Cybersecurity Quiz - Who you gonna call

Honeypots in information security are:
Critical systems
Decoy systems
Old systems
Vulnerable systems
Storing various devices' configuration is:
Completely useless
Too expensive
Part of good documentation
Impossible
Which of the following is NOT an Indicator of compromise (IOC)?
Code execution
Virus Signatures
IP addresses
Malware files MD5 hashes
How is the process of identifying the criticality/importance of a security incident called?
Triage
Risk Assessment
Business Impact Assessment
Incident Review
Which of the following is a security weakness that may lead to a security incident?
Access violations
Human errors
Virus infections
Insufficiently complex passwords
APT acronym stands for:
Advanced Peer Threat
Advanced Persistent Threat
Advanced Perimeter Threat
Advanced Protocol Threat
Which DEFCON level is the most severe?
DEFCON 5
DEFCON 10
DEFCON 1
DEFCON 0
How the operational guidelines of a SIEM team are called?
Handbooks
Playbooks
Phonebooks
Playlists
CTI stands for:
Computer-Telephony Integration
Company Threats Interrogation
Computer Threat Incident
Cyber Threat Intelligence
The ELK stack consists of the open-source products Elasticsearch, Logstash, Kibana and the ??????? family of data shippers
Battle
Bands
Beats
Backboard
Which of the following events can potentially be generated in the Windows event log when using Kerbrute for username enumeration?
Event ID 1001: A network connection was established
Event ID 4768: A Kerberos authentication ticket (TGT) was requested
Event ID 7024: The Kerbrute service was started
Event ID 2001: Kerberos-related event logging was disabled
{"name":"Cybersecurity Quiz - Who you gonna call", "url":"https://www.quiz-maker.com/QS0WCJ0S1","txt":"Honeypots in information security are:, Storing various devices' configuration is:, Which of the following is NOT an Indicator of compromise (IOC)?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker