The Fundamentals of SOC - Assessment
The Fundamentals of SOC - Assessment
POLU ASHA
100 %
Assessment Passed
Congratulations! You have successfully mastered the contents of The
Fundamentals of SOC course.
Close
Feedback
Add feedback...
Submit Feedback
Response Details
Section Results
Lesson 1: A Day in the Life of a SOC Analyst Points: 1/1
Your Responses
Question 1 of 38 +1
Question 2 of 38 +1
Once a year
Once a quarter
Once a month
Question 3 of 38 +1
Interfaces
People
Business
Visibility
Technology
Processes
Question 4 of 38 +1
Interfaces
Technology
Visbility
Business
People
Processes
Question 5 of 38 +1
People
Business
Visbility
Technology
Interfaces
Processes
Question 6 of 38 +1
Question 7 of 38 +1
Process Improvement
Detailed Analysis
Interface Agreements
Initial Research
Question 8 of 38 +1
Planning
Mission
Governance
Budget
Question 9 of 38 +1
Quality Review
Capability Improvement
Process Improvement
Tuning
Question 10 of 38 +1
Knowledge Management
Asset Management
Case Management
Question 11 of 38 +1
SOAR
Knowledge Management
Case Management
SIEM
Question 12 of 38 +1
Tabletop Exercises
Employee Utilization
Training
Question 13 of 38 +1
Planning
Mission
Governance
Budget
Question 14 of 38 +1
Technology
Interfaces
People
Processes
Business
Question 15 of 38 +1
Dedicated Workstation
Honey Pot
Malware Sandbox
Question 16 of 38 +1
Case Management
Question 17 of 38 +1
Network Security
SOC Engineering
Enterprise Architecture
IT Operations
Question 18 of 38 +1
Investigation
Mitigation
Continuous Improvement
Identification
Question 19 of 38 +1
Planning
Governance
Mission
Budget
Question 20 of 38 +1
Malware Sandboxing
Web Proxy
Question 21 of 38 +1
Processes
Technology
Visibility
Business
People
Interfaces
Question 22 of 38 +1
Question 23 of 38 +1
Escalation Process
Alerting
Initial Research
Severity Triage
Question 24 of 38 +1
Web Proxy
Firewall
Question 25 of 38 +1
Interface Agreements
Escalation Process
Quality Review
Change Control
Question 26 of 38 +1
Business
Visibility
Technology
Interfaces
Processes
Question 27 of 38 +1
DNS Sinkholing
Behavioral Analysis
Question 28 of 38 +1
Endpoint Security
Honey Pot
DNS Sinkholing
Firewall
Question 29 of 38 +1
Threat Intelligence
Threat Hunting
Question 30 of 38 +1
Threat Intelligence
Operational Technology
Network Security
Vulnerability
Question 31 of 38 +1
DNS Sinkholing
Endpoint Security
Malware Sandboxing
Behavioral Analysis
Question 33 of 38 +1
Operational Technology
IT Operations
Network Security
Vulnerability
Question 34 of 38 +1
Firewall
Mobile Device Management
Endpoint Security
Malware Sandboxing
Question 35 of 38 +1
Network Security
Vulnerability
Operational Technology
IT Operations
Question 36 of 38 +1
Business Liaison
Threat Intelligence
Content Engineering
IT Operations
DevOps
Operational Technology
Help Desk
Question 38 of 38 +1
Enterprise Architecture
Business Liaison