Está en la página 1de 2

2/19/2020 Security Information & Event Management Quiz

 The Evolution of Cybersecurity

Started on Wednesday, 19 February 2020, 5:38 AM


State Finished
Completed on Wednesday, 19 February 2020, 5:40 AM
Time taken 2 mins 47 secs
Marks 5/5
Grade 93 out of 100
Feedback Congratulations, you have passed!

Question 1 Pick three tasks technology needs to do to satisfy compliance requirements?  (Choose three.)
Partially correct

Mark 1 out of 1

Select one or more:


Aggregate logs from many network sources.

Prevent employees from accessing the internet.

Allow public access to aggregated logs. 

Monitor, correlate, and notify events in real-time. 

Store log data for a length of time to satisfy auditing requirements. 

Question 2 What is SIEM? 


Correct

Mark 1 out of 1

Select one:
Security Information and Electronic Messaging

Security Information and Event Management 

Security Information and Email Management

Security Information and Emergency Management

Question 3 What are the problems that SIEM solves?   (Choose three.)
Correct

Mark 1 out of 1

Select one or more:


Authentication methods are almost non-existent.

Lack of security awareness by employees.

Cyber-attacks have become more sophisticated and stealthy. 

Security teams fail to discover breaches until months after it had occurred. 

The technology was complex and difficult to tune; it was difficult to identify attacks; and it demanded a high-level of skill on
the part of the professional. 

https://training.fortinet.com/mod/quiz/review.php?attempt=2385588&cmid=12860 1/2
2/19/2020 Security Information & Event Management Quiz

Question 4 How did SIEM evolve? 


Correct

Mark 1 out of 1

Select one:
SIEM is only an information platform.

From an information platform to a threat intelligence center.

SIEM evolved from an information platform to a threat intelligence center to a fully integrated and automated center for
security and network operations. 

SIEM is only a threat intelligence center.

Question 5 What were the requirements that SIEM grew out of?  (Choose two.)
Correct

Mark 1 out of 1

Select one or more:


To perform vulnerability scanning.

To measure and prove compliance to various legislations. 

To contend with the flood of alerts issued from IPSs and IDSs. 

To simulate phishing attacks.

https://training.fortinet.com/mod/quiz/review.php?attempt=2385588&cmid=12860 2/2