Quiz Summary
0 of 18 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 18 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 18
1. Question
Which of the following lists the seven processes in the CompTIA incident response lifecycle?
CorrectIncorrect -
Question 2 of 18
2. Question
True or False: The “first responder” is the first person to report an incident to the Computer Incident Response Team (CIRT).
CorrectIncorrect -
Question 3 of 18
3. Question
True or False: All security alerts should be sent to every employee to maintain transparency.
CorrectIncorrect -
Question 4 of 18
4. Question
Why is an out-of-band communication method important for incident responders?
CorrectIncorrect -
Question 5 of 18
5. Question
Which type of incident response exercise best simulates a real intrusion scenario?
CorrectIncorrect -
Question 6 of 18
6. Question
What does it mean when digital evidence is described as “latent”?
CorrectIncorrect -
Question 7 of 18
7. Question
Which process must be followed when transferring digital evidence to another team?
CorrectIncorrect -
Question 8 of 18
8. Question
True or False: To ensure evidence integrity, you should hash the media before making an image copy.
CorrectIncorrect -
Question 9 of 18
9. Question
If the ARP cache contains critical evidence, should you shut down the PC before imaging the hard drive?
CorrectIncorrect -
Question 10 of 18
10. Question
Which type of log should be included in addition to firewall, application, OS security, IPS/IDS, and network logs?
CorrectIncorrect -
Question 11 of 18
11. Question
What is the primary use of a security dashboard?
CorrectIncorrect -
Question 12 of 18
12. Question
True or False: File system audit settings cannot be customized in security logging.
CorrectIncorrect -
Question 13 of 18
13. Question
Which data source allows frame-by-frame analysis of events that triggered an IDS alert?
CorrectIncorrect -
Question 14 of 18
14. Question
What is the primary function of a SIEM?
CorrectIncorrect -
Question 15 of 18
15. Question
In SIEM architecture, what is the difference between a collector and a sensor?
CorrectIncorrect -
Question 16 of 18
16. Question
Why is a parser necessary for logs from a UTM gateway in a SIEM?
CorrectIncorrect -
Question 17 of 18
17. Question
Which activity should be added to log aggregation, alerting, scanning, reporting, and response to align with Security+ objectives?
CorrectIncorrect -
Question 18 of 18
18. Question
Which monitoring tool generates flow records for network analysis?
CorrectIncorrect