Live Virtual Machine Lab 7.1: Module 07 Security Assessment Techniques
Which of the following is achieved by Security Orchestration, Automation, Response (SOAR)? Availability Automation Integrity Confidentiality
Automation
Which of the following is a condition that is shown as a result when it does not exist? True Positive False Negative Negative Negative False Positive
False Positive
Which of the following type of vulnerability scan can also attempt to exploit the vulnerabilities? Non-intrusive Intrusive Credentialed Non-credentialed
Intrusive
Which of the following method of threat hunting includes disrupt, deny, destroy, and degrade actions? Intelligence Fusion Security Advisory Threat Feeds Maneuvering
Maneuvering
Which of the following is used for continuous monitoring of logs? Security information and event management (SIEM) Intrusion Detection Systems (IDS) Firewall User Behavior Analysis (UBA)
Security information and event management (SIEM)