11. What is a benefit of a tool, such as Google’s Chronicle, being cloud-native?
- It requires hardware to deploy.
- It is a static resource.
- It allows for fast delivery of new features.
- It performs best when downloaded to a network.
12. Fill in the blank: A security professional uses a _____ as a manual to guide operational activities.
- spreadsheet
- toolkit
- review
- playbook
13. As a security analyst, you are monitoring network traffic to ensure that SPII data is not being accessed by unauthorized users. What does this scenario describe?
- Using a network protocol analyzer (packet sniffer)
- Programming with code
- Calculating with formulas
- Gathering data in a spreadsheet
14. What are some key benefits of programming languages? Select all that apply.
- They install security hardware.
- They create a specific set of instructions for a computer to execute tasks.
- They execute repetitive processes accurately.
- They filter through data points faster than humans can working manually.
15. How is an open-source operating system, such as Linux, different from other operating systems?
- It relies on a command line.
- It is only a desktop tool.
- It is proprietary.
- It must be downloaded from the cloud.
16. Fill in the blank: A database is a _____ of organized data stored in a computer system.
- visualization
- collection
- model
- frame
17. What are some key benefits of using Python to perform security tasks? Select all that apply.
- It is designed for high levels of accuracy.
- It makes static data more dynamic.
- It simplifies repetitive tasks.
- It helps security professionals be more accurate.
18. Which of the following tasks can be performed using SIEM tools? Select three answers.
- Helping security analysts identify potential breaches
- Collecting and analyzing data
- Providing alerts for specific types of risks and threats
- Requesting security data from government agencies
Shuffle Q/A 2
19. Why might a security professional choose Google Chronicle to store security data for later analysis?
- It is cloud-native, which means it delivers new features quickly.
- It requires hardware to deploy, so it is more secure.
- It is a static resource, so the user interface never changes.
- It performs best when downloaded to a network, which enables efficient processing.
20. A security team wants to examine logs to understand what is occurring within their systems. Why might they choose Linux to perform this task? Select two answers.
- It allows for text-based commands by users.
- It is an efficient programming language.
- It is proprietary.
- It is open source.