NSCT – Security Monitoring & Auditing MCQs 20 min Score: 0 Attempted: 0/20 Subscribe 1. . Security Monitoring is the process of: (A) Continuously observing systems, networks, and applications for security threats (B) Deleting old files (C) Increasing CPU speed (D) Compressing logsShow All AnswersShow All Answers 2. . Security Auditing involves: (A) Encrypting files automatically (B) Reviewing and evaluating security policies, controls, and activities (C) Deleting unnecessary accounts (D) Compressing backupsShow All Answers 3. . A Security Information and Event Management (SIEM) system is used to: (A) Encrypt files (B) Collect, analyze, and correlate security event data (C) Compress logs (D) Increase system speedShow All Answers 4. . Intrusion Detection System (IDS) helps to: (A) Detect unauthorized access or suspicious activity in a network (B) Delete malware automatically (C) Compress files (D) Increase bandwidthShow All Answers 5. . Intrusion Prevention System (IPS) differs from IDS in that it: (A) Can block or prevent attacks in real time (B) Only logs events (C) Compresses data (D) Encrypts files automaticallyShow All Answers 6. . Log management is important because: (A) Deletes old files (B) It helps in detecting security incidents and auditing activities (C) Speeds up system performance (D) Compresses data automaticallyShow All Answers 7. . Security audits help organizations to: (A) Delete old accounts (B) Ensure compliance with policies, standards, and regulations (C) Increase network speed (D) Compress logsShow All Answers 8. . Continuous monitoring in cybersecurity aims to: (A) Delete unnecessary logs (B) Encrypt all files automatically (C) Detect threats and vulnerabilities in real time (D) Compress dataShow All Answers 9. . Anomalous activity in monitoring is: (A) Normal CPU usage (B) Behavior that deviates from normal patterns (C) Regular file backup (D) Compressed log filesShow All Answers 10. . Security baselines are used to: (A) Increase network speed (B) Delete unnecessary files (C) Encrypt data (D) Establish normal operating parameters for systems and networksShow All Answers 11. . Auditing trails or logs are essential for: (A) Encrypting files (B) Investigating incidents and ensuring accountability (C) Compressing backups (D) Increasing CPU performanceShow All Answers 12. . Network monitoring tools help to: (A) Track traffic patterns and detect suspicious activities (B) Delete files (C) Compress logs (D) Encrypt all data automaticallyShow All Answers 13. . File integrity monitoring ensures: (A) Faster backups (B) That critical files are not altered, deleted, or tampered with (C) Compressed files (D) Increased CPU performanceShow All Answers 14. . Vulnerability scanning is part of security monitoring to: (A) Encrypt files automatically (B) Delete malware (C) Compress logs (D) Identify security weaknesses before they are exploitedShow All Answers 15. . Security auditing can be: (A) Only during system updates (B) Only by the IT department (C) Only automatic (D) Internal (by employees) or external (by third parties)Show All Answers 16. . Compliance audits check for: (A) Adherence to laws, regulations, and organizational policies (B) CPU performance (C) File compression (D) Network speedShow All Answers 17. . Real-time alerts in monitoring systems help to: (A) Compress logs (B) Delete old files (C) Notify administrators immediately about suspicious or malicious activity (D) Increase internet speedShow All Answers 18. . Security Key Performance Indicators (KPIs) are used to: (A) Measure effectiveness of security controls and monitoring (B) Compress logs (C) Delete old accounts (D) Encrypt all filesShow All Answers 19. . Event correlation in monitoring helps to: (A) Compress logs (B) Delete unnecessary files (C) Increase CPU performance (D) Identify patterns across multiple logs to detect complex attacksShow All Answers 20. . The main goal of security monitoring and auditing is to: (A) Delete unnecessary accounts (B) Compress data (C) Detect threats, ensure compliance, and improve overall security posture (D) Increase system speed onlyShow All Answers