Questions
The following is a short list of review questions to help reinforce your learning and help you identify areas that may require improvement. The answers to the questions can be found in the Assessments section at the end of this book:
- Which of the following SOCs focuses on reducing threats by monitoring the security posture of clients' networks by ensuring that compliance is met on systems and networks?
A) Threat-centric SOC
B) Internal SOC
C) Compliance-based SOC
D) Operation-based SOC
- Which tier of an SOC usually handles incident response?
A) Tier 1
B) Tier 2
C) Tier 3
D) All of the above
- Which of the following tools allows a security professional to detect, analyze, and control network-based applications?
A) Application Visibility and Control (AVC)
B) Next-Generation Network-Based Application Recognition (NBAR2)
C) tcpdump
D) NetFlow
- Which type of IPS event best describes logs that are generated when a security incident occurs?
A) Connection event
B) Host and...