Uploaded by Katy Morgan

EC-Council 112-56 SCE Certification Exam Questions and Answers PDF

advertisement
EC-Council 112-56 SCE
Certification Exam
Questions and Answers PDF
EC-Council 112-56 Exam Guide
www.EduSum.com
Get complete detail on EC-Council 112-56 exam guide to crack EC-Council SOC
Essentials. You can collect all information on EC-Council 112-56 tutorial,
practice test, books, study material, exam questions, and syllabus. Firm your
knowledge on EC-Council SOC Essentials and get ready to crack EC-Council
112-56 certification. Explore all information on EC-Council 112-56 exam with
number of questions, passing percentage and time duration to complete test.
WWW.EDUSUM.COM
PDF
Introduction to 112-56 EC-Council SOC
Essentials (SCE) Exam
The EC-Council 112-56 Exam is challenging and thorough preparation is essential for
success. This exam study guide is designed to help you prepare for the SCE
certification exam. It contains a detailed list of the topics covered on the Professional
exam, as well as a detailed list of preparation resources. This study guide for the ECCouncil SOC Essentials will help guide you through the study process for your
certification.
112-56 EC-Council SOC Essentials Exam Summary
●
●
●
●
●
●
●
●
●
●
Exam Name: EC-Council SOC Essentials
Exam Code: 112-56
Exam Price: $299 (USD)
Duration: 120 mins
Number of Questions: 75
Passing Score: 70%
Reference Books:
Schedule Exam: ECC Exam Center
Sample Questions: EC-Council SCE Sample Questions
Recommended Practice: EC-Council 112-56 Certification Practice Exam
EC-Council SOC Essentials
1
WWW.EDUSUM.COM
PDF
Exam Syllabus: 112-56 EC-Council SOC Essentials (SCE)
Topic
Details
- Computer Network
- TCP/IP Model
- OSI Model
- Types of Networks
- Network Model
Computer Network - Network Topologies
and Security
- TCP/IP Protocol Suite
Fundamentals
- Network Security Controls
- Network Security Devices
- Windows Security
- Unix/Linux Security
- Web Application Fundamentals
- Information Security Standards, Laws, and Acts
- Cyber Threats
- Intent-Motive-Goal
- Tactics-Techniques-Procedures (TTPs)
- Opportunity-Vulnerability-Weakness
- Vulnerability
- Threats & Attacks
Fundamentals of
- Example of Attacks
Cyber Threats
- Network-based Attacks
- Application-based
- Host Based Attacks
- Insider Attacks
- Malware (Viruses, Worms, Ransomware, etc.)
- Phishing and Social Engineering
- What is a Security Operations Center (SOC)?
- Importance of SOC
- SOC Team Roles and Responsibilities
Introduction to
- SOC KPI
Security Operations
- SOC Metrics
Center
- SOC Maturity Models
- SOC Workflow and Processes
- Challenges in Operating a SOC
- Key Components of a SOC
- People in SOC
- Processes in SOC
SOC Components - Technologies in SOC
and Architecture
- SOC Architecture and Infrastructure
- Different Types of SOC and Their Purposes
- Introduction to SIEM
- SIEM Architecture
EC-Council SOC Essentials
2
WWW.EDUSUM.COM
PDF
Topic
Details
- SIEM Deployment Models
- Data Sources in SIEM
- SIEM Logs
- Networking in SIEM
- Endpoint Data in SIEM
- Incident
- Event
- Log
- Typical Log Sources
Introduction to Log - Need of Log
Management
- Typical Log Format
- Local Log Management
- Centralized Log Management
- Logging Best Practices
- Logging/Log Management Tools
- SIEM Use Case Development
- Security Monitoring and Analysis
- Correlation Rules
- Dashboards
- Reports
Incident Detection
- Alerting
and Analysis
- Triaging Alerts
- Dealing with False Positive Alerts
- Incident Escalation
- Communication Paths
- Ticketing Systems
- Introduction to Threat Intelligence
- Threat Intelligence Sources
- Threat Intelligence Types
- Threat Intelligence Lifecycle
- Role of Threat Intelligence in SOC Operations
- Threat Intelligence Feeds
Threat Intelligence - Threat Intelligence Sharing and Collaboration
and Hunting
- Threat Intelligence Tools/Platforms
- Introduction to Threat Hunting
- Threat Hunting Techniques
- Threat Hunting Methodologies
- Role of Threat Hunting in SOC Operations
- Leveraging Threat Intelligence for Hunting
- Threat Hunting Tools
- Incident Handling Process
Incident Response - Incident Classification and Prioritization
and Handling
- Incident Response Lifecycle
- Preparation
EC-Council SOC Essentials
3
WWW.EDUSUM.COM
Topic
PDF
Details
- Identification
- Containment
- Eradication
- Recovery
- Post-Incident Analysis and Reporting
EC-Council 112-56 Certification Sample Questions and
Answers
To make you familiar with EC-Council SOC Essentials (112-56) certification exam
structure, we have prepared this sample question set. We suggest you to try our
Sample Questions for SOC Essentials 112-56 Certification to test your understanding of
the EC-Council 112-56 process with the real EC-Council certification exam
environment.
112-56 EC-Council SOC Essentials Sample Questions:01. Which protocol operates at the Internet layer of the TCP/IP model?
a) Ethernet
b) ARP
c) UDP
d) IP
02. What does triaging alerts involve in the context of a SOC?
a) Deciding the priority and severity of alerts
b) Sorting emails by importance
c) Organizing social events
d) Categorizing company products
03. What type of network is typically used to connect devices within a single
building?
a) WAN
b) MAN
c) LAN
d) PAN
04. During which phase is the root cause of an incident thoroughly investigated?
a) Preparation
EC-Council SOC Essentials
4
WWW.EDUSUM.COM
PDF
b) Identification
c) Eradication
d) Post-Incident Analysis
05. Which SOC model is particularly useful for organizations with limited security
budgets?
a) Fully outsourced SOC
b) In-house SOC
c) Hybrid SOC
d) Virtual SOC
06. Identify a common characteristic of 'insider attacks'.
a) They are always intentional and malicious
b) They originate outside the organization
c) They may involve employees abusing their access rights
d) They are less harmful than external attacks
07. How does threat hunting differ from automated threat detection?
a) Threat hunting is a reactive process based solely on known threats
b) Threat hunting is a proactive and iterative approach to search for hidden threats
c) Threat hunting uses only automated tools without human intervention
d) Threat hunting is focused on improving team morale
08. How does a 'Trojan horse' typically present itself?
a) As a legitimate software
b) As an email from a friend
c) As a network service
d) As an antivirus update
09. Which aspect of SOC focuses on the people involved in operations?
a) Infrastructure
b) Processes
c) Technologies
d) People
10. Identify the network topology that is highly fault-tolerant due to the direct
connection between each pair of nodes.
a) Ring
b) Mesh
c) Star
EC-Council SOC Essentials
5
WWW.EDUSUM.COM
PDF
d) Bus
Answers:Answer 01:- d
Answer 02:- a
Answer 03:- c
Answer 04:- d
Answer 05:- a
Answer 06:- c
Answer 07:- b
Answer 08:- a
Answer 09:- d
Answer 10:- b
EC-Council SOC Essentials
6
Download