0%

What is the primary purpose of security monitoring?

Correct! Wrong!

Security monitoring helps detect suspicious activities, policy violations, and potential threats in real time.

Which tool is commonly used for network intrusion detection?

Correct! Wrong!

Intrusion detection systems (IDS) like Snort analyze network traffic for known attack signatures.

Why is log analysis important for incident detection?

Correct! Wrong!

Logs provide a historical record of events that help identify anomalies or breaches.

What is a SIEM system used for?

Correct! Wrong!

Security Information and Event Management (SIEM) systems collect and analyze security data across an organization.

Which type of alert indicates a true security incident?

Correct! Wrong!

A true positive is an alert that correctly identifies a real security threat.

Which protocol is commonly used for transmitting log messages?

Correct! Wrong!

Syslog is widely used to send log or event messages to a central server.

Loading Questions...

What is the function of anomaly-based detection?

Correct! Wrong!

Anomaly-based detection flags activities that deviate from the normal behavior baseline.

Which method helps reduce false positives in monitoring systems?

Correct! Wrong!

Tuning the alert thresholds and baselines can help reduce the number of false alerts.

Why is continuous monitoring important?

Correct! Wrong!

Continuous monitoring provides real-time visibility, allowing for immediate response to threats.