Live Virtual Machine Lab 7.1: Module 07 Security Assessment Techniques

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is achieved by Security Orchestration, Automation, Response (SOAR)? Availability Automation Integrity Confidentiality

Automation

Which of the following is a condition that is shown as a result when it does not exist? True Positive False Negative Negative Negative False Positive

False Positive

Which of the following type of vulnerability scan can also attempt to exploit the vulnerabilities? Non-intrusive Intrusive Credentialed Non-credentialed

Intrusive

Which of the following method of threat hunting includes disrupt, deny, destroy, and degrade actions? Intelligence Fusion Security Advisory Threat Feeds Maneuvering

Maneuvering

Which of the following is used for continuous monitoring of logs? Security information and event management (SIEM) Intrusion Detection Systems (IDS) Firewall User Behavior Analysis (UBA)

Security information and event management (SIEM)


Kaugnay na mga set ng pag-aaral

Ch 11 Traditional Leadership Approaches

View Set

Principles of Economics Brief Chapter 1

View Set

The Art of Public Speaking - Midterm 1

View Set

MODULE: 7. Collisions: Costs and Preventions TOPIC: Driving Defensively to Avoid Collisions

View Set

AP Euro Multiple Choice Study Guide

View Set

Learning: Module 02: Nervous System Organization and Signaling - Electrical Potentials and Signaling

View Set