Answers Complete
Which is not a top-three wish for Security Operations Engineers?
Reduce the number of alerts flowing into the SOC
Access tools to quickly investigate threats
Lessen the time required to take to contain a breach
Use previous incidents to prevent future attacks
Use previous incidents to prevent future attacks
Which element of the People pillar focuses on retaining staff members?
Employee Utilization
Training
Career Path Progression
Tabletop Exercises
Career Path Progression
Which element provides investigative support if legal action is required?
Governance, Risk and Compliance
Forensics and Telemetry
Business Liaison
Enterprise Architecture
Forensics and Telemetry
Which business objective dictates how to measure "performance" against the defined
and socialized mission statement?
Mission
Governance
Planning
Budget
Governance
Which pillar defines the step-by-step instructions and functions that will be carried out?
Processes
Interfaces
People
Business
Visibility
Technology
Processes
Which element of the Processes pillar is rooted in revisiting prior incidents?
Tuning
Process Improvement
, Capability Improvement
Quality Review
Capability Improvement
Which element is a collaborative toolset used to document, track, and notify the entire
organization of security incidents?
Knowledge Management
Case Management
Asset Management
Vulnerability Management Tools
Case Management
Which team is responsible for understanding, developing, and maintaining both the
physical and virtual network design?
SOC Engineering
Enterprise Architecture
IT Operations
Network Security
Enterprise Architecture
Which pillar requires maintaining an SME specialist?
Processes
Interfaces
People
Business
Visibility
Technology
Technology
Which element is a tool to assist organizations in aggregating, correlating, and
analyzing threat data from multiple sources?
Case Management
Knowledge Management
Threat Intelligence Platform
Vulnerability Management Tools
Threat Intelligence Platform
How is SOAR different from SIEM?
It monitors various sources for machine data
It provides real-time detection
It ingests alerts and drives them to response
It monitors alerts generated by applications and network hardware
It ingests alerts and drives them to response
How often should tabletop exercises be performed?
Once a month