Which event is user interaction?
Correct Answer:
D
🗳️
Which security principle requires more than one person is required to perform a critical task?
Correct Answer:
C
🗳️
How is attacking a vulnerability categorized?
Correct Answer:
C
🗳️
What is a benefit of agent-based protection when compared to agentless protection?
Correct Answer:
C
🗳️
Which principle is being followed when an analyst gathers information relevant to a security incident to determine the appropriate course of action?
Correct Answer:
D
🗳️
One of the objectives of information security is to protect the CIA of information and systems.
What does CIA mean in this context?
Correct Answer:
D
🗳️
What is rule-based detection when compared to statistical detection?
Correct Answer:
B
🗳️
An engineer configured regular expression ".*\.([Dd][Oo][Cc]|[Xx][LI][Ss]|[Pp][Pp][Tt]) HTTP/1.[01]" on Cisco ASA firewall. What does this regular expression do?
Correct Answer:
C
🗳️
Which process is used when IPS events are removed to improve data integrity?
Correct Answer:
B
🗳️
An analyst is investigating an incident in a SOC environment.
Which method is used to identify a session from a group of logs?
Correct Answer:
C
🗳️