play it safe manage security risks coursera weekly challenge 3 answers
Test your knowledge: Security information and event management (SIEM) dashboards
1. Which log source records events related to websites, emails, and file shares, as well as password and username requests?
- Receiving
- Firewall
- Network
- Server
2. Fill in the blank: A security information and _____ management (SIEM) tool is an application that collects and analyzes log data to monitor critical activities in an organization.
- employee
- efficiency
- emergency
- event
3. A security professional evaluates a software application by reviewing key technical attributes including response time, availability, and failure rate. What are they using to assess performance?
- Index standards
- Metrics
- Cloud tools
- Models
4. Fill in the blank: SIEM tools must be configured and _____ to meet each organization's unique security needs.
- customized
- centralized
- reviewed
- indexed
Test your knowledge: Identify threats and vulnerabilities with SIEM tools
5. A security team wants some of its services to be hosted on the internet instead of local devices. However, they also need to maintain physical control over certain confidential data. What type of SIEM solution should they select?
- Self-hosted
- Remote
- Cloud-hosted
- Hybrid
6. Splunk Cloud is a self-hosted tool that retains, analyzes, and searches log data in order to provide security information and alerts.
- True
- False
7. Fill in the blank: Chronicle is _____, which means it is specifically designed to take advantage of cloud computing capabilities including availability, flexibility, and scalability.
- cloud-infrastructure
- cloud-native
- cloud-local
- cloud-hardware
8. What are the different types of SIEM tools? Select three answers.
- Self-hosted
- Cloud-hosted
- Hybrid
- Physical
Weekly challenge 3
9. Which of the following statements correctly describe logs? Select three answers.
- SIEM tools rely on logs to monitor systems and detect security threats.
- A record of connections between devices and services on a network is part of a network log.
- A record of events related to employee logins and username requests is part of a server log.
- Actions such as username requests are recorded in a network log.
10. What are some of the key benefits of SIEM tools? Select three answers.
- Monitor critical activities in an organization
- Automatic updates customized to new threats and vulnerabilities
- Provide visibility
- Store all log data in a centralized location
11. Fill in the blank: To assess the performance of a software application, security professionals use _____, including response time, availability, and failure rate.
- dashboards
- SIEM tools
- logs
- metrics
12. A security team installs a SIEM tool within their company’s own infrastructure to keep private data on internal servers. What type of tool are they using?
- Hybrid
- Infrastructure-hosted
- Self-hosted
- Cloud-hosted
13. You are a security analyst, and you want a security solution that will be fully maintained and managed by your SIEM tool provider. What type of tool do you choose?
- Self-hosted
- Solution-hosted
- Cloud-hosted
- Hybrid
14. Fill in the blank: Splunk Enterprise is a self-hosted tool used to retain, analyze, and search an organization's _____ to provide security information and alerts.
- database
- hardware
- cloud applications
- log data
15. Which of the following statements accurately describe Chronicle? Select three answers.
- Cloud-native tools such as Chronicle are designed to take advantage of cloud computing availability.
- Chronicle is designed to retain, analyze, and search data.
- Self-hosted tools such as Chronicle are designed to give organizations more control over their data.
- Chronicle performs data analysis.
16. Which type of tool typically requires users to pay for usage?
- Open-source
- Self-hosted
- Proprietary
- Cloud native
17. Which of the following statements correctly describe logs? Select three answers.
- Actions such as using a username or password are recorded in a firewall log.
- Events related to websites, emails, or file shares are recorded in a server log.
- A network log is a record of all computers and devices that enter and leave a network.
- A log is a record of events that occur within an organization’s systems and networks.
18. What are some of the key benefits of SIEM tools? Select three answers.
- Save time
- Provide event monitoring and analysis
- Eliminate the need for manual review of logs
- Collect log data from different sources
19. Fill in the blank: Software application _____ are technical attributes, such as response time, availability, and failure rate.
- metrics
- dashboards
- SIEM tools
- logs
20. You are a security professional, and you want a SIEM tool that will require both on-site infrastructure and internet-based solutions. What type of tool do you choose?
- Hybrid
- Self-hosted
- Cloud-hosted
- Component-hosted
21. Which of the following statements accurately describe Chronicle? Select three answers.
- Chronicle saves businesses time by eliminating the need for security teams to monitor threats and vulnerabilities.
- Cloud-native tools such as Chronicle are designed to take advantage of cloud computing scalability.
- Cloud-native tools such as Chronicle are maintained and managed by the vendor.
- Chronicle performs data collection.
22. What are some of the key benefits of SIEM tools? Select three answers.
- Minimize the number of logs to be manually reviewed
- Automatic customization to changing security needs
- Increase efficiency
- Deliver automated alerts
23. Fill in the blank: A security professional creates a dashboard that displays technical attributes about business operations called ______, such as incoming and outgoing network traffic.
- metrics
- averages
- logs
- SIEM tools
24. Fill in the blank: Splunk Enterprise is a self-hosted tool used to search, analyze, and _____ an organization's log data to provide security information and alerts in real-time.
- retain
- modify
- release
- separate
25. What are examples of open-source tools? Select two answers.
- Suricata
- Splunk Enterprise
- Linux
- Chronicle
26. Fill in the blank: Splunk Enterprise is a _____ tool used to retain, analyze, and search an organization's log data to provide security information and alerts in real-time.
- cloud-native
- self-hosted
- open-source
- cloud-based