Module 7 Virtual Lab | ITE-249-02
4. Which of the following is achieved by Security Orchestration, Automation, Response (SOAR)? Availability Confidentiality Automation Integrity
Automation
3. Which of the following is used for continuous monitoring of logs? Firewall User Behavior Analysis (UBA) Intrusion Detection Systems (IDS) Security information and event management (SIEM)
Security information and event management (SIEM)
5. A root CA should always be kept online. [TRUE/FALSE] TRUE FALSE
FALSE
2. Which of the following is a condition that is shown as a result when it does not exist? True Positive False Negative Negative Negative False Positive
False Positive
2. Before a user requests a certificate from a CA, which of the following tasks must be completed? Sign the Certificate Signing Request (CSR) with a public key Complete the information for CSR Embed the public key into the certificate Generate private and public keys
Generate private and public keys
5. Which of the following type of vulnerability scan can also attempt to exploit the vulnerabilities? Intrusive Non-credentialed Non-intrusive Credentialed
Intrusive
7.1: 1. Which of the following method of threat hunting includes disrupt, deny, destroy, and degrade actions? Security Advisory Threat Feeds Intelligence Fusion Maneuvering
Maneuvering
4. Which type of certificate file format contains private and public keys and is protected by a password? Personal information exchange (PFX) Privacy enhanced mail (PEM) P12 .cer
Personal information exchange (PFX)
7.2: 1. Which of the following entity in the certificate authority (CA) hierarchy validates the certificate request from a client? Intermediate CA Root CA Leaf CA Registration Authority (RA)
Registration Authority (RA)
3. Which of the following certificates should you use with a Web server for testing purposes? Code Signing Self-Signed Wildcard Subject Alternative Name (SAN)
Self-Signed