Google Cybersecurity| OVER 500 QUESTIONS
PLUS ANSWERS
NB: THE QUESTIONSAND THE ANSWERS HAVE BEEN ITERCHANGED ANSWERS 1ST THEN THE QUESTION( SORRY FOR THE
INCONVINIENCE )
- Action What are the three (3) typical components of a Network
Intrusion Detection System (NIDS)?
- Header
- Rule Options
- Syslog What are five (5) commonly used log formats?
- JavaScript Object Notation
(JSON)
- eXtensible Markup Language
(XML)
- Comma Separated Values (CSV)
- Common Event Format (CEF)
- Network What are five (5) types of logs?
- System
- Application
- Security
- Authentication
,- Date What are five (5) details commonly included on a log?
- Time
- Location
- Action Made
- Names of users/systems who
performed the action
- Executive Summary What are four (4) common elements found in a final report?
- Timeline
- Investigation
- Recommendations
- What happened? What are six (6) questions to ask during a lessons learned meeting?
- What time did it happen?
- Who discovered it?
- How did it get contained?
- What were the actions
taken for recovery?
- What could have been done
differently?
- Hot sites What are the three (3) types of recovery sites used for site resilience?
- Warm sites
- Cold sites
- Functional Impact What are three (3) factors to consider when determining the priority of
an incident?
- Informational Impact
-Recoverability
1. Receive & Assess What are the three (3) steps of the triage process?
2. Assign Priority
3. Collect & Analyze
, - Non-automated What are the three (3) types of playbooks?
- Automated
- Semi-automated
PLUS ANSWERS
NB: THE QUESTIONSAND THE ANSWERS HAVE BEEN ITERCHANGED ANSWERS 1ST THEN THE QUESTION( SORRY FOR THE
INCONVINIENCE )
- Action What are the three (3) typical components of a Network
Intrusion Detection System (NIDS)?
- Header
- Rule Options
- Syslog What are five (5) commonly used log formats?
- JavaScript Object Notation
(JSON)
- eXtensible Markup Language
(XML)
- Comma Separated Values (CSV)
- Common Event Format (CEF)
- Network What are five (5) types of logs?
- System
- Application
- Security
- Authentication
,- Date What are five (5) details commonly included on a log?
- Time
- Location
- Action Made
- Names of users/systems who
performed the action
- Executive Summary What are four (4) common elements found in a final report?
- Timeline
- Investigation
- Recommendations
- What happened? What are six (6) questions to ask during a lessons learned meeting?
- What time did it happen?
- Who discovered it?
- How did it get contained?
- What were the actions
taken for recovery?
- What could have been done
differently?
- Hot sites What are the three (3) types of recovery sites used for site resilience?
- Warm sites
- Cold sites
- Functional Impact What are three (3) factors to consider when determining the priority of
an incident?
- Informational Impact
-Recoverability
1. Receive & Assess What are the three (3) steps of the triage process?
2. Assign Priority
3. Collect & Analyze
, - Non-automated What are the three (3) types of playbooks?
- Automated
- Semi-automated