Question 1: How did SIEM evolve?
- As an information platform only
- From an information platform to a threat intelligence center
- From an information platform to a fully integrated and automated center for security and network operations
- As a threat intelligence center only
Question 2: Which three regulatory standards and acts must businesses, hospitals, and other organizations comply with? (Choose three.)
- HIPAA
- PCI
- SPML
- XSLT
- GDPR
Question 3: Which three problems does SIEM solve? (Choose three.)
- The complexity of technology and the difficulty with identifying attacks
- The lack of implementation of authentication methods
- The lack of security awareness by employees
- The long delay in discovering security breaches by security teams
- More sophisticated and stealthy cyber attacks
Question 4: Which two requirements led to the development of SIEM? (Choose two.)
- To perform vulnerability scanning
- To measure and prove compliance to various legislations
- To contend with the flood of alerts issued from IPSs and IDSs
- To simulate phishing attacks
Question 5: What does the term SIEM stand for?
- Security Information and Email Management
- Security Information and Electronic Messaging
- Security Information and Emergency Management
- Security Information and Event Manager
Question 6: Which three tasks must technology perform to satisfy network security compliance requirements? (Choose three.)
- Monitor, correlate, and notify events in real-time
- Aggregate logs from many network sources
- Prevent employees from accessing the internet
- Store log data for a length of time that satisfies auditing requirements
- Allow public access to aggregated logs
Question 7: What does SIEM do primarily?
Select one:
- Collect, normalize, and store log events and alerts
- Connect all security tools together into defined workflows
- Manage network events and alerts/
- Manage network information and alerts/
Question 8: What was the impetus for more automation and machine learning in later SIEM devices?
Select one:
- Requirement to manage Big Data
- Shortage of trained personnel
- Need to improve MIS efficiency
- Demand to reduce MIS costs
Question 9: Which two requirements were the motivation for SIEM? (Choose two.)
Select one or more:
- Complying to regulations*
- Exploiting Big Data
- Remaining competitive
- Increasing number of alerts*
Question 10: Which feature is a characteristic of later SIEMs?
Select one:
- Automatic backups and integrity checking/
- Collect, normalize, and store log events and alerts/
- User and entity behavior analytics (UEBA)
- Deciphering encrypted data flows
Question 11: Which compliance, if ignored by businesses, hospitals, and other organizations, can result in punitive fines?
Select one:
- Complying to regulations
- Complying to User and entity behavior analytics (UEBA)
- Complying to machine learning checks
- Complying to automatic backups and integrity checks
Question 12: What was the primary driver for purchasing SIEM?
Select one:
- Collect information about customers
- Comply with regulations
- Improve MIS efficiency
- Compensate for the skills-gap labor shortage
Question 13: What is one method that SIEM uses to analyze data?
Select one:
- Decipher encrypted logs and alerts
- Apply security controls
- Decipher encrypted data flows
- Watch for known indicators of compromise (IoC)
Question 14: Which feature provides SIEM greater visibility into the entire network?
Select one:
- Complying with regulations
- Sharing of logs by IoTs and BYODs
- Deciphering encrypted logs and alerts
- Analyzing logs and alerts from a single-pane-of-glass
Question 15: Which problem was a barrier to the general acceptance of first-generation SIEM?
Select one:
- Cost to purchase was prohibitive/
- High-level of skill was required
- The point solution approach to network security/
- Did not have the features needed by organizations
Question 16: Which three compliance regulations are legislative and industry-sponsored? (Choose three.)
Select one or more:
- Payment Industry Card (PIC) standard/
- Health Portability Insurance and Accountability Act (HPIAA)/
- Payment Card Industry (PCI) standard
- General Data Protection Regulation (GDPR)
- Health Insurance Portability and Accountability Act (HIPAA)
Question 17: What is one method that SIEM uses to analyze data?
Select one:
- Decipher encrypted data flows/
- Apply security controls
- Decipher encrypted logs and alerts
- Watch for known indicators of compromise (IoC)
Question 18: What was the primary driver for purchasing SIEM?
Select one:
- Compensate for the skills-gap labor shortage
- Comply with regulations
- Improve MIS efficiency
- Collect information about customers
Question 19: What is one method that SIEM uses to analyze data?
Select one:
- Decipher encrypted logs and alerts
- Apply security controls/
- Decipher encrypted data flows
- Watch for known indicators of compromise (IoC)