WITH CORRECT ACTUAL QUESTIONS AND
CORRECTLY WELL DEFINED ANSWERS
LATEST ALREADY GRADED A+
Security Blue Team Level 1 (BTL1) Practice Exam (Questions
1–50)
Q1. What is the primary goal of a Security Operations
Center (SOC)?
A. Develop software applications
✔ B. Monitor and respond to security incidents
C. Manage HR policies
D. Design network hardware
Answer: ✔ B
Explanation:
,A SOC is responsible for continuously monitoring, detecting,
analyzing, and responding to cybersecurity incidents within
an organization.
Q2. Which log type is MOST useful for detecting
unauthorized login attempts?
A. Application logs
✔ B. Authentication logs
C. DNS logs
D. Firewall logs
Answer: ✔ B
Explanation:
Authentication logs track login attempts, including failed
and successful logins, making them essential for detecting
brute force attacks.
Q3. What does SIEM stand for?
A. Security Incident Event Management
,✔ B. Security Information and Event Management
C. System Integrated Event Monitoring
D. Secure Internal Event Module
Answer: ✔ B
Explanation:
SIEM tools collect and analyze security events from multiple
sources in real time.
Q4. Which protocol is commonly used for secure remote
login?
A. Telnet
✔ B. SSH
C. FTP
D. HTTP
Answer: ✔ B
Explanation:
, SSH encrypts communication between client and server,
unlike Telnet which is unencrypted.
Q5. What is phishing primarily used for?
A. Network scanning
✔ B. Stealing user credentials
C. Encrypting files
D. Patching systems
Answer: ✔ B
Explanation:
Phishing is a social engineering attack designed to trick
users into revealing sensitive information.
Q6. What is the purpose of a firewall?
A. Store data backups
✔ B. Filter network traffic
C. Encrypt emails