Chapter 3 Questions Flashcards

(19 cards)

1
Q

What is the main purpose of SIEM?

A. Encrypt data
B. Collect and analyse logs
C. Block malware
D. Store backups

A

Answer: B

Explanation:
SIEM = centralised logging + analysis platform.

Explanation:
A SIEM collects logs from multiple source devices (servers, firewalls, applications), normalises them, and performs analysis to detect threats. It also correlates events and provides dashboards for monitoring. It does not directly block attacks but supports detection and response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the push method?

A. SIEM retrieves logs
B. Device sends logs to SIEM
C. Logs are deleted
D. Logs are encrypted

A

Answer: B

Explanation:
In the push method, the source device actively sends logs to the SIEM system. This is commonly used for real-time logging. The opposite is the pull method, where the SIEM retrieves logs from devices at intervals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why are indexes used in Splunk?

A. Encrypt logs
B. Improve search performance
C. Delete logs
D. Block attacks

A

Answer: B

Explanation:
Indexes in Splunk organise stored data and make searching faster and more efficient. They also help control access to data. Without indexing, searching large volumes of log data would be slow and inefficient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of dashboards?

A. Store logs
B. Visualise data
C. Encrypt logs
D. Delete logs

A

Answer: B

Explanation:
Dashboards present log data visually using graphs and charts. This helps analysts quickly identify patterns, trends, and anomalies. They are often populated using reports generated from SIEM queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a SIEM system?

A. Firewall
B. Log collection and analysis system
C. Antivirus
D. Encryption tool

A

Answer: B

Explanation:
A SIEM (Security Information and Event Management) system collects logs from multiple source devices such as servers, firewalls, and applications. It then normalises, correlates, and analyses these logs to detect suspicious activity. It provides visibility through dashboards and alerts but does not directly block attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a source device?

A. SIEM platform
B. Device that generates logs
C. Dashboard
D. Firewall rule

A

Answer: B

Explanation:
A source device is any system that generates logs, such as a router, server, or application. These logs are sent to the SIEM for analysis. Understanding log sources is important because SIEM relies on accurate and complete data collection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the pull method?

A. Device sends logs
B. SIEM retrieves logs
C. Logs are blocked
D. Logs are deleted

A

Answer: B

Explanation:
In the pull method, the SIEM system connects to source devices and retrieves logs at intervals. This method can be useful where devices cannot push logs directly, but it may introduce delays compared to push-based collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Splunk primarily used for?

A. Blocking attacks
B. Collecting and searching log data
C. Encrypting traffic
D. Creating malware

A

Answer: B

Explanation:
Splunk is a SIEM platform used to collect, index, and search large volumes of machine-generated data. It allows analysts to monitor systems, investigate incidents, and generate reports through a web interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Splunk searches are:

A. Case-sensitive
B. Case-insensitive
C. Numeric only
D. Binary

A

Answer: B

Explanation:
Splunk searches are case-insensitive, meaning “Splunkd” and “splunkd” are treated the same. This simplifies searching and reduces errors when querying log data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of indexes in Splunk?

A. Encrypt logs
B. Improve search performance
C. Delete logs
D. Block traffic

A

Answer: B

Explanation:
Indexes organise data in Splunk, allowing faster searches and efficient filtering. They also help control access to data. Without indexing, searching large datasets would be slow and inefficient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are dashboards used for?

A. Store logs
B. Visualise data
C. Encrypt logs
D. Delete logs

A

Answer: B

Explanation:
Dashboards present log data visually using graphs, charts, and panels. This helps analysts quickly identify trends, anomalies, and security issues without manually reading logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which operator is used in Splunk searches?

A. XOR
B. AND
C. NAND
D. NOR

A

Answer: B

Explanation:
Splunk supports logical operators such as AND, OR, and NOT to combine search terms. These help refine searches and retrieve relevant log data more efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How are phrases searched in Splunk?

A. Using brackets
B. Using quotes
C. Using numbers
D. Using symbols

A

Answer: B

Explanation:
Phrases in Splunk must be enclosed in quotation marks to ensure the exact phrase is searched. Without quotes, Splunk treats each word separately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is log normalisation?

A. Encrypting logs
B. Standardising log formats
C. Deleting logs
D. Blocking logs

A

Answer: B

Explanation:
Log normalisation converts logs from different sources into a consistent format. This is essential for correlation and analysis, as different systems produce logs in different structures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is log correlation important?

A. Encrypt data
B. Combine related events
C. Delete logs
D. Backup data

A

Answer: B

Explanation:
Correlation links related events across different systems to identify patterns of attacks. For example, multiple failed logins followed by a successful login may indicate a brute-force attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SIEM helps with:

A. Prevention only
B. Detection and analysis
C. Encryption only
D. Backup only

A

Answer: B

Explanation:
SIEM focuses on detecting threats by analysing logs and correlating events. It supports incident response but does not replace prevention tools like firewalls.

17
Q

Which is NOT a SIEM function?

A. Collect logs
B. Analyse events
C. Block attacks directly
D. Correlate data

A

Answer: C

Explanation:
SIEM does not directly block attacks. Instead, it detects and alerts security teams, who then take action using other tools such as firewalls or endpoint protection.

18
Q

Why is SIEM important in SOC?

A. Encrypt traffic
B. Centralised monitoring
C. Replace IDS
D. Backup systems

A

Answer: B

Explanation:
SIEM provides a central platform for monitoring and analysing logs from across the organisation. This enables faster detection of threats and more efficient incident response within a SOC.