0% found this document useful (0 votes)
294 views9 pages

Cybersecurity and Wazuh SIEM Knowledge Quiz

The document is a quiz focused on cybersecurity concepts and the Wazuh SIEM tool, including questions about the CIA triad, types of attacks, and specific functionalities of Wazuh. It covers various topics such as vulnerability scanning, alert generation, and communication protocols used in Wazuh. The quiz aims to assess knowledge on cybersecurity principles and the operational aspects of Wazuh as a security information and event management system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
294 views9 pages

Cybersecurity and Wazuh SIEM Knowledge Quiz

The document is a quiz focused on cybersecurity concepts and the Wazuh SIEM tool, including questions about the CIA triad, types of attacks, and specific functionalities of Wazuh. It covers various topics such as vulnerability scanning, alert generation, and communication protocols used in Wazuh. The quiz aims to assess knowledge on cybersecurity principles and the operational aspects of Wazuh as a security information and event management system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Cybersecurity and

Wazuh SIEM
Knowledge Quiz
Sign in to Google to save your progress.
Learn more

1. Which of the following is a 1 point

fundamental goal of cybersecurity?

Speed

Scalability

Con1dentiality

Affordability

2. What does the CIA triad stand for in 1 point

cybersecurity?

a) Central Intelligence Agency

b) Control, Integrity, Authorization

c) Con1dentiality, Integrity, Availability

d) Communication, Integration, Access


:
3. Which of the following is an 1 point

example of a passive attack?

a) Man-in-the-Middle

b) SQL Injection

c) Eavesdropping

d) Denial of Service

4. Phishing is a type of: 1 point

a) Malware

b) Social Engineering

c) Brute Force Attack

d) Firewall

5. Which tool is typically used for 1 point


vulnerability scanning?

a) Wireshark

b) Nmap

c) Burp Suite

d) Nessus
:
6. Which port does HTTPS use by 1 point
default?

a) 80

b) 20

c) 443

d) 8080

7. Which cybersecurity framework is 1 point


developed by NIST?

a) ISO 27001

b) COBIT

c) NIST CSF

d) ITIL

8. A firewall is a type of: 1 point

a) Antivirus

b) Intrusion Detection System

c) Access Control

d) Network Security Device


:
9. Zero-day vulnerability refers to: 1 point

a) A patch released the same day

b) A vulnerability unknown to the vendor

c) A known exploit

d) A physical security breach

10. What is the primary function of an 1 point

SOC (Security Operations Center)?

a) Building applications

b) Conducting audits

c) Monitoring and responding to security


incidents

d) Developing malware

11. Wazuh as a SIEM (Intermediate to 1 point

Expert)
Wazuh is primarily based on which
open-source project?

a) Zeek

b) OSSEC

c) Snort

d) Kibana
:
12. Which component in Wazuh 1 point
collects log data from endpoints?

a) Wazuh Server

b) Wazuh Manager

c) Wazuh Agent

d) Filebeat

13. Which of the following is NOT a 1 point

capability of Wazuh?

a) Log analysis

b) Vulnerability scanning

c) Antivirus scanning

d) File integrity monitoring

14. Which engine does Wazuh use for 1 point

alert storage and search?

a) Logstash

b) Elasticsearch

c) MySQL

d) Redis
:
15. Wazuh uses which tool for 1 point
visualization and dashboards?

a) Grafana

b) Prometheus

c) Splunk

d) Kibana

16. The Wazuh manager is responsible 1 point

for:

a) Storing logs only

b) Displaying dashboards

c) Correlating events and generating alerts

d) Hosting web interface

17. Which configuration file is used to 1 point

define rules in Wazuh?

a) agent.conf

b) ruleset.conf

c) ossec.conf

d) wazuh.conf
:
18. In a Wazuh setup, which 1 point
component forwards logs to
Elasticsearch?

a) Filebeat

b) Wazuh Agent

c) Wazuh Dashboard

d) Curator

19. Which Wazuh component provides 1 point

the web interface for dashboards and


alerts?

a) Wazuh Agent

b) Wazuh Manager

c) Wazuh Dashboard

d) Elasticsearch

20. Wazuh agents can be installed on: 1 point

a) Only Linux

b) Linux and Windows only

c) Linux, Windows, and macOS

d) Linux and macOS only


:
21. Wazuh integrates with which tool 1 point
for vulnerability detection?

a) OpenVAS

b) Nmap

c) Vulners

d) Nessus

22. Which of the following is used for 1 point


secure communication between Wazuh
components?

a) SSL/TLS

b) FTP

c) HTTP

d) SCP

23. How does Wazuh perform File 1 point


Integrity Monitoring (FIM)?

a) By using hash comparison

b) By scanning for malware

c) By blocking ports

d) By deleting suspicious 1les


:
24. Wazuh alerts are generated based 1 point
on:

a) Packet inspection

b) Custom scripts only

c) Prede1ned rule sets

d) System calls only

25. Which of the following best 1 point

describes Wazuh’s architecture?

a) Centralized and monolithic

b) Distributed and modular

c) Peer-to-peer

d) Cloud-native only

Submit Clear form

This content is neither created nor endorsed by Google. - Terms


of Service - Privacy Policy

Does this form look suspicious? Report

Forms
:

You might also like