play it safe manage security risks coursera weekly challenge 3 answers

Test your knowledge: Security information and event management (SIEM) dashboards

1. Which log source records events related to websites, emails, and file shares, as well as password and username requests?

  • Receiving
  • Firewall
  • Network
  • Server

2. Fill in the blank: A security information and _____ management (SIEM) tool is an application that collects and analyzes log data to monitor critical activities in an organization.

  • employee
  • efficiency
  • emergency
  • event

3. A security professional evaluates a software application by reviewing key technical attributes including response time, availability, and failure rate. What are they using to assess performance?

  • Index standards
  • Metrics
  • Cloud tools
  • Models

4. Fill in the blank: SIEM tools must be configured and _____ to meet each organization's unique security needs.

  • customized
  • centralized
  • reviewed
  • indexed

Test your knowledge: Identify threats and vulnerabilities with SIEM tools

5. A security team wants some of its services to be hosted on the internet instead of local devices. However, they also need to maintain physical control over certain confidential data. What type of SIEM solution should they select?

  • Self-hosted
  • Remote
  • Cloud-hosted
  • Hybrid

6. Splunk Cloud is a self-hosted tool that retains, analyzes, and searches log data in order to provide security information and alerts.

  • True
  • False

7. Fill in the blank: Chronicle is _____, which means it is specifically designed to take advantage of cloud computing capabilities including availability, flexibility, and scalability.

  • cloud-infrastructure
  • cloud-native
  • cloud-local
  • cloud-hardware

8. What are the different types of SIEM tools? Select three answers.

  • Self-hosted
  • Cloud-hosted
  • Hybrid
  • Physical

Shuffle Q/A 1

Weekly challenge 3

9. Which of the following statements correctly describe logs? Select three answers.

  • SIEM tools rely on logs to monitor systems and detect security threats.
  • A record of connections between devices and services on a network is part of a network log.
  • A record of events related to employee logins and username requests is part of a server log.
  • Actions such as username requests are recorded in a network log.

10. What are some of the key benefits of SIEM tools? Select three answers.

  • Monitor critical activities in an organization
  • Automatic updates customized to new threats and vulnerabilities
  • Provide visibility
  • Store all log data in a centralized location

Leave a Reply