Questions
The following is a short list of review questions to help reinforce your learning and help you identify areas that require some improvement. The answers to the questions can be found in the Assessment chapter at the end of this book:
- Which of the following devices can you obtain artifacts from to identify an intrusion?
A. Firewalls
B. IPS
C. The SIEM platform
D. All of the above
- Which of the following regexes allows you to show data containing either the word
system
orlog
?A.
.system|log
B.
system|log
C.
/system|log
D. None of the above
- Which of the following standards are used in IT asset management?
A. ISO 27001
B. NIST SP 800-53
C. NIST SP 1800-5
D. NIST SP 456-16
- Which component can be installed on a mobile device to track and manage it?
A. IP address
B. MDM
C. MAC address
D. All of the above
- Which of the following standards defines patch management technologies within an enterprise?
A. NIST SP 800-40
B. NIST SP 800-53
C. NIST SP 1800-5
D. NIST SP 456-16