11. What is a benefit of a tool, such as Google’s Chronicle, being cloud-native?

  • It requires hardware to deploy.
  • It is a static resource.
  • It allows for fast delivery of new features.
  • It performs best when downloaded to a network.

12. Fill in the blank: A security professional uses a _____ as a manual to guide operational activities.

  • spreadsheet
  • toolkit
  • review
  • playbook

13. As a security analyst, you are monitoring network traffic to ensure that SPII data is not being accessed by unauthorized users. What does this scenario describe?

  • Using a network protocol analyzer (packet sniffer)
  • Programming with code
  • Calculating with formulas
  • Gathering data in a spreadsheet

14. What are some key benefits of programming languages? Select all that apply.

  • They install security hardware.
  • They create a specific set of instructions for a computer to execute tasks.
  • They execute repetitive processes accurately.
  • They filter through data points faster than humans can working manually.

15. How is an open-source operating system, such as Linux, different from other operating systems?

  • It relies on a command line.
  • It is only a desktop tool.
  • It is proprietary.
  • It must be downloaded from the cloud.

16. Fill in the blank: A database is a _____ of organized data stored in a computer system.

  • visualization
  • collection
  • model
  • frame

17. What are some key benefits of using Python to perform security tasks? Select all that apply.

  • It is designed for high levels of accuracy.
  • It makes static data more dynamic.
  • It simplifies repetitive tasks.
  • It helps security professionals be more accurate.

18. Which of the following tasks can be performed using SIEM tools? Select three answers.

  • Helping security analysts identify potential breaches
  • Collecting and analyzing data
  • Providing alerts for specific types of risks and threats
  • Requesting security data from government agencies

Shuffle Q/A 2

19. Why might a security professional choose Google Chronicle to store security data for later analysis?

  • It is cloud-native, which means it delivers new features quickly.
  • It requires hardware to deploy, so it is more secure.
  • It is a static resource, so the user interface never changes.
  • It performs best when downloaded to a network, which enables efficient processing.

20. A security team wants to examine logs to understand what is occurring within their systems. Why might they choose Linux to perform this task? Select two answers.

  • It allows for text-based commands by users.
  • It is an efficient programming language.
  • It is proprietary.
  • It is open source.

Leave a Reply