21. Fill in the blank: Security professionals can use _____ to interact with and request information from a database.

  • Chronicle
  • network protocol analyzers (packet sniffers)
  • Splunk Enterprise
  • SQL

22. What are some key benefits of using Python to perform security tasks? Select all that apply.

  • It saves time.
  • It clearly maps data.
  • It helps ensure accuracy.
  • It uses a command-line interface.

23. As a security analyst, you are monitoring network traffic and detect a large number of failed login attempts. Which of the following tools would help you investigate this incident? Select two answers.

  • An intrusion detection system (IDS)
  • A network protocol analyzer (packet sniffer)
  • A cryptographic encoder
  • A command-line interface

24. What are some key benefits of programming languages? Select all that apply.

  • They create a specific set of instructions for a computer to execute tasks.
  • They reduce the risk of human error.
  • They describe how data is organized.
  • They complete tasks faster than if working manually.

25. Fill in the blank: To request information from a _____, security professionals can use SQL.

  • spreadsheet
  • database
  • network
  • dashboard

26. Which of the following tasks can be performed using SIEM tools? Select three answers.

  • Implementing security software programs
  • Saving time by reducing the amount of data to be reviewed
  • Analyzing filtered events and patterns
  • Monitoring critical activities

27. What term is used to describe publicly available systems, such as Linux?

  • Open-source
  • Unregulated
  • Restricted
  • Free-for-all

Leave a Reply