DE Leadership
FAZ
SIEM
Anything CTI (CTI will not answer unless hives cannot)
Assessments
100

What is Wes favorite drink?

Shirley Temple

100

FAZ is commonly used in MSSP environments to manage and analyze this type of data?

Logs

100

How many times a day does Aaron reboot me? 

at least once 

100

What are the three attributes that define a threat?

Opportunity, Intent, Capability.

100

What assessment technique evaluates the effectiveness of incident response plans through a simulated breach?

Tabletop exercise

200

This leadership role is responsible for handling escalations within the SOC teams?

SOC Director

200

This component of FAZ allows for real-time log monitoring across multiple devices?

Firewalls

200

What is the primary function of a SIEM solution in a cybersecurity environment?

Collecting, analyzing, and correlating security event logs.

200

What entities are covered in CTIs 4+1 Report?

Russia, China, North Korea, Iran, Non Nation actors.

200

What type of assessment evaluates how well security controls have been implemented?

Security Audit

300

This role within DE Leadership is responsible for overseeing security operations across multiple regions?

Global SOC Operations Director

300

This component of FAZ allows for real-time log monitoring across multiple devices?

Log Forwarding

300

This type of data source is essential for a SIEM to detect lateral movement in a network?

Network traffic logs

300

What are the three types of sensitive information?

SI (sensitive information), PI (proprietary information), PII (Personally Identifiable Information). 

300

What assessment technique simulates an adversary's actions to evaluate the defense capabilities of an organization?

Red team exercise

400

DefendEdge Leadership uses this framework to ensure responsibilities are clearly defined between departments?

RACI or RACI matrix

400

FAZ integrates with FortiGate firewalls to offer this real-time feature?

Threat Correlation

400

This SIEM strategy involves using machine learning to detect unknown threats?

Anomaly-based detection

400

What is the difference between information and intelligence?

Info is raw data collected from any source, while intelligence is information that has been processed, analyzed, and contextualized into a workable and usable form.

400

What assessment imitates the tactics and behaviors of attackers to assess the security posture of an organization's network, computer system, or web application?

Pen test

500

For what school district is Taso an active board member?

Addison School District 4

500

FAZ uses what technology to provide MSSPs with intelligent insights into network traffic patterns?

Machine Learning

500

When a SIEM solution integrates with what tool, it can automatically take actions like isolating devices?

SOAR (Security Orchestration, Automation, and Response)

500

What are the 4 products that the CTI team provides to clients on a schedule basis?

Cyber Advisory (Thursday every week).
iDNA (1st of every month).
4+1 Report (15th of every month).
Global Threat Summary (Once Every 6 months). 

500

What assessment framework is commonly used to evaluate an organization’s compliance with cybersecurity policies?

NIST Cybersecurity Framework

M
e
n
u