Live Virtual Lab 7.1: Module 07 Security Assessment Techniques
Which of the following is a condition that is shown as a result when it does not exist? A. Negative Negative B. False Negative C. True Positive D. False Positive
False Positive
Which of the following type of vulnerability scan can also attempt to exploit the vulnerabilities? A. Intrusive B. Non-intrusive C. Non-credentialed XX D. Credentialed
Intrusive
Which of the following method of threat hunting includes disrupt, deny, destroy, and degrade actions? A. Threat Feeds B. Intelligence Fusion C. Maneuvering D. Security Advisory
Maneuvering
Which of the following is used for continuous monitoring of logs? A. Intrusion Detection Systems (IDS) B. Firewall C. Security information and event management (SIEM) D. User Behavior Analysis (UBA)
Security information and event management (SIEM)
Which of the following is achieved by Security Orchestration, Automation, Response (SOAR)? A. Availability B. Confidentiality C. Automation D. Integrity
Automation