ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 322 - CAS-004 discussion

Report
Export

A security analyst is reviewing SIEM events and is uncertain how to handle a particular event. The file is reviewed with the security vendor who is aware that this type of file routinely triggers this alert.

Based on this information, the security analyst acknowledges this alert Which of the following event classifications is MOST likely the reason for this action?

A.
True negative
Answers
A.
True negative
B.
False negative
Answers
B.
False negative
C.
False positive
Answers
C.
False positive
D.
Non-automated response
Answers
D.
Non-automated response
Suggested answer: C

Explanation:

The security analyst acknowledges this alert because it is a false positive. A false positive is an event classification that indicates a benign or normal activity is mistakenly flagged as malicious or suspicious by the SIEM system. A false positive can occur due to misconfigured rules, outdated signatures, or faulty algorithms. A false positive can waste the security analyst's time and resources, so it is important to acknowledge and dismiss it after verifying that it is not a real threat. Verified

Reference:

https://www.ibm.com/topics/siem

https://www.microsoft.com/en-us/security/business/security-101/what-is-siem

https://www.splunk.com/en_us/data-insider/what-is-siem.html

asked 02/10/2024
Rico Banagale
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first