1. What does SecOps stand for?
a) Security Operations
b) System Operations
c) Software Operations
d) Service Operations
Answer: a) Security Operations
2. Which of the following is not a common objective of SecOps?
a) Protecting against cyber attacks
b) Ensuring compliance with regulations
c) Maximizing system performance
d) Managing security incidents
Answer: c) Maximizing system performance
3. What is the primary goal of vulnerability scanning?
a) To detect and prioritize vulnerabilities in a system
b) To prevent attackers from exploiting vulnerabilities
c) To identify unauthorized access attempts
d) To track changes in system configuration
Answer: a) To detect and prioritize vulnerabilities in a system
4. What is the primary objective of SecOps?
a) Enhancing user experience
b) Rapid incident response
c) Reducing system downtime
d) Managing software development
Answer: b) Rapid incident response
5. Which framework provides guidelines for managing cybersecurity risk?
a) ISO 9001
b) COBIT
c) ITIL
d) PCI DSS
Answer: b) COBIT
6. What is the purpose of penetration testing?
a) To identify vulnerabilities in a system
b) To test the effectiveness of security controls
c) To simulate a cyber attack
d) All of the above
Answer: d) All of the above
7. Which of the following is a common tool used in security incident response?
a) Firewall
b) Intrusion Detection System (IDS)
c) Network Access Control (NAC)
d) Domain Name System (DNS)
Answer: b) Intrusion Detection System (IDS)
8. What is the difference between a vulnerability and a threat?
a) A vulnerability is a weakness in a system, while a threat is an action that exploits that weakness
b) A vulnerability is an action that exploits a weakness in a system, while a threat is a weakness in that system
c) A vulnerability and a threat are the same thing
d) None of the above
Answer: a) A vulnerability is a weakness in a system, while a threat is an action that exploits that weakness
9. What is the purpose of risk assessment?
a) To identify and prioritize potential risks to a system
b) To mitigate identified risks
c) To prevent all risks from materializing
d) To ignore potential risks until they become actual risks
Answer: a) To identify and prioritize potential risks to a system
10. What is the purpose of access controls?
a) To prevent unauthorized access to a system
b) To restrict access to sensitive data
c) To ensure compliance with regulations
d) All of the above
Answer: d) All of the above
11. What is the difference between authentication and authorization?
a) Authentication is the process of verifying a user's identity, while authorization is the process of granting or denying access to resources based on that identity
b) Authentication and authorization are the same thing
c) Authentication is the process of granting or denying access to resources, while authorization is the process of verifying a user's identity
d) None of the above
Answer: a) Authentication is the process of verifying a user's identity, while authorization is the process of granting or denying access to resources based on that identity
12. Which of the following is a common technique used in social engineering attacks?
a) Phishing
b) Encryption
c) Access control
d) Vulnerability scanning
Answer: a) Phishing
13. What is the purpose of a security information and event management (SIEM) system?
a) To collect and analyze security-related data from multiple sources
b) To prevent cyber attacks
c) To manage security incidents
d) To enforce access controls
Answer: a) To collect and analyze security-related data from multiple sources
14. What is the purpose of a security operations center (SOC)?
a) To monitor and manage security-related events
b) To develop and implement security policies
c) To perform vulnerability assessments
d) To enforce access controls
Answer: a)To monitor and manage security-related events
15. Which principle restricts access rights for users to the bare minimum permissions needed to perform their tasks?
a) Principle of Least Privilege (PoLP)
b) Principle of Maximum Privilege (PoMP)
c) Principle of Least Access (PoLA)
d) Principle of Full Access (PoFA)
Answer: a) Principle of Least Privilege (PoLP)
16. What does the acronym IR stand for in the context of SecOps?
a) Incident Response
b) Intrusion Recovery
c) Information Retrieval
d) Incident Reporting
Answer: a) Incident Response
17. Which phase of the incident handling process focuses on removing the threat and restoring normal operations?
a) Containment
b) Identification
c) Recovery
d) Preparation
Answer: c) Recovery
18. What does the acronym MTD stand for in the context of cybersecurity?
a) Mean Time to Detection
b) Maximum Threat Detection
c) Minimum Threat Duration
d) Mean Time to Recovery
Answer: a) Mean Time to Detection
19. Which term refers to a security attack that targets a system, seeking to gain unauthorized access or privileges?
a) Malware
b) Phishing
c) Exploit
d) Firewall
Answer: c) Exploit
20. Which approach involves analyzing and correlating security-related data from various sources for actionable insights?
a) Threat Modeling
b) Threat Intelligence
c) Threat Hunting
d) Threat Profiling
Answer: b) Threat Intelligence
21. Which phase of the incident response process involves identifying the scope and impact of the incident?
a) Identification
b) Containment
c) Eradication
d) Recovery
Answer: a) Identification
22. Which regulatory compliance standard focuses on cardholder data security?
a) HIPAA
b) GDPR
c) PCI DSS
d) FERPA
Answer: c) PCI DSS
23. Which process involves dividing a network into isolated segments to enhance security?
a) Network Segmentation
b) Vulnerability Scanning
c) Threat Intelligence
d) Patch Management
Answer: a) Network Segmentation
24. What does Business Continuity Planning (BCP) primarily focus on?
a) Recovering IT infrastructure
b) Protecting against cyber-attacks
c) Maintaining critical business functions
d) Detecting security incidents
Answer: c) Maintaining critical business functions
25. Which practice focuses on integrating security measures into the software development lifecycle?
a) SecOps
b) DevSecOps
c) NetOps
d) DevOps
Answer: b) DevSecOps
26. What is the first step in the incident handling process?
a) Recovery
b) Identification
c) Preparation
d) Containment
Answer: c) Preparation
27. Which technique transforms plaintext into unreadable code to secure data transmission?
a) Hashing
b) Encryption
c) Steganography
d) Compression
Answer: b) Encryption
28. What does Business Continuity Planning (BCP) primarily focus on?
a) Recovering IT infrastructure
b) Protecting against cyber-attacks
c) Maintaining critical business functions
d) Detecting security incidents
Answer: c) Maintaining critical business functions
29. What is the primary objective of an Intrusion Prevention System (IPS)?
a) Detect potential security threats
b) Block and mitigate security threats
c) Analyze network traffic patterns
d) Identify vulnerable systems
Answer: b) Block and mitigate security threats
30. What is the main objective of a DDoS attack?
a) Unauthorized access to data
b) Exfiltrating sensitive information
c) Disrupting services and networks
d) Gaining administrative privileges
Answer: c) Disrupting services and networks
Top comments (0)