FedVTE ENTERPRISE CYBERSECURITY OPERATIONS LATEST
QUESTIONS AND CORRECT ANSWERS
What is another term for "rogue" wireless hotspots? - ANSWER: Evil Twins!
What is the goal of every cybersecurity attackers? - ANSWER: Financial Gain
What are some threat actors - ANSWER: - Amatuers
- Hackers
- Organized crime groups
- State-sponsored
- Terrorists
Amatuer Attackers - ANSWER: Young, inexperienced hackers who have little or no
experience at all. These people just hack the internet either because of curiosity or
just for fun
Hacktivists - ANSWER: Hackers who protest against a variety of political and social
ideas
Financial Gain - ANSWER: Cybercriminals who want access to bank accounts,
personal data, and anything else they can leverage to generate cash flow
What caused the Dyn Attack? - ANSWER: A large number of webcams, DVRs, routers,
and other IoT devices that has been compromised by malicious software. These
devices formed a "botnet" that was controlled by hackers
What was the Botnet used for? - ANSWER: It was used to create an enormous DDoS
attack that disabled essential internet services
What are examples of Personally identifiable Informations? - ANSWER: - Name
- Social security number
- Birthdate
- Credit card numbers
- Bank account numbers
- Government issued ID
- Address information (street, email, phone numbers)
Dark Web - ANSWER: An Encrypted online content that is not indexed by
conventional search engines
Stolen PII can be used to?: - ANSWER: Create fake financial accounts, such as credit
cards and short-term loans
What is ONE subset of PII? - ANSWER: - Protected Health Information (PHI)
, - Personal Security information (PSI)
What Healthcare law act is handled in the U.S.? - ANSWER: The Health Insurance
Portability and Accountability Act (HIPAA)
What Healthcare law act is handled in Europe? - ANSWER: The General Data
Protection Regulation (GDPR)
SOCs assign job roles by which types of frame - ANSWER: Tiers, according to the
expertise and responsibilities required for each job
Tier 1 Alert Analyst - ANSWER: These professionals monitor incoming alerts, verify
that a true incident has occurred, and forward tickets to Tier 2, if necessary
Tier 2 Incident Responder - ANSWER: These professionals are responsible for deep
investigation of incidents and advise remediation or action to be taken
Tier 3 Threat Hunter - ANSWER: These professionals have expert-level skill in
network, endpoint, threat intelligence, and malware reverse engineering. They are
experts at tracing the processes of the malware to determine its impact and how it
can be removed. They are also deeply involved in hunting for potential threats and
implementing threat detection tools. Threat hunters search for cyber threats that
are present in the network but have not yet been detected
SOC Manager - ANSWER: This professional manages all the resources of the SOC and
serves as the point of contact for the larger organization or customer
One job of the Cybersecurity Analyst is to - ANSWER: Verify that an alert represents a
true security incident
Where does the Cybersecurity Analyst forward the ticket to if the ticket is not
resolved? - ANSWER: They will forward it to Tier 2
What is Tier 2 called? - ANSWER: Incident responder
If the Incident Responder cannot resolve the ticket, then where will the ticket go? -
ANSWER: Tier 3
What is Tier 3 - ANSWER: Personnel with in-depth knowledge and threat hunting
skills
The Roles of people in Tier 1 - ANSWER: - Monitor Incidents
- Open Ticket
- Basic Threat mitigation
The Roles of people in Tier 2 - ANSWER: - Deep investigation
- Advise remediation
QUESTIONS AND CORRECT ANSWERS
What is another term for "rogue" wireless hotspots? - ANSWER: Evil Twins!
What is the goal of every cybersecurity attackers? - ANSWER: Financial Gain
What are some threat actors - ANSWER: - Amatuers
- Hackers
- Organized crime groups
- State-sponsored
- Terrorists
Amatuer Attackers - ANSWER: Young, inexperienced hackers who have little or no
experience at all. These people just hack the internet either because of curiosity or
just for fun
Hacktivists - ANSWER: Hackers who protest against a variety of political and social
ideas
Financial Gain - ANSWER: Cybercriminals who want access to bank accounts,
personal data, and anything else they can leverage to generate cash flow
What caused the Dyn Attack? - ANSWER: A large number of webcams, DVRs, routers,
and other IoT devices that has been compromised by malicious software. These
devices formed a "botnet" that was controlled by hackers
What was the Botnet used for? - ANSWER: It was used to create an enormous DDoS
attack that disabled essential internet services
What are examples of Personally identifiable Informations? - ANSWER: - Name
- Social security number
- Birthdate
- Credit card numbers
- Bank account numbers
- Government issued ID
- Address information (street, email, phone numbers)
Dark Web - ANSWER: An Encrypted online content that is not indexed by
conventional search engines
Stolen PII can be used to?: - ANSWER: Create fake financial accounts, such as credit
cards and short-term loans
What is ONE subset of PII? - ANSWER: - Protected Health Information (PHI)
, - Personal Security information (PSI)
What Healthcare law act is handled in the U.S.? - ANSWER: The Health Insurance
Portability and Accountability Act (HIPAA)
What Healthcare law act is handled in Europe? - ANSWER: The General Data
Protection Regulation (GDPR)
SOCs assign job roles by which types of frame - ANSWER: Tiers, according to the
expertise and responsibilities required for each job
Tier 1 Alert Analyst - ANSWER: These professionals monitor incoming alerts, verify
that a true incident has occurred, and forward tickets to Tier 2, if necessary
Tier 2 Incident Responder - ANSWER: These professionals are responsible for deep
investigation of incidents and advise remediation or action to be taken
Tier 3 Threat Hunter - ANSWER: These professionals have expert-level skill in
network, endpoint, threat intelligence, and malware reverse engineering. They are
experts at tracing the processes of the malware to determine its impact and how it
can be removed. They are also deeply involved in hunting for potential threats and
implementing threat detection tools. Threat hunters search for cyber threats that
are present in the network but have not yet been detected
SOC Manager - ANSWER: This professional manages all the resources of the SOC and
serves as the point of contact for the larger organization or customer
One job of the Cybersecurity Analyst is to - ANSWER: Verify that an alert represents a
true security incident
Where does the Cybersecurity Analyst forward the ticket to if the ticket is not
resolved? - ANSWER: They will forward it to Tier 2
What is Tier 2 called? - ANSWER: Incident responder
If the Incident Responder cannot resolve the ticket, then where will the ticket go? -
ANSWER: Tier 3
What is Tier 3 - ANSWER: Personnel with in-depth knowledge and threat hunting
skills
The Roles of people in Tier 1 - ANSWER: - Monitor Incidents
- Open Ticket
- Basic Threat mitigation
The Roles of people in Tier 2 - ANSWER: - Deep investigation
- Advise remediation