exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 296 discussion

Actual exam question from CompTIA's CS0-002
Question #: 296
Topic #: 1
[All CS0-002 Questions]

A cybersecurity analyst is working with a SIEM tool and reviewing the following table:



When creating a rule in the company's SIEM, which of the following would be the BEST approach for the analyst to use to assess the risk level of each vulnerability that is discovered by the vulnerability assessment tool?

  • A. Create a trend with the table and join the trend with the desired rule to be able to extract the risk level of each vulnerability
  • B. Use Boolean filters in the SIEM rule to take advantage of real-time processing and RAM to store the table dynamically, generate the results faster, and be able to display the table in a dashboard or export it as a report
  • C. Use a static table stored on the disk of the SIEM system to correlate its data with the data ingested by the vulnerability scanner data collector
  • D. Use the table as a new index or database for the SIEM to be able to use multisearch and then summarize the results as output
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
knister
Highly Voted 2 years, 4 months ago
And this is why I use examtopics, because the quality of these questions from CompTIA is just hilarious.
upvoted 18 times
...
gnnggnnggnng
Highly Voted 2 years, 5 months ago
Selected Answer: B
The option B, using Boolean filters in the SIEM rule, would be the best approach because it allows the analyst to quickly and efficiently filter the vulnerability data based on the desired risk level criteria. By using Boolean filters in the SIEM rule, the analyst can take advantage of real-time processing and RAM to dynamically store and process the data, generating results faster and allowing for easier display and reporting of the results. This approach is faster and more efficient than a static table stored on disk or using the table as a new index or database for the SIEM.
upvoted 7 times
...
skibby16
Most Recent 1 year, 9 months ago
Selected Answer: D
he best approach for assessing the risk level of each vulnerability discovered by the vulnerability assessment tool in a SIEM (Security Information and Event Management) system is to use the table as a new index or database. This approach allows for efficient data storage and retrieval, as well as the ability to use multisearch capabilities within the SIEM.
upvoted 1 times
...
db97
2 years, 5 months ago
Selected Answer: B
I work for a SOC and I do the option B very often
upvoted 5 times
2Fish
2 years, 4 months ago
I would agree here. creating a decent dashboard is what we do as well.
upvoted 1 times
...
...
Cock
2 years, 5 months ago
Selected Answer: C
The best approach to assess the risk level of each vulnerability that is discovered by the vulnerability assessment tool when creating a rule in the company's SIEM would be to use a static table stored on the disk of the SIEM system to correlate its data with the data ingested by the vulnerability scanner data collector. This approach enables the analyst to combine the vulnerability data with other data sources such as logs, events, or alerts, to identify relevant indicators of compromise (IOCs), and increase the accuracy of the alerts. Using a static table stored on the disk of the SIEM system is also beneficial as it ensures data persistence, and can be easily updated and correlated with new data sources.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...