Home Fortinet Security Information & Event Management Quiz Answer NSE 2 Information Security Awareness...

Security Information & Event Management Quiz Answer NSE 2 Information Security Awareness Fortinet

1
1722

Question 1: How did SIEM evolve?

  • As an information platform only
  • From an information platform to a threat intelligence center
  • From an information platform to a fully integrated and automated center for security and network operations
  • As a threat intelligence center only

Question 2: Which three regulatory standards and acts must businesses, hospitals, and other organizations comply with? (Choose three.)

  • HIPAA
  • PCI
  • SPML
  • XSLT
  • GDPR

Question 3: Which three problems does SIEM solve? (Choose three.)

  • The complexity of technology and the difficulty with identifying attacks
  • The lack of implementation of authentication methods
  • The lack of security awareness by employees
  • The long delay in discovering security breaches by security teams
  • More sophisticated and stealthy cyber attacks

Question 4: Which two requirements led to the development of SIEM? (Choose two.)

  • To perform vulnerability scanning
  • To measure and prove compliance to various legislations
  • To contend with the flood of alerts issued from IPSs and IDSs
  • To simulate phishing attacks

Question 5: What does the term SIEM stand for?

  • Security Information and Email Management
  • Security Information and Electronic Messaging
  • Security Information and Emergency Management
  • Security Information and Event Manager

Question 6: Which three tasks must technology perform to satisfy network security compliance requirements? (Choose three.)

  • Monitor, correlate, and notify events in real-time
  • Aggregate logs from many network sources
  • Prevent employees from accessing the internet
  • Store log data for a length of time that satisfies auditing requirements
  • Allow public access to aggregated logs

Question 7:What does SIEM do primarily?

Select one:

  • Collect, normalize, and store log events and alerts
  • Connect all security tools together into defined workflows
  • Manage network events and alerts/
  • Manage network information and alerts/

Question 8 :What was the impetus for more automation and machine learning in later SIEM devices?

Select one:

  • Requirement to manage Big Data
  • Shortage of trained personnel
  • Need to improve MIS efficiency
  • Demand to reduce MIS costs

Question 9 :Which two requirements were the motivation for SIEM? (Choose two.)

Select one or more:

  • Complying to regulations*
  • Exploiting Big Data
  • Remaining competitive
  • Increasing number of alerts*

Question 10: Which feature is a characteristic of later SIEMs?

Select one:

  • Automatic backups and integrity checking/
  • Collect, normalize, and store log events and alerts/
  • User and entity behavior analytics (UEBA)
  • Deciphering encrypted data flows

Question 11: Which compliance, if ignored by businesses, hospitals, and other organizations, can result in punitive fines?

Select one:

  • Complying to regulations
  • Complying to User and entity behavior analytics (UEBA)
  • Complying to machine learning checks
  • Complying to automatic backups and integrity checks

Question 12 :What was the primary driver for purchasing SIEM?

Select one:

  • Collect information about customers
  • Comply with regulations
  • Improve MIS efficiency
  • Compensate for the skills-gap labor shortage

Question 13 :What is one method that SIEM uses to analyze data?

Select one:

  • Decipher encrypted logs and alerts
  • Apply security controls
  • Decipher encrypted data flows
  • Watch for known indicators of compromise (IoC)

Question 14 :Which feature provides SIEM greater visibility into the entire network?

Select one:

  • Complying with regulations
  • Sharing of logs by IoTs and BYODs
  • Deciphering encrypted logs and alerts
  • Analyzing logs and alerts from a single-pane-of-glass

Question 15 :Which problem was a barrier to the general acceptance of first-generation SIEM?

Select one:

  • Cost to purchase was prohibitive/
  • High-level of skill was required
  • The point solution approach to network security/
  • Did not have the features needed by organizations

Question 16 :Which three compliance regulations are legislative and industry-sponsored? (Choose three.)

Select one or more:

  • Payment Industry Card (PIC) standard/
  • Health Portability Insurance and Accountability Act (HPIAA)/
  • Payment Card Industry (PCI) standard
  • General Data Protection Regulation (GDPR)
  • Health Insurance Portability and Accountability Act (HIPAA)

Question 17 :What is one method that SIEM uses to analyze data?

Select one:

  • Decipher encrypted data flows/
  • Apply security controls
  • Decipher encrypted logs and alerts
  • Watch for known indicators of compromise (IoC)

Question 18 :What was the primary driver for purchasing SIEM?

Select one:

  • Compensate for the skills-gap labor shortage
  • Comply with regulations
  • Improve MIS efficiency
  • Collect information about customers

Question 19 :What is one method that SIEM uses to analyze data?

Select one:

  • Decipher encrypted logs and alerts
  • Apply security controls/
  • Decipher encrypted data flows
  • Watch for known indicators of compromise (IoC)

1 COMMENT

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Please Comment for your required Exam Answers and we will try to provide you at shortest time. We truly value your contribution to the website. Thank you!!!