Cybersecurity and
Wazuh SIEM
Knowledge Quiz
Sign in to Google to save your progress.
Learn more
1. Which of the following is a 1 point
fundamental goal of cybersecurity?
Speed
Scalability
Con1dentiality
Affordability
2. What does the CIA triad stand for in 1 point
cybersecurity?
a) Central Intelligence Agency
b) Control, Integrity, Authorization
c) Con1dentiality, Integrity, Availability
d) Communication, Integration, Access
:
3. Which of the following is an 1 point
example of a passive attack?
a) Man-in-the-Middle
b) SQL Injection
c) Eavesdropping
d) Denial of Service
4. Phishing is a type of: 1 point
a) Malware
b) Social Engineering
c) Brute Force Attack
d) Firewall
5. Which tool is typically used for 1 point
vulnerability scanning?
a) Wireshark
b) Nmap
c) Burp Suite
d) Nessus
:
6. Which port does HTTPS use by 1 point
default?
a) 80
b) 20
c) 443
d) 8080
7. Which cybersecurity framework is 1 point
developed by NIST?
a) ISO 27001
b) COBIT
c) NIST CSF
d) ITIL
8. A firewall is a type of: 1 point
a) Antivirus
b) Intrusion Detection System
c) Access Control
d) Network Security Device
:
9. Zero-day vulnerability refers to: 1 point
a) A patch released the same day
b) A vulnerability unknown to the vendor
c) A known exploit
d) A physical security breach
10. What is the primary function of an 1 point
SOC (Security Operations Center)?
a) Building applications
b) Conducting audits
c) Monitoring and responding to security
incidents
d) Developing malware
11. Wazuh as a SIEM (Intermediate to 1 point
Expert)
Wazuh is primarily based on which
open-source project?
a) Zeek
b) OSSEC
c) Snort
d) Kibana
:
12. Which component in Wazuh 1 point
collects log data from endpoints?
a) Wazuh Server
b) Wazuh Manager
c) Wazuh Agent
d) Filebeat
13. Which of the following is NOT a 1 point
capability of Wazuh?
a) Log analysis
b) Vulnerability scanning
c) Antivirus scanning
d) File integrity monitoring
14. Which engine does Wazuh use for 1 point
alert storage and search?
a) Logstash
b) Elasticsearch
c) MySQL
d) Redis
:
15. Wazuh uses which tool for 1 point
visualization and dashboards?
a) Grafana
b) Prometheus
c) Splunk
d) Kibana
16. The Wazuh manager is responsible 1 point
for:
a) Storing logs only
b) Displaying dashboards
c) Correlating events and generating alerts
d) Hosting web interface
17. Which configuration file is used to 1 point
define rules in Wazuh?
a) agent.conf
b) ruleset.conf
c) ossec.conf
d) wazuh.conf
:
18. In a Wazuh setup, which 1 point
component forwards logs to
Elasticsearch?
a) Filebeat
b) Wazuh Agent
c) Wazuh Dashboard
d) Curator
19. Which Wazuh component provides 1 point
the web interface for dashboards and
alerts?
a) Wazuh Agent
b) Wazuh Manager
c) Wazuh Dashboard
d) Elasticsearch
20. Wazuh agents can be installed on: 1 point
a) Only Linux
b) Linux and Windows only
c) Linux, Windows, and macOS
d) Linux and macOS only
:
21. Wazuh integrates with which tool 1 point
for vulnerability detection?
a) OpenVAS
b) Nmap
c) Vulners
d) Nessus
22. Which of the following is used for 1 point
secure communication between Wazuh
components?
a) SSL/TLS
b) FTP
c) HTTP
d) SCP
23. How does Wazuh perform File 1 point
Integrity Monitoring (FIM)?
a) By using hash comparison
b) By scanning for malware
c) By blocking ports
d) By deleting suspicious 1les
:
24. Wazuh alerts are generated based 1 point
on:
a) Packet inspection
b) Custom scripts only
c) Prede1ned rule sets
d) System calls only
25. Which of the following best 1 point
describes Wazuh’s architecture?
a) Centralized and monolithic
b) Distributed and modular
c) Peer-to-peer
d) Cloud-native only
Submit Clear form
This content is neither created nor endorsed by Google. - Terms
of Service - Privacy Policy
Does this form look suspicious? Report
Forms
: