Live Virtual Lab 7.1: Module 07 Security Assessment Techniques

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is a condition that is shown as a result when it does not exist? A. Negative Negative B. False Negative C. True Positive D. False Positive

False Positive

Which of the following type of vulnerability scan can also attempt to exploit the vulnerabilities? A. Intrusive B. Non-intrusive C. Non-credentialed XX D. Credentialed

Intrusive

Which of the following method of threat hunting includes disrupt, deny, destroy, and degrade actions? A. Threat Feeds B. Intelligence Fusion C. Maneuvering D. Security Advisory

Maneuvering

Which of the following is used for continuous monitoring of logs? A. Intrusion Detection Systems (IDS) B. Firewall C. Security information and event management (SIEM) D. User Behavior Analysis (UBA)

Security information and event management (SIEM)

Which of the following is achieved by Security Orchestration, Automation, Response (SOAR)? A. Availability B. Confidentiality C. Automation D. Integrity

Automation


Set pelajaran terkait

Olds Maternal-Newborn nursing ch 26

View Set

GEB Chapter 5, GEB Chapter 6, GEB Chapter 7, GEB Chapter 8

View Set

therapy III - melatonin, sleep disorders

View Set

Applied Discussion Unit 6 Box Notes 1-16

View Set

Bio 141, Chapter 5, Integumentary System

View Set

The Farmboy who invented television

View Set

Physics CH. 4 Quiz / Test: Motion and Force: Dynamics

View Set