21. Fill in the blank: Security professionals can use _____ to interact with and request information from a database.
- Chronicle
- network protocol analyzers (packet sniffers)
- Splunk Enterprise
- SQL
22. What are some key benefits of using Python to perform security tasks? Select all that apply.
- It saves time.
- It clearly maps data.
- It helps ensure accuracy.
- It uses a command-line interface.
23. As a security analyst, you are monitoring network traffic and detect a large number of failed login attempts. Which of the following tools would help you investigate this incident? Select two answers.
- An intrusion detection system (IDS)
- A network protocol analyzer (packet sniffer)
- A cryptographic encoder
- A command-line interface
24. What are some key benefits of programming languages? Select all that apply.
- They create a specific set of instructions for a computer to execute tasks.
- They reduce the risk of human error.
- They describe how data is organized.
- They complete tasks faster than if working manually.
25. Fill in the blank: To request information from a _____, security professionals can use SQL.
- spreadsheet
- database
- network
- dashboard
26. Which of the following tasks can be performed using SIEM tools? Select three answers.
- Implementing security software programs
- Saving time by reducing the amount of data to be reviewed
- Analyzing filtered events and patterns
- Monitoring critical activities
27. What term is used to describe publicly available systems, such as Linux?
- Open-source
- Unregulated
- Restricted
- Free-for-all