Comptia security+ Virtual Lab 7.1
¡Supera tus tareas y exámenes ahora con Quizwiz!
Which of the following is a condition that is shown as a result when it does not exist?
False Positive
Which of the following is achieved by Security Orchestration, Automation, Response (SOAR)?
Automation
Which of the following is used for continuous monitoring of logs?
Security information and event management (SIEM)
Which of the following type of vulnerability scan can also attempt to exploit the vulnerabilities?
Intrusive
Which of the following method of threat hunting includes disrupt, deny, destroy, and degrade actions?
Maneuvering