7.3.8 PQ

¡Supera tus tareas y exámenes ahora con Quizwiz!

To optimize the enterprise security information and event management (SIEM) solution, a multinational 's chief information security officer (CISO) is strategizing. The SIEM system acquires data from diverse sources, including Linux and Windows servers, advanced switches, Next Generation Firewalls (NGFWs), and routers. Which feature should the CISO prioritize improving in the SIEM solution to standardize the data and enhance its searchability? -Upgrading the network-based data collection method in the SIEM solution. -Elevating the SIEM solution's threat-hunting capabilities. -Integrating additional intrusion detection systems (IDS) into the network. -Augmenting the log correlation mechanism in the SIEM solution.

Augmenting the log correlation mechanism in the SIEM solution. Explanation: The most relevant improvement is augmenting the log correlation mechanism in the SIEM solution. Log correlation standardizes and makes data from various sources more searchable, directly addressing the CISO's objective. Elevating the threat-hunting capabilities of the SIEM solution is crucial, but it does not directly influence the standardization and searchability of data from diverse sources. Upgrading the network-based data collection method in the SIEM solution is not optimal. While this method assists in data collection, it does not directly address the issue of making data more standardized and searchable. Integrating additional IDS into the network does not resolve the problem. While IDS collects network data, it does not directly contribute to standardization of data from diverse sources.

Which SIEM component is responsible for gathering all event logs from configured devices and securely sending them to the SIEM system? -Security automation -Data handling -Collectors -SIEM alerts

Collectors

A manufacturing company's security manager plans to implement corrective operational controls to mitigate potential security threats. Which of the following instances would be the appropriate control? -A firewall that prevents unauthorized access to the network. -Enabling continuous monitoring to disable abnormal accounts. -Regular penetration testing to uncover potential vulnerabilities. -A security camera system monitoring the premises.

Enabling continuous monitoring to disable abnormal accounts. Explanation: Enabling continuous monitoring to disable abnormal accounts is a corrective operational control. When detecting abnormal behavior, this control disables the account to prevent unauthorized access. Penetration testing is more of a detective control than a corrective one. It identifies vulnerabilities but does not correct them directly. A firewall is primarily a preventive control, not a corrective one. Its main function is to stop unauthorized access before it happens rather than correcting issues after they occur. Security cameras are typically a deterrent and detective type of physical control, not an operational one. They can deter potential intruders and detect security incidents, but they do not correct issues directly.

Which of the following DLP implementations can be used to monitor and control access to physical devices on workstations or servers? -Network DLP -Endpoint DLP -File-level DLP -Cloud DLP

Endpoint DLP Explanation: Endpoint data loss prevention (DLP) runs on end user workstations and servers. Endpoint DLP is also referred to as a Chinese Wall solution. This could be something as simple as restricting the use of USB devices. Many endpoint-based systems also provide application controls to prevent confidential information transmission and also provide some type of immediate feedback to the user. Giving feedback to the user is based on the concept that not all data leakage incidents are malicious. The employee might not realize that the security-policy violation is inappropriate. The intent is to deter the employee from a similar action in the future. The following types of DLP are not designed to monitor and control access to physical devices on workstations or servers: -Network DLP tracks and analyzes the organization's network activity and traffic, across a traditional network and the cloud; this includes monitoring e-mail, messaging and file transfers, to detect when business critical data is being sent in violation of the organization's information security policies. -File-level DLP monitors, detects and blocks sensitive data from leaving an organization. -Cloud DLP is designed to help you discover, classify, and protect your most sensitive data.

A security operations analyst at a financial institution analyzes an incident involving unauthorized transactions. The analyst suspects that a malware infection on one of the endpoints might have led to the unauthorized access. To identify the root cause and trace the activities of the suspected malware, which combination of data sources should the analyst primarily consider? -Endpoint logs, log files generated by the OS components of the affected host computer, and logs from the host-based intrusion detection system. -Logs from applications involved in the transactions, logs generated by the host's antivirus software, and /var/log/auth.log for authentication and authorization data. -Firewall logs, system memory metadata, and automated reports from the SIEM tool. -Network logs, packet captures, and logs generated by network-based vulnerability scanners.

Endpoint logs, log files generated by the OS components of the affected host computer, and logs from the host-based intrusion detection system. Explanation: Endpoint logs and operating system (OS) component log files comprehensively view potential malware activities on the affected end-user system. Network logs, packet captures, and vulnerability scanner logs provide a network-level view but might not cover all system-level and application activities. Firewall logs, system memory metadata, and System Information and Event Management (SIEM) reports provide network and system insights but might not cover all application-level activities. Application logs and antivirus logs give insights into application usage and threats but might not apply to all hosts and could potentially miss network activities.

Which of the following security orchestration, automation, and response (SOAR) system automation components is often used to document the processes and procedures that are to be used by a human during a manual intervention? -Playbook -Orchestration -Runbook -Response

Playbook Explanation: Playbooks are linear checklists of required steps and actions that are to be taken to respond to an alert. While playbooks do support automated actions, they are often used to document the processes and procedures that are to be used by a human during a manual intervention. Runbooks consist of a series of conditional steps to perform actions, such as sending notifications or threat containment. They are not used to document the processes and procedures that are to be used by a human during a manual intervention. The orchestration component of the security orchestration, automation, and response (SOAR) system is responsible for gathering data and information from across the network. This is not used to document the processes and procedures that are to be used by a human during a manual intervention. The response component of a SOAR system allows the system to automatically take actions against threats. It is not used to document the processes and procedures used by a human during a manual intervention.

Which of the following systems is able to respond to low-level security events without human assistance? -IDS -Firewall -SIEM -SOAR

SOAR Explanation: Security orchestration, automation, and response (SOAR) systems gather and analyze data like SIEM systems, but they take the analysis to the next level. SOAR is a solution stack of compatible software programs that allow an organization to collect data about security threats from multiple sources and respond to low-level security events without human assistance. Security information and event management (SIEM) tools work by gathering different types of network information and data. This information is moved to one central place. SIEM systems are great tools that help network administrators filter data and improve security monitoring. Still, all alerts require manual intervention. Intrusion detection systems (IDSs) can trigger alerts, but these systems do not respond to security threats on their own. A firewall blocks traffic based on the configuration setup. However, firewalls do not respond to security threats on their own.

After experiencing a catastrophic server failure in the headquarters building, what can the company use to monitor notable events such as port failure, chassis overheating, power failure, or excessive central processing unit (CPU) utilization? -Security content automation protocol -Antivirus (A-V) -Simple network management protocol (SNMP) trap -Data loss prevention

Simple network management protocol (SNMP) trap Explanation: A Simple Network Management Protocol (SNMP) trap informs the management system of a notable event such as port failure, chassis overheating, power failure, or excessive central processing unit (CPU) utilization. Data loss prevention (DLP) mediates the copying of tagged data to restrict it to authorized media and services and monitors statistics for policy violations. Antivirus (A-V) software detects and removes infections and (in most cases) other types of malware, such as worms, Trojans, rootkits, adware, spyware, password crackers, network mappers, and denial of service (DoS) tools. Security content automation protocol (SCAP) allows compatible scanners to determine whether a computer meets a configuration baseline.

A network administrator at a large tech company has the task of enhancing the visibility into network traffic patterns in a distributed enterprise network. The administrator wants to implement a solution that captures metadata and statistics about network traffic without recording each frame, with the goal of improving the company's security measures. Which tool should the administrator consider implementing? -A NetFlow collector -A data loss prevention -A simple network management protocol (SNMP) trap -A vulnerability scanner

A NetFlow collector Explanation: A NetFlow collector is the best solution. The NetFlow protocol collects and records metadata and statistics about network traffic, providing administrators with insights into traffic patterns. A vulnerability scanner identifies security weaknesses in the network but does not capture metadata and statistics about network traffic. A Simple Network Management Protocol (SNMP) trap alerts administrators of notable events in network devices in real time but does not capture metadata and statistics about network traffic. A data loss prevention (DLP) system prevents data breaches by detecting potential data exfiltration transmissions but does not capture metadata and network traffic statistics.

A security analyst is optimizing a multinational company's security information and event management (SIEM) system. The system collects security event data from sources globally, and the analyst has noticed inconsistencies due to different time zones. What should the analyst consider to ensure a consistent timeline across all logs for accurate event correlation? -Implementing additional packet sniffers to collect network data uniformly. -Configuring the SIEM system to only collect data during the company's standard business hours. -Installing agents on all data sources to ensure synchronization with the SIEM server's time zone. -Adjusting the log aggregation process in the SIEM system to normalize date/time zone differences.

Adjusting the log aggregation process in the SIEM system to normalize date/time zone differences. Explanation: Adjusting the log aggregation process in the SIEM system to normalize date/time zone differences is necessary. Normalizing date/time zone differences to a single timeline is an important function of the log aggregation process in a SIEM system. Configuring the SIEM system to collect data only during business hours will not fix time zone inconsistencies and may cause the company to miss important security events. Implementing additional packet sniffers to collect network data uniformly does not address the problem of time zone inconsistencies. Packet sniffers collect network data. Installing agents on data sources for synchronization with the SIEM server's time zone does not fix the issue, as agents do not handle date/time zone normalization


Conjuntos de estudio relacionados

Disinfectant - Hydrogen Peroxide

View Set

Chapter 39: Normal Anatomy and Physiology of the Female Pelvis

View Set

M.23-1: Dynamic Study Module Alzheimer Disease

View Set

Chapter 14: Environmental Health and Safety

View Set

Nationalist Diplomacy History Test

View Set

Crash Course: Social Interaction & Performance

View Set

atomai, izotopai, ryšiai, periodinė lentelė

View Set

Kelso's NCLEX Question Rationales

View Set