Q: What security term describes the identification of a potential security event, triaging it, and handing it off to a more experienced team member?
- SOC operations
- Incident escalation
- Social engineering
- Data security protection
Q: Fill in the blank: _____ is a skill that will help you identify
security incidents that need to be escalated.
- Leadership
- Graphics design
- Attention to detail
- Linux operations
Q: What elements of security do terms like unauthorized access, malware
infections, and improper usage describe?
- Public press releases
- Company job descriptions
- Phishing attempts
- Incident classification types
Q: Which incident type involves an employee violating an organization’s
acceptable use policy?
- Phishing
- Unauthorized access
- Malware infection
- Improper usage
Q: Which of the following security incidents can have the most damaging
impact to an organization?
- An employee forgets their password and logs too many failed login attempts
- A system containing customer PII is compromised
- The guest Wi-Fi network for a company is hacked
- A company’s social media account is compromised
Q: What is the best way to determine the urgency of a security incident?
- Email the Chief Information Security Officer (CISO) of the company for clarification.
- Identify the importance of the assets affected by the security incident.
- Reach out to the organization’s Red Team supervisor to determine urgency.
- Contact the risk assessment team to determine urgency.
Q: What security term is defined as a set of actions that outlines who
should be notified when an incident alert occurs?
- A vulnerability scan system
- A security risk assessor
- A network architecture alert
- An escalation policy
Q: Why is it important for analysts to follow a company’s escalation
policy? Select two answers.
- An escalation policy can help analysts prioritize which security events need to be escalated with more or less urgency.
- An escalation policy can help analysts determine the best way to cross-collaborate with other members of their organization.
- An escalation policy instructs analysts on the right person to contact during an incident.
- An escalation policy can help analysts determine which tools to use to solve an issue.
Q: A new security analyst has just been hired to an organization and is
advised to read through the company’s escalation policy. What kind of
information will the analyst be educated on when reading through this policy?
- They will learn when and how to escalate security incidents.
- They will learn the best way to create visual dashboards to communicate with executives.
- They will learn how to use the Linux operating system. They will learn the best way to communicate with stakeholders.
Q: Which skills will help you identify security incidents that need to
be escalated? Select two answers.
- Excellent communication skills
- Ability to follow an organization’s escalation guidelines or processes
- Ability to collaborate well with others
- Attention to detail
Q: As a security analyst, you might be asked to escalate various
incidents. Which of the following are common incident classification types?
Select two answers.
- Gift card scam
- Unauthorized access
- SPAM
- Malware infection
Q: An employee attempting to access software on their work device for
personal use can be an example of what security incident type?
- Unauthorized access
- Improper usage
- Social engineering
- Malware infection
Q: A security analyst for an organization notices unusual log activity
in an app that was recently banned from the organization. However, the analyst
forgets to escalate this activity to the proper personnel. What potential
impact can this small incident have on the organization?
- The third-party assessment team might be removed by the organization.
- Small incidents rarely have any impact on an organization.
- The organization might need to delete its social media profile.
- It can become a bigger threat.
Q: How can an escalation policy help security analysts do their jobs?
- An escalation policy educates analysts on how to be aware of phishing attempts.
- An escalation policy outlines who should be notified when an incident occurs.
- An escalation policy instructs the analysts on how to scan for vulnerabilities.
- An escalation policy outlines when to alert the public of a data breach.
Q: You have recently been hired as a security analyst for an
organization. You previously worked at another company doing security, and you
were very familiar with their escalation policy. Why would it be important for
you to learn your new company’s escalation policy?
- Every company has a different escalation policy, and it is an analyst’s job to ensure incidents are handled correctly.
- The escalation policy will help you with vulnerability scanning.
- The policy will help you analyze data logs.
- The policy will advise you on who to report to each day.
Q: Fill in the blank: A/An _____ will help an entry-level analyst to
know when and how to escalate a security incident.
- escalation policy
- blue team CIRT guideline
- executive security dashboard
- employee security handbook
Q: Which of the following security incidents is likely to have the most
negative impact on an organization?
- An employee having a phone conversation about a work project in the breakroom
- Unauthorized access to a manufacturing application
- An employee sends an email to the wrong colleague
- An employee’s account flagged for multiple login attempts
Q: Fill in the blank: Entry-level analysts might need to escalate
various incident types, including _____.
- mismanagement of funds
- missing software
- noncompliance of tax laws
- improper usage
Q: You are alerted that a hacker has gained unauthorized access to one
of your organization’s manufacturing applications. At the same time, an
employee’s account has been flagged for multiple failed login attempts. Which
incident should be escalated first?
- The best thing to do is escalate the incident that your supervisor advised you to escalate first.
- The incident involving the malicious actor who has gained unauthorized access to the manufacturing application should be escalated first.
- The incident involving the employee who is unable to log in to their account should be escalated first.
- Both security incidents should be escalated at the same time.
- The company can suffer a financial loss.
- The company can suffer a loss in reputation.
- The company’s antivirus software can be uninstalled.
- The company’s employee retention percentage can decrease drastically.
Q: Unauthorized access to a system with PII is _____ critical than an
employee’s account being flagged for multiple failed login attempts.
- less
- equally
- marginally
- more