CH01
SIEM Essentials Quiz
SIEM Essentials Quiz
Read MoreAre you ready to show off your SIEM knowledge? These 25 essential questions will test just how well you know network security.
Question 1 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 2: SIEM Architecture
Question 2 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 3: Events and Logs
Question 3 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 6: SIEM Analytics
Question 4 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 6: SIEM Analytics
Question 5 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 7: Incident Response and Automation
Question 6 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 7: Incident Response and Automation
Question 7 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 8: The SOC, SecOps and SIEM
Question 8 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 8: The SOC, SecOps and SIEM
Question 9 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 9: SIEM Buyer's Guide
Question 10 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 1: What is SIEM?
Question 11 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 1: What is SIEM?
Question 12 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 2: SIEM Architecture
Question 13 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 2: SIEM Architecture
Question 14 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 2: SIEM Architecture
Question 15 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 3: Events and Logs
Question 16 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 4: UEBA
Question 17 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 4: UEBA
Question 18 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 5: SIEM Use Cases
Question 19 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 5: SIEM Use Cases
Question 20 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 6: SIEM Analytics
Question 21 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 8: The SOC, SecOps and SIEM
Question 22 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 8: The SOC, SecOps and SIEM
Question 23 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 9: SIEM Buyer’s Guide
Question 24 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 8: The SOC, SecOps and SIEM
Question 25 of 25
Congratulations, your answer is correct. Unfortunately, this answer is wrong. To learn more check: Chapter 3: Events and Logs
Q3
Which of the following best describes "a field that uses statistical techniques to allow machines to learn without being explicitly programmed"?
Q5
What is the term for "machine-driven execution of actions on security tools and IT systems, as part of a response to an incident"?
Q6
What is the metric used in SOCs that measures how long compromises, on average, have been present?
Q9
Which security technology takes user behavior into account when making determinations?
Q13
Allowing for headroom and growth, what percentage over expected events per second (EPS) capacity is recommended by SANS?
Q15
Merging events containing different data into a reduced format which contains common event attributes is called?
Q16
The process of creating profiles that model standard behavior for users and entities in an IT environment is called?
Q20
Unsupervised machine learning is best suited to understanding whether observed behavior is good or bad.
Q21
Implementing a SecOps process where the security team is engaged earlier by engaging with IT operations is referred to as
CH01
SIEM Essentials Quiz
Read MoreCH02
Evaluation criteria, build vs. buy, cost considerations and compliance
Read MoreCH03
SIEM under the hood - the anatomy of security events and system logs
Read MoreCH04
User and Entity Behavioral Analytics detects threats other tools can’t see
Read MoreCH05
A comprehensive guide to the modern SOC - SecOps and next-gen tech
Read MoreCH06
From correlation rules and attack signatures to automated detection via machine learning
Read MoreCH07
Beyond alerting and compliance - SIEMs for insider threats, threat hunting and IoT
Read MoreCH08
Security Automation and Orchestration (SOAR) - the future of incident response
Read MoreCH09
How SIEMs are built, how they generate insights, and how they are changing
Read MoreCH10
Components, best practices, and next-gen capabilities
Read More