Security Administration Module 1 and 2 Quiz
What is the dark web?
It is part of the internet that can only be accessed with special software.
An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?
rogue access point
What type of cyberwarfare weapon was Stuxnet?
worm
which regulatory law regulates the identification, storage, and transmission of patient personal healthcare information?
HIPAA
A worker in the records department of a hospital accidentally sends a medical record of a patient to a printer in another department. When the worker arrives at the printer, the patient record printout is missing. What breach of confidentiality does this situation describe?
PHI
An SOC is searching for a professional to fill a job opening. The employee must have expert-level skills in networking, endpoint, threat intelligence, and malware reverse engineering in order to search for cyber threats hidden within the network. Which job within an SOC requires a professional with those skills?
Threat Hunter
Which KPI metric does SOAR use to measure the time required to stop the spread of malware in the network?
Time to Control
How does a security information and event management system (SIEM) in a SOC help the personnel fight against security threats?
by combining data from multiple technologies
When a user turns on the PC on Wednesday, the PC displays a message indicating that all of the user files have been locked. In order to get the files unencrypted, the user is supposed to send an email and include a specific ID in the email title. The message also includes ways to buy and submit bitcoins as payment for the file decryption. After inspecting the message, the technician suspects a security breach occurred. What type of malware could be responsible?
ransomware
Which three are major categories of elements in a security operations center? (Choose three.)
technologies processes people