<< Prev Question Next Question >>

Question 14/32

If the SIEM generates the following four alerts at the same time:
I.Firewall blocking traffic from getting into the network alerts
II.SQL injection attempt alerts
III.Data deletion attempt alerts
IV.Brute-force attempt alerts
Which alert should be given least priority as per effective alert triaging?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (32q)
Question 1: Bonney's system has been compromised by a gruesome malware. ...
Question 2: Ray is a SOC analyst in a company named Queens Tech. One Day...
Question 3: Which of the following framework describes the essential cha...
Question 4: Which of the following tool is used to recover from web appl...
Question 5: Identify the event severity level in Windows logs for the ev...
Question 6: Identify the attack, where an attacker tries to discover all...
Question 7: Chloe, a SOC analyst with Jake Tech, is checking Linux syste...
Question 8: Which of the following command is used to enable logging in ...
Question 9: John, a threat analyst at GreenTech Solutions, wants to gath...
Question 10: Which one of the following is the correct flow for Setting U...
Question 11: Mike is an incident handler for PNP Infosystems Inc. One day...
Question 12: Which of the following is a default directory in a Mac OS X ...
Question 13: Which of the following is a report writing tool that will he...
Question 14: If the SIEM generates the following four alerts at the same ...
Question 15: Which of the following formula represents the risk?...
Question 16: Peter, a SOC analyst with Spade Systems, is monitoring and a...
Question 17: A type of threat intelligent that find out the information a...
Question 18: In which log collection mechanism, the system or application...
Question 19: Wesley is an incident handler in a company named Maddison Te...
Question 20: Identify the HTTP status codes that represents the server er...
Question 21: In which phase of Lockheed Martin's - Cyber Kill Chain Metho...
Question 22: Which of the following steps of incident handling and respon...
Question 23: John as a SOC analyst is worried about the amount of Tor tra...
Question 24: Which of the following Windows event is logged every time wh...
Question 25: Which of the following is a Threat Intelligence Platform?...
Question 26: According to the forensics investigation process, what is th...
Question 27: Which of the following are the responsibilities of SIEM Agen...
Question 28: Properly applied cyber threat intelligence to the SOC team h...
Question 29: Jason, a SOC Analyst with Maximus Tech, was investigating Ci...
Question 30: Which of the following can help you eliminate the burden of ...
Question 31: Which of the following formula is used to calculate the EPS ...
Question 32: What type of event is recorded when an application driver lo...