Home Fortinet Security Information & Event Management Quiz Answer NSE 2 Information Security Awareness...

Security Information & Event Management Quiz Answer NSE 2 Information Security Awareness Fortinet

0

Question 1: How did SIEM evolve?

  • As an information platform only
  • From an information platform to a threat intelligence center
  • From an information platform to a fully integrated and automated center for security and network operations
  • As a threat intelligence center only

Question 2: Which three regulatory standards and acts must businesses, hospitals, and other organizations comply with? (Choose three.)

  • HIPAA
  • PCI
  • SPML
  • XSLT
  • GDPR

Question 3: Which three problems does SIEM solve? (Choose three.)

  • The complexity of technology and the difficulty with identifying attacks
  • The lack of implementation of authentication methods
  • The lack of security awareness by employees
  • The long delay in discovering security breaches by security teams
  • More sophisticated and stealthy cyber attacks

Question 4: Which two requirements led to the development of SIEM? (Choose two.)

  • To perform vulnerability scanning
  • To measure and prove compliance to various legislations
  • To contend with the flood of alerts issued from IPSs and IDSs
  • To simulate phishing attacks

Question 5: What does the term SIEM stand for?

  • Security Information and Email Management
  • Security Information and Electronic Messaging
  • Security Information and Emergency Management
  • Security Information and Event Manager

Question 6: Which three tasks must technology perform to satisfy network security compliance requirements? (Choose three.)

  • Monitor, correlate, and notify events in real-time
  • Aggregate logs from many network sources
  • Prevent employees from accessing the internet
  • Store log data for a length of time that satisfies auditing requirements
  • Allow public access to aggregated logs

Question 7:What does SIEM do primarily?

Select one:

  • Collect, normalize, and store log events and alerts
  • Connect all security tools together into defined workflows
  • Manage network events and alerts/
  • Manage network information and alerts/

Question 8 :What was the impetus for more automation and machine learning in later SIEM devices?

Select one:

  • Requirement to manage Big Data
  • Shortage of trained personnel
  • Need to improve MIS efficiency
  • Demand to reduce MIS costs

Question 9 :Which two requirements were the motivation for SIEM? (Choose two.)

Select one or more:

  • Complying to regulations*
  • Exploiting Big Data
  • Remaining competitive
  • Increasing number of alerts*

Question 10: Which feature is a characteristic of later SIEMs?

Select one:

  • Automatic backups and integrity checking/
  • Collect, normalize, and store log events and alerts/
  • User and entity behavior analytics (UEBA)
  • Deciphering encrypted data flows

Question 11: Which compliance, if ignored by businesses, hospitals, and other organizations, can result in punitive fines?

Select one:

  • Complying to regulations
  • Complying to User and entity behavior analytics (UEBA)
  • Complying to machine learning checks
  • Complying to automatic backups and integrity checks

Question 12 :What was the primary driver for purchasing SIEM?

Select one:

  • Collect information about customers
  • Comply with regulations
  • Improve MIS efficiency
  • Compensate for the skills-gap labor shortage

Question 13 :What is one method that SIEM uses to analyze data?

Select one:

  • Decipher encrypted logs and alerts
  • Apply security controls
  • Decipher encrypted data flows
  • Watch for known indicators of compromise (IoC)

Question 14 :Which feature provides SIEM greater visibility into the entire network?

Select one:

  • Complying with regulations
  • Sharing of logs by IoTs and BYODs
  • Deciphering encrypted logs and alerts
  • Analyzing logs and alerts from a single-pane-of-glass

Question 15 :Which problem was a barrier to the general acceptance of first-generation SIEM?

Select one:

  • Cost to purchase was prohibitive/
  • High-level of skill was required
  • The point solution approach to network security/
  • Did not have the features needed by organizations

Question 16 :Which three compliance regulations are legislative and industry-sponsored? (Choose three.)

Select one or more:

  • Payment Industry Card (PIC) standard/
  • Health Portability Insurance and Accountability Act (HPIAA)/
  • Payment Card Industry (PCI) standard
  • General Data Protection Regulation (GDPR)
  • Health Insurance Portability and Accountability Act (HIPAA)

Question 17 :What is one method that SIEM uses to analyze data?

Select one:

  • Decipher encrypted data flows/
  • Apply security controls
  • Decipher encrypted logs and alerts
  • Watch for known indicators of compromise (IoC)

Question 18 :What was the primary driver for purchasing SIEM?

Select one:

  • Compensate for the skills-gap labor shortage
  • Comply with regulations
  • Improve MIS efficiency
  • Collect information about customers

Question 19 :What is one method that SIEM uses to analyze data?

Select one:

  • Decipher encrypted logs and alerts
  • Apply security controls/
  • Decipher encrypted data flows
  • Watch for known indicators of compromise (IoC)

LEAVE A REPLY

Please enter your comment!
Please enter your name here