ログイン

Certified SOC Analyst
15問 • 4ヶ月前
  • とおる
  • 通報

    問題一覧

  • 1

    In the context of a Security Operations Center (SOC), what command would you use to view all current network connections and listening ports on a system?

    B. netstat -an

  • 2

    Which tool in a SOC environment is primarily used for aggregating and analyzing large volumes of log data to detect suspicious activities?

    D. Splunk

  • 3

    Fill in the blank: A SOC analyst monitors _____ to detect and respond to incidents in real-time.

    C. network traffic

  • 4

    An analyst at a SOC is investigating a security alert from an intrusion detection system. The alert could indicate a potential breach. What is the first step the analyst should take?

    D. Verify the alert’s legitimacy by checking logs and system activities related to the alert.

  • 5

    During a routine check, a SOC analyst discovers an anomaly in outbound traffic that suggests data exfiltration. Which of the following steps should they take first?

    D. Isolate the affected system to prevent further unauthorized data transfer.

  • 6

    What command is used in a SOC to trace the path data takes from the server to a specific IP address, crucial for analyzing potential security breaches?

    A. traceroute 192.168.1.1

  • 7

    During an incident response, which documentation practice is critical for ensuring that the SOC team can review the incident lifecycle and improve future responses?

    B. Maintaining a comprehensive incident report

  • 8

    Fill in the blank: In SOC operations, maintaining a(n) _____ log is crucial for tracking actions taken during incident handling.

    C. change management

  • 9

    A SOC team receives an alert about possible unauthorized access to a server. What is the initial step they should follow according to standard SOC procedures?

    D. Review the initial alert to verify its accuracy and gather context.

  • 10

    After resolving a security incident, what should a SOC analyst do first to enhance future readiness?

    A. Conduct a post-incident review to identify response effectiveness and any needed improvements.

  • 11

    What command does a Tier I SOC analyst use to verify if a server is up and responding to network requests after receiving an alert?

    C. ping 192.168.0.15

  • 12

    A Tier II SOC analyst suspects a phishing attempt. Which tool should they use to analyze the email header for originating IP address?

    D. Email header analyzer

  • 13

    Fill in the blank: Tier I SOC analysts are primarily responsible for monitoring security alerts and initiating _____.

    D. incident escalation

  • 14

    During a late-night shift, a Tier I SOC analyst notices unusual outbound traffic patterns from a critical server. What should be their first course of action?

    B. Verify the authenticity of the traffic pattern with baseline comparisons.

  • 15

    A Tier II SOC analyst receives an escalation involving suspicious registry changes on a workstation. What is their first investigative step?

    C. Review the change logs to confirm if the changes were authorized.

  • ITパスポートパーフェクトラーニング過去問題集令和6年度第2部

    ITパスポートパーフェクトラーニング過去問題集令和6年度第2部

    O SHI · 50問 · 7日前

    ITパスポートパーフェクトラーニング過去問題集令和6年度第2部

    ITパスポートパーフェクトラーニング過去問題集令和6年度第2部

    50問 • 7日前
    O SHI

    ITパスポートパーフェクトラーニング過去問題集令和6年度第1部

    ITパスポートパーフェクトラーニング過去問題集令和6年度第1部

    O SHI · 50問 · 7日前

    ITパスポートパーフェクトラーニング過去問題集令和6年度第1部

    ITパスポートパーフェクトラーニング過去問題集令和6年度第1部

    50問 • 7日前
    O SHI

    情報

    情報

    あんぱん · 35問 · 10日前

    情報

    情報

    35問 • 10日前
    あんぱん

    認定Platformアドミニストレーター 問題集(TysonBlog_1)

    認定Platformアドミニストレーター 問題集(TysonBlog_1)

    myukyosh · 100問 · 27日前

    認定Platformアドミニストレーター 問題集(TysonBlog_1)

    認定Platformアドミニストレーター 問題集(TysonBlog_1)

    100問 • 27日前
    myukyosh

    愛玩動物飼養管理士②

    愛玩動物飼養管理士②

    ユーザ名非公開 · 38問 · 29日前

    愛玩動物飼養管理士②

    愛玩動物飼養管理士②

    38問 • 29日前
    ユーザ名非公開

    愛玩動物飼養管理士2級 2023 part1

    愛玩動物飼養管理士2級 2023 part1

    ユーザ名非公開 · 100問 · 29日前

    愛玩動物飼養管理士2級 2023 part1

    愛玩動物飼養管理士2級 2023 part1

    100問 • 29日前
    ユーザ名非公開

    基本情報技術者試験

    基本情報技術者試験

    ユーザ名非公開 · 100問 · 1ヶ月前

    基本情報技術者試験

    基本情報技術者試験

    100問 • 1ヶ月前
    ユーザ名非公開

    1-01お客様の満足度を高める仕事①

    1-01お客様の満足度を高める仕事①

    osakana · 31問 · 4ヶ月前

    1-01お客様の満足度を高める仕事①

    1-01お客様の満足度を高める仕事①

    31問 • 4ヶ月前
    osakana

    3-5 セキュリティ

    3-5 セキュリティ

    早川遼 · 79問 · 5ヶ月前

    3-5 セキュリティ

    3-5 セキュリティ

    79問 • 5ヶ月前
    早川遼

    セキュリティ

    セキュリティ

    佐竹直哉 · 33問 · 6ヶ月前

    セキュリティ

    セキュリティ

    33問 • 6ヶ月前
    佐竹直哉

    過去問

    過去問

    濱田あさの · 16問 · 6ヶ月前

    過去問

    過去問

    16問 • 6ヶ月前
    濱田あさの

    オフィスセキュリティ1

    オフィスセキュリティ1

    ユーザ名非公開 · 79問 · 6ヶ月前

    オフィスセキュリティ1

    オフィスセキュリティ1

    79問 • 6ヶ月前
    ユーザ名非公開

    なぜITを学ぶのか

    なぜITを学ぶのか

    smile smile · 11問 · 7ヶ月前

    なぜITを学ぶのか

    なぜITを学ぶのか

    11問 • 7ヶ月前
    smile smile

    乙4

    乙4

    ユーザ名非公開 · 18問 · 8ヶ月前

    乙4

    乙4

    18問 • 8ヶ月前
    ユーザ名非公開

    コンプティアセキュリティ

    コンプティアセキュリティ

    ユーザ名非公開 · 36回閲覧 · 100問 · 11ヶ月前

    コンプティアセキュリティ

    コンプティアセキュリティ

    36回閲覧 • 100問 • 11ヶ月前
    ユーザ名非公開

    AWS-CLF直前対策問題01~70

    AWS-CLF直前対策問題01~70

    宮原賢人 · 70問 · 11ヶ月前

    AWS-CLF直前対策問題01~70

    AWS-CLF直前対策問題01~70

    70問 • 11ヶ月前
    宮原賢人

    情報I

    情報I

    三郎 · 50問 · 1年前

    情報I

    情報I

    50問 • 1年前
    三郎

    IT

    IT

    ユーザ名非公開 · 54問 · 1年前

    IT

    IT

    54問 • 1年前
    ユーザ名非公開

    たま一郎

    たま一郎

    ユーザ名非公開 · 33問 · 1年前

    たま一郎

    たま一郎

    33問 • 1年前
    ユーザ名非公開

    セキュリティⅠ

    セキュリティⅠ

    かわた · 67問 · 1年前

    セキュリティⅠ

    セキュリティⅠ

    67問 • 1年前
    かわた

    問題一覧

  • 1

    In the context of a Security Operations Center (SOC), what command would you use to view all current network connections and listening ports on a system?

    B. netstat -an

  • 2

    Which tool in a SOC environment is primarily used for aggregating and analyzing large volumes of log data to detect suspicious activities?

    D. Splunk

  • 3

    Fill in the blank: A SOC analyst monitors _____ to detect and respond to incidents in real-time.

    C. network traffic

  • 4

    An analyst at a SOC is investigating a security alert from an intrusion detection system. The alert could indicate a potential breach. What is the first step the analyst should take?

    D. Verify the alert’s legitimacy by checking logs and system activities related to the alert.

  • 5

    During a routine check, a SOC analyst discovers an anomaly in outbound traffic that suggests data exfiltration. Which of the following steps should they take first?

    D. Isolate the affected system to prevent further unauthorized data transfer.

  • 6

    What command is used in a SOC to trace the path data takes from the server to a specific IP address, crucial for analyzing potential security breaches?

    A. traceroute 192.168.1.1

  • 7

    During an incident response, which documentation practice is critical for ensuring that the SOC team can review the incident lifecycle and improve future responses?

    B. Maintaining a comprehensive incident report

  • 8

    Fill in the blank: In SOC operations, maintaining a(n) _____ log is crucial for tracking actions taken during incident handling.

    C. change management

  • 9

    A SOC team receives an alert about possible unauthorized access to a server. What is the initial step they should follow according to standard SOC procedures?

    D. Review the initial alert to verify its accuracy and gather context.

  • 10

    After resolving a security incident, what should a SOC analyst do first to enhance future readiness?

    A. Conduct a post-incident review to identify response effectiveness and any needed improvements.

  • 11

    What command does a Tier I SOC analyst use to verify if a server is up and responding to network requests after receiving an alert?

    C. ping 192.168.0.15

  • 12

    A Tier II SOC analyst suspects a phishing attempt. Which tool should they use to analyze the email header for originating IP address?

    D. Email header analyzer

  • 13

    Fill in the blank: Tier I SOC analysts are primarily responsible for monitoring security alerts and initiating _____.

    D. incident escalation

  • 14

    During a late-night shift, a Tier I SOC analyst notices unusual outbound traffic patterns from a critical server. What should be their first course of action?

    B. Verify the authenticity of the traffic pattern with baseline comparisons.

  • 15

    A Tier II SOC analyst receives an escalation involving suspicious registry changes on a workstation. What is their first investigative step?

    C. Review the change logs to confirm if the changes were authorized.