1. What is the primary purpose of a Security Operations Center (SOC)?
• A) To conduct employee training
• B) To monitor, detect, and respond to security incidents
• C) To develop new software applications
• Answer: B) To monitor, detect, and respond to security incidents
• Explanation: A SOC is designed to provide real-time analysis and response to security events
within an organization.
2. Which of the following best describes an Incident Response Plan (IRP)?
• A) A comprehensive guide to creating security policies
• B) A document that outlines the processes to follow when responding to a security incident
• C) A plan for conducting regular employee training
• Answer: B) A document that outlines the processes to follow when responding to a security
incident
• Explanation: An IRP details the procedures to effectively manage and respond to security
incidents, aiming to minimize damage.
3. What is the purpose of a security information and event management (SIEM)
system?
• A) To store user passwords securely
• B) To provide centralized logging and analysis of security events
• C) To manage software licensing
• Answer: B) To provide centralized logging and analysis of security events
• Explanation: SIEM systems aggregate and analyze log data from various sources to identify
potential security threats.
4. Which type of attack involves overwhelming a target with excessive traffic?
• A) Man-in-the-Middle (MitM)
• B) Distributed Denial of Service (DDoS)
• C) SQL Injection
• Answer: B) Distributed Denial of Service (DDoS)
• Explanation: A DDoS attack aims to make a service unavailable by flooding it with a high volume
of traffic from multiple sources.
5. What does "data leakage" refer to?
• A) The intentional sharing of sensitive information
• B) The unintentional release of confidential data to unauthorized individuals
• C) The process of encrypting data
, • Answer: B) The unintentional release of confidential data to unauthorized individuals
• Explanation: Data leakage involves the accidental exposure of sensitive information, which can
occur through various means, such as misconfigured systems.
6. What is the primary focus of a penetration test?
• A) To improve employee productivity
• B) To identify vulnerabilities in a system by simulating an attack
• C) To create a backup of data
• Answer: B) To identify vulnerabilities in a system by simulating an attack
• Explanation: Penetration testing involves simulating real-world attacks to assess the security
posture and identify weaknesses.
7. Which of the following is a characteristic of a vulnerability assessment?
• A) It exploits identified vulnerabilities
• B) It is conducted regularly to find weaknesses
• C) It only focuses on hardware vulnerabilities
• Answer: B) It is conducted regularly to find weaknesses
• Explanation: Vulnerability assessments systematically identify and evaluate security weaknesses
in an organization's systems.
8. What role does "network segmentation" play in security?
• A) It increases the speed of network traffic
• B) It separates different parts of a network to enhance security
• C) It eliminates the need for firewalls
• Answer: B) It separates different parts of a network to enhance security
• Explanation: Network segmentation helps limit access and control traffic, reducing the overall
attack surface of an organization.
9. What is a primary objective of security awareness training?
• A) To ensure compliance with regulations
• B) To educate employees about security risks and best practices
• C) To increase software efficiency
• Answer: B) To educate employees about security risks and best practices
• Explanation: Security awareness training equips employees with the knowledge to recognize
and respond to potential security threats.
10. Which of the following is a sign of a potential security breach?
• A) Regular software updates
• B) Unusual outbound network traffic
• C) Strong password policies
• Answer: B) Unusual outbound network traffic