100% Free Exams (No login or credit card required)

Section 4.4

Demonstrate your acquired knowledge about explaining security alerting and monitoring concepts and tools. This will demonstrate your proficiency for section 4.4 of the Security+ SY0-701 objectives.

1 / 25

Verifying that malware definitions are up to date is a form of:

2 / 25

Storing logs offsite for disaster recovery is:

3 / 25

Capturing detailed application errors in real time uses:

4 / 25

Automating rule-based log inspection often relies on:

5 / 25

Reducing noise before escalating events is part of:

6 / 25

Identifying unauthorized configuration changes uses:

7 / 25

Checking file integrity on servers is best done with:

8 / 25

Ensuring logs conform to a standard format uses:

9 / 25

Finding missing patches and CVEs uses a:

10 / 25

Analyzing network traffic flows for anomalies is:

11 / 25

Receiving notifications of device failures uses:

12 / 25

Preventing confidential data from leaving endpoints uses:

13 / 25

Detecting and removing malware in real time is done by:

14 / 25

Centralizing event correlation and dashboards is a function of:

15 / 25

Monitoring without local software uses which method?

16 / 25

Software installed on endpoints to collect data is called:

17 / 25

Pre-defined configuration checks are provided by:

18 / 25

Which protocol standardizes automated security checks?

19 / 25

Reducing false positives by adjusting rules is:

20 / 25

Automatically isolating a compromised host is an example of:

21 / 25

Storing old logs for compliance is called:

22 / 25

Summarizing security events for executives is:

23 / 25

Periodically examining systems for missing patches is known as:

24 / 25

Notifying staff immediately when a threshold is crossed describes:

25 / 25

Aggregating logs from servers, firewalls and endpoints is called:

Your score is

The average score is 0%

0%