Security Operations
Enhance security operations processes, differentiate threat intelligence and threat hunting, and identify malicious activity using appropriate tools.
In the context of the CompTIA Cybersecurity Analyst+ (CySA+) certification, Security Operations constitutes the tactical, day-to-day defense of an organization's digital assets. It centers on the functionalities typically performed within a Security Operations Center (SOC), where analysts monitor, …
CySA+ - Security Operations Example Questions
Test your knowledge of Security Operations
Question 1
During a security architecture review, a team is discussing how to improve their monitoring capabilities across cloud, on-premises, and endpoint environments. A junior analyst asks why organizations invest in single pane of glass solutions when individual tools already provide their own dashboards. Which response BEST explains the strategic advantage of this consolidated approach?
Question 2
A security analyst is reviewing a Wireshark capture and notices HTTP traffic containing encoded data in the User-Agent field that appears to follow a base64 pattern with regular beacon intervals of approximately 60 seconds. Which threat activity does this traffic characteristic most strongly suggest?
Question 3
A security analyst examining a Wireshark capture of suspected lateral movement activity observes multiple SMB connections from a single workstation to various internal servers. The analyst notices that each SMB session negotiation includes NTLM authentication with the same username but different challenge-response pairs. When applying the display filter 'ntlmssp.auth.username' to correlate these events, which additional Wireshark analysis technique would best help determine if credential harvesting tools like Mimikatz were used prior to this activity?