Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

FedVTE ENTERPRISE CYBERSECURITY OPERATIONS

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
12-10-2024
Written in
2024/2025

FedVTE ENTERPRISE CYBERSECURITY OPERATIONS

Institution
Course

Content preview

FedVTE ENTERPRISE CYBERSECURITY OPERATIONS LATEST
QUESTIONS AND CORRECT ANSWERS
What is another term for "rogue" wireless hotspots? - ANSWER: Evil Twins!

What is the goal of every cybersecurity attackers? - ANSWER: Financial Gain

What are some threat actors - ANSWER: - Amatuers
- Hackers
- Organized crime groups
- State-sponsored
- Terrorists

Amatuer Attackers - ANSWER: Young, inexperienced hackers who have little or no
experience at all. These people just hack the internet either because of curiosity or
just for fun

Hacktivists - ANSWER: Hackers who protest against a variety of political and social
ideas

Financial Gain - ANSWER: Cybercriminals who want access to bank accounts,
personal data, and anything else they can leverage to generate cash flow

What caused the Dyn Attack? - ANSWER: A large number of webcams, DVRs, routers,
and other IoT devices that has been compromised by malicious software. These
devices formed a "botnet" that was controlled by hackers

What was the Botnet used for? - ANSWER: It was used to create an enormous DDoS
attack that disabled essential internet services

What are examples of Personally identifiable Informations? - ANSWER: - Name
- Social security number
- Birthdate
- Credit card numbers
- Bank account numbers
- Government issued ID
- Address information (street, email, phone numbers)

Dark Web - ANSWER: An Encrypted online content that is not indexed by
conventional search engines

Stolen PII can be used to?: - ANSWER: Create fake financial accounts, such as credit
cards and short-term loans

What is ONE subset of PII? - ANSWER: - Protected Health Information (PHI)

, - Personal Security information (PSI)

What Healthcare law act is handled in the U.S.? - ANSWER: The Health Insurance
Portability and Accountability Act (HIPAA)

What Healthcare law act is handled in Europe? - ANSWER: The General Data
Protection Regulation (GDPR)

SOCs assign job roles by which types of frame - ANSWER: Tiers, according to the
expertise and responsibilities required for each job

Tier 1 Alert Analyst - ANSWER: These professionals monitor incoming alerts, verify
that a true incident has occurred, and forward tickets to Tier 2, if necessary

Tier 2 Incident Responder - ANSWER: These professionals are responsible for deep
investigation of incidents and advise remediation or action to be taken

Tier 3 Threat Hunter - ANSWER: These professionals have expert-level skill in
network, endpoint, threat intelligence, and malware reverse engineering. They are
experts at tracing the processes of the malware to determine its impact and how it
can be removed. They are also deeply involved in hunting for potential threats and
implementing threat detection tools. Threat hunters search for cyber threats that
are present in the network but have not yet been detected

SOC Manager - ANSWER: This professional manages all the resources of the SOC and
serves as the point of contact for the larger organization or customer

One job of the Cybersecurity Analyst is to - ANSWER: Verify that an alert represents a
true security incident

Where does the Cybersecurity Analyst forward the ticket to if the ticket is not
resolved? - ANSWER: They will forward it to Tier 2

What is Tier 2 called? - ANSWER: Incident responder

If the Incident Responder cannot resolve the ticket, then where will the ticket go? -
ANSWER: Tier 3

What is Tier 3 - ANSWER: Personnel with in-depth knowledge and threat hunting
skills

The Roles of people in Tier 1 - ANSWER: - Monitor Incidents
- Open Ticket
- Basic Threat mitigation

The Roles of people in Tier 2 - ANSWER: - Deep investigation
- Advise remediation

Connected book

Written for

Course

Document information

Uploaded on
October 12, 2024
Number of pages
6
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
morrismuriithi009
3.0
(1)

Also available in package deal

Get to know the seller

Seller avatar
morrismuriithi009 Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
1 year
Number of followers
0
Documents
760
Last sold
5 months ago

3.0

1 reviews

5
0
4
0
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions