Play It Safe: Manage Security Risks Weekly challenge 3 Quiz Answers
In this article i am gone to share Coursera Course: Play It Safe: Manage Security Risks | Weekly challenge 3 Quiz Answers with you..
Course Link: Play It Safe: Manage Security Risks
Also Visit: Play It Safe: Manage Security Risks Weekly challenge 2 Quiz Answers
Play It Safe: Manage Security Risks Weekly challenge 3 Quiz Answers
Question 1)
Which of the following statements correctly describe logs? Select three answers.
- SIEM tools rely on logs to monitor systems and detect security threats.
- A record of events related to employee logins and username requests is part of a server log.
- Actions such as username requests are recorded in a network log.
- A record of connections between devices and services on a network is part of a network log.
Question 2)
What are some of the key benefits of SIEM tools? Select three answers.
- Automatic customization to changing security needs
- Minimize the number of logs to be manually reviewed
- Increase efficiency
- Deliver automated alerts
Question 3)
Fill in the blank: A security professional creates a dashboard that displays technical attributes about business operations called ______, such as incoming and outgoing network traffic.
- metrics
- averages
- logs
- SIEM tools
Question 4)
A security team chooses to implement a SIEM tool that they will install, operate, and maintain using their own physical infrastructure. What type of tool are they using?
- Cloud-hosted
- Hybrid
- Self-hosted
- Log-hosted
Question 5)
You are a security professional, and you want to save time by using a SIEM tool that will be managed by a provider and only be accessible through the internet. What type of tool do you choose?
- Hybrid
- Cloud-hosted
- Self-hosted
- IT-hosted
Question 6)
Fill in the blank: SIEM tools are used to search, analyze, and _____ an organization’s log data to provide security information and alerts in real-time.
- separate
- retain
- release
- modify
Question 7)
Which tool provides a comprehensive, visual summary of security-related data, including metrics?
- Playbook
- network protocol analyzer (packet sniffer)
- Command-line interface
- SIEM
Question 8)
Fill in the blank: _____ tools are often free to use.
- Proprietary
- Command-line
- Cloud-hosted
- Open-source
Question 9)
Which of the following statements correctly describe logs? Select three answers.
- A network log is a record of all computers and devices that enter and leave a network.
- Actions such as using a username or password are recorded in a firewall log.
- Events related to websites, emails, or file shares are recorded in a server log.
- A log is a record of events that occur within an organization’s systems and networks.
Question 10)
What are some of the key benefits of SIEM tools? Select three answers.
- Provide visibility
- Store all log data in a centralized location
- Monitor critical activities in an organization
- Automatic updates customized to new threats and vulnerabilities
Question 11)
Fill in the blank: To assess the performance of a software application, security professionals use _____, including response time, availability, and failure rate.
- SIEM tools
- metrics
- dashboards
- logs
Question 12)
You are a security professional, and you want a SIEM tool that will require both on-site infrastructure and internet-based solutions. What type of tool do you choose?
- Self-hosted
- Cloud-hosted
- Component-hosted
- Hybrid
Question 13)
Fill in the blank: SIEM tools retain, analyze, and search an organization’s _____ to provide security information and alerts.
- hardware
- cloud applications
- database
- log data
Question 14)
A security analyst receives an alert about hundreds of login attempts from unusual geographic locations within the last few minutes. What can the analyst use to review a timeline of the login attempts, locations, and time of activity?
- A network protocol analyzer (packet sniffer)
- A SIEM tool dashboard
- A playbook
- An operating system
Question 15)
Which type of tool typically requires users to pay for usage?
- Open-source
- Cloud native
- Proprietary
- Self-hosted
Question 16)
Fill in the blank: Software application _____ are technical attributes, such as response time, availability, and failure rate.
- metrics
- dashboards
- logs
- SIEM tools
Question 17)
A security team chooses to implement a SIEM tool that will be managed and maintained by the organization’s IT department, rather than a third-party vendor. What type of tool are they using?
- Self-hosted
- Department-hosted
- Cloud-hosted
- Hybrid
Question 18)
You are a security analyst, and you want a security solution that will be fully maintained and managed by your SIEM tool provider. What type of tool do you choose?
- Cloud-hosted
- Hybrid
- Solution-hosted
- Self-hosted
Question 19)
After receiving an alert about a suspicious login attempt, a security analyst can access their _____ to gather information about the alert.
- internal infrastructure
- playbook
- SIEM tool dashboard
- network protocol analyzer (packet sniffer)
Question 20)
Fill in the blank: The wide exposure and immediate access to the source code of open-source tools makes it _____ likely that issues will occur.
- very
- more
- equally
- less
Question 1)
Which of the following statements correctly describe logs? Select three answers.
- Security teams monitor logs to identify vulnerabilities and potential data breaches.
- Outbound requests to the internet from within a network are recorded in a firewall log.
- Actions such as login requests are recorded in a server log.
- Connections between devices and services on a network are recorded in a firewall log.
Question 6)
Fill in the blank: _____ are used to retain, analyze, and search an organization’s log data to provide security information and alerts in real-time.
- SIEM tools
- Playbooks
- network protocol analyzers (packet sniffers)
- Operating systems
Question 4)
A security team installs a SIEM tool within their company’s own infrastructure to keep private data on internal servers. What type of tool are they using?
- Self-hosted
- Hybrid
- Infrastructure-hosted
- Cloud-hosted
Question 2)
What are some of the key benefits of SIEM tools? Select three answers.
- Eliminate the need for manual review of logs
- Collect log data from different sources
- Provide event monitoring and analysis
- Save time