Chapter 10 Questions Flashcards

(8 cards)

1
Q

What is the role of a SOC?

A. Encrypt data
B. Monitor, detect, and respond to threats
C. Backup systems
D. Develop software

A

Answer: B

Explanation:
A Security Operations Center (SOC) is responsible for continuously monitoring an organisation’s systems to detect and respond to security incidents. It uses tools like SIEM and threat intelligence to identify suspicious activity. The SOC acts as the central hub for security operations, focusing on real-time defence rather than system design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a security analyst do?

A. Design systems
B. Monitor alerts and investigate threats
C. Build hardware
D. Encrypt data

A

Answer: B

Explanation:
Security analysts are responsible for monitoring alerts generated by tools such as SIEM systems. They investigate suspicious activity, analyse logs, and determine whether an incident has occurred. They are often the first line of defence within a SOC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat Intelligence Analyst focuses on:

A. Logs
B. Gathering threat data
C. Hardware
D. Backup

A

Answer: B

Explanation:
A threat intelligence analyst collects and analyses information about current and emerging threats. This includes studying attacker behaviour, indicators of compromise (IoCs), and threat trends. Their work helps improve detection and supports decision-making in the SOC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat Hunting Analyst focuses on:

A. Reactive detection
B. Proactive threat searching
C. Encryption
D. Backup

A

Answer: B

Explanation:
Threat hunting analysts proactively search for hidden threats that automated systems may miss. Unlike traditional monitoring (which reacts to alerts), threat hunting assumes attackers may already be inside the network and actively looks for anomalies and suspicious behaviour.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Red Team Analyst role?

A. Defend systems
B. Simulate attacks
C. Monitor logs
D. Backup

A

Answer: B

Explanation:
Red team analysts simulate real-world attacks to test an organisation’s security defences. They act like attackers to identify weaknesses in systems and processes. Their findings help improve the organisation’s overall security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Engineer role?

A. Monitor logs
B. Build and maintain security tools
C. Attack systems
D. Backup

A

Answer: B

Explanation:
Security engineers design, implement, and maintain security tools such as firewalls, SIEM systems, and intrusion detection systems. They focus on the technical implementation of security controls and ensure systems are properly configured and maintained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Architect role?

A. Monitor logs
B. Design security systems
C. Attack systems
D. Backup

A

Answer: B

Explanation:
Security architects are responsible for designing the overall security framework of an organisation. They define how systems should be secured, select appropriate technologies, and ensure security is built into the architecture from the start.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Teams Structure

Main three teams:

A. Logs, backup, encryption
B. Operations, Architecture, Engineering
C. Firewall, IDS, SIEM
D. Malware, logs, backup

Answer: B

Explanation:
Most organisations structure their security functions into three main teams:

Security Operations (monitoring and responding to threats)
Security Engineering (building and maintaining tools)
Security Architecture (designing secure systems)
Each plays a distinct but complementary role.

A

Answer: B

Explanation:
Most organisations structure their security functions into three main teams:

Security Operations (monitoring and responding to threats)
Security Engineering (building and maintaining tools)
Security Architecture (designing secure systems)
Each plays a distinct but complementary role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly