Decoded: The Cybersecurity Podcast

ISC2 CC Domain 5: Security Operations Exam Study Questions by Edward Henriquez


Listen Later

Domain 5: Security Operations


What is the first step in the incident response process?

A. Containment

B. Detection and identification

C. Recovery

D. Eradication

Answer: B


What is the purpose of log analysis in security operations?

A. Enhance system performance

B. Identify and respond to suspicious activities

C. Encrypt data

D. Monitor user activity

Answer: B


Which of the following is a security incident?

A. Failed login attempt

B. Unauthorized access to sensitive files

C. Network scan from a trusted device

D. Scheduled maintenance

Answer: B


What is the purpose of a Security Information and Event Management (SIEM) system?

A. Detect malware

B. Centralize security monitoring and alerts

C. Automate patching

D. Block logins

Answer: B


What does “false positive” mean in security monitoring?

A. Actual threat detected

B. Threat blocked successfully

C. Benign activity mistaken as a threat

D. Failed login attempt

Answer: C


What is the primary purpose of vulnerability scanning?

A. Identify unpatched systems

B. Block malicious IPs

C. Encrypt communications

D. Monitor bandwidth

Answer: A


What is a common use case for a playbook in incident response?

A. Automate tasks

B. Guide teams through response

C. Configure firewall rules

D. Test vulnerabilities

Answer: B


What is the purpose of data retention policies?

A. Encrypt sensitive files

B. Define data storage duration

C. Automate backups

D. Block unauthorized access

Answer: B


Which type of malware locks users out until a ransom is paid?

A. Worm

B. Ransomware

C. Trojan

D. Spyware

Answer: B


What is the purpose of forensic analysis in security?

A. Detect ongoing attacks

B. Collect and analyze evidence

C. Enhance encryption

D. Automate scans

Answer: B


Which of the following prevents insider threats?

A. Network segmentation

B. Access monitoring and logging

C. Multi-factor authentication

D. Encryption

Answer: B


What is an important step in the post-incident process?

A. Block all external connections

B. Perform a root cause analysis

C. Encrypt logs

D. Restore access

Answer: B


Which of the following is an advanced persistent threat (APT)?

A. Phishing email

B. Long-term targeted attack by a skilled group

C. Malware via USB drives

D. Brute force attack

Answer: B


What is a zero-day vulnerability?

A. Exploited weakness before patch release

B. Outdated system vulnerability

C. Malware-infected system

D. Known weakness with no exploit

Answer: A


What is the purpose of a sandbox in malware analysis?

A. Isolate and observe suspicious programs

B. Encrypt files

C. Block traffic

D. Restore files

Answer: A


What is the role of a disaster recovery plan?

A. Restore operations after disruption

B. Prevent phishing attacks

C. Automate backups

D. Enforce compliance

Answer: A


What is the purpose of a business impact analysis (BIA)?

A. Identify critical functions and their loss impact

B. Detect malware infections

C. Test firewall efficiency

D. Test disaster plans

Answer: A


Which of the following is part of change management?

A. Evaluate risks before changes

B. Block unauthorized IPs

C. Automate vulnerability scans

D. Monitor physical access

Answer: A


What is the purpose of least privilege in access control?

A. Minimize user/system permissions

B. Encrypt data

C. Maximize productivity

D. Improve password complexity

Answer: A


What does a data loss prevention (DLP) solution do?

A. Prevents sensitive data from unauthorized access/transmission

B. Encrypts all network traffic

C. Blocks malicious email attachments

D. Restores deleted files

Answer: A


Patreon Support:


https://www.patreon.com/DecodedPodcast

...more
View all episodesView all episodes
Download on the App Store

Decoded: The Cybersecurity PodcastBy Edward Henriquez

  • 4.8
  • 4.8
  • 4.8
  • 4.8
  • 4.8

4.8

4 ratings


More shows like Decoded: The Cybersecurity Podcast

View all
Crime Junkie by Audiochuck

Crime Junkie

369,043 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

138 Listeners

CISSP Cyber Training Podcast - CISSP Training Program by Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

CISSP Cyber Training Podcast - CISSP Training Program

32 Listeners