelligence
18. Which personnel in a SOC is assigned the task of verifying whether an alert triggered by
monitoring software represents a true security incident?
o SOC Manager
o Tier 2 personnel
o Tier 3 personnel
o Tier 1 personnel
19. What name is given to an amateur hacker?
o red hat
o script kiddie
o black hat
o blue team
20. Which personnel in a SOC are assigned the task of hunting for potential threats and
implementing threat detection tools?
o Tier 1 Analyst
o SOC Manager
o Tier 2 Incident Reporter
o Tier 3 SME
21. Match the components to the major categories in a SOC.
Question:

Answer:

Página 3 de 3

You might also like