Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Security Operations Center (SOC) Exam Questions And Answers

Beoordeling
-
Verkocht
-
Pagina's
10
Cijfer
A+
Geüpload op
16-07-2025
Geschreven in
2024/2025

Why do we need a Security Operations Center (SOC) - It helps identify: - Who or what was targeted - Was the adversary successful - Who is the adversary and what is their motivation - How do we continue with the business mission SOC Mission - - A team that detects, analyzes, and responds to incidents to minimize damage from security issues - Known by a variety fo alternative names and terms -- Cybersecurity Operations Center (CSOC) -- Computer Incident Response Team (CIRT) -- Computer Security Incident Response Team (CSIRT) -- Computer Emergency Response Team (CERT) -- Network Operations and Security Center (NOSC) What does a SOC do - Detects, analyzes and responds to security incidents Functional Components of a SOC - - Understand what it's supposed to do - How it works; and what components are available to support the desired function - Roles people play and define the procedures for those people to follow - Permutations on how to arrange and staff the functions Steering Committee - - Provides a vehicle for discovery and planning; it focus shifts to high-level implementation decisions, without involving itself in the details of the actual build - Provides ongoing operational oversight -- Helps SOC adapt to changing business and technology drivers -- Supplies SOC with: - Situational awareness of the business - Legal requirements - Cultural drivers SOC Charter - - Written policy that describes SOC scope, constituency, and services; in reality, it is a service level agreement or objective (SLA/SLO) - Provides a high-level mission statement - Signed off by senior management Which of the following should be included in a SOC Charter? - A mission statement SOC Command Center - Is the command center for all cyber-security related activities - Maintains situational awareness of systems and threat environments - Manages threats and proactively protects systems SOC Command Center Key Activities - - Command and control for all activity related to security operations - Single point of entry for security-related requests - Has authority to direct response and notify constituents - Defines and manages communications SOC Command Center Process - Receives request and provides direction to the functional areas of the SOC to protect the organizations: 1. Receives request from: business units, law enforcement, third parties, or SOC functional areas 2. Determine if reports are duplicate or ongoing 3. If an incident. then appropriate notifications, ticket creation, and reporting are performed 4. Leverages functional capabilities to determine the scope of the incident 5. SOC functional areas receives appropriate tasks from the command center to advance the handling of the incident Network System Monitoring (NSM) Function - Cornerstone capability of SOC - Watching data in motion - Data aggregates into a single resource (SIEM) - Network instrumentation is required - Incorporates data from many resources - Uses all data sources to attempt to understand what occurred and determine if the reported issue is a security incident - Correlation is the process used to look at other related items of the reported incident -- The intent of the correlation process is to understand what occurred A firewall log shows a connection from an internal host to an internal IP address that has been determined to be malicious. The analyst looked at logs on internal host, IDS alerts and DNS requests. What process has the analyst used? - Correlation process Threat Intelligence Function - The process of investigating and collecting information about emerging threats and threat sources. - Collects open source info and internal adversary info - Correlate events to threat actors - Learns adversary activities: -- Retain adversary characteristics -- Attribution info and characteristics Incident Response Function - Contain incidents, eradicate incidents, perform coordination among various teams, and provide reporting on status as well as final disposition: - Interrupt normal operations in an appropriate manner - Leaving systems compromised - Contain assets: -- Logically and physically -- Containment strategies are terrible --- Don't detect adversaries in a timely manner to contain attacks - Eradicate issues and and return to service (recovery) - Ongoing status dissemination to other SOC functions is important during incidents

Meer zien Lees minder
Instelling
Beacon
Vak
Beacon

Voorbeeld van de inhoud

Security Operations Center (SOC)
Exam Questions And Answers




A
R
U
LA
C
O
D

, Why do we need a Security Operations Center (SOC) - It helps identify:
- Who or what was targeted
- Was the adversary successful
- Who is the adversary and what is their motivation
- How do we continue with the business mission




A
SOC Mission - - A team that detects, analyzes, and responds to
incidents to minimize damage from security issues




R
- Known by a variety fo alternative names and terms
-- Cybersecurity Operations Center (CSOC)
-- Computer Incident Response Team (CIRT)



U
-- Computer Security Incident Response Team
(CSIRT)
-- Computer Emergency Response Team (CERT)
LA
-- Network Operations and Security Center (NOSC)

What does a SOC do - Detects, analyzes and responds to security incidents

Functional Components of a SOC - - Understand what it's supposed to do
- How it works; and what components are available to
C

support the desired function
- Roles people play and define the procedures for
those people to follow
- Permutations on how to arrange and staff the
O


functions

Steering Committee - - Provides a vehicle for discovery and planning; it focus
D



shifts to high-level implementation decisions, without
involving itself in the details of the actual build

- Provides ongoing operational oversight
-- Helps SOC adapt to changing business and
technology drivers
-- Supplies SOC with:
- Situational awareness of the business
- Legal requirements
- Cultural drivers

Geschreven voor

Instelling
Beacon
Vak
Beacon

Documentinformatie

Geüpload op
16 juli 2025
Aantal pagina's
10
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$11.39
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
DocLaura Galen College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
159
Lid sinds
2 jaar
Aantal volgers
38
Documenten
6400
Laatst verkocht
1 week geleden

4.2

44 beoordelingen

5
27
4
4
3
10
2
2
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen