What will cause an unusually high number of false positive alerts?
Answer : D
What is a desired outcome of automation is a security operations center (SOC)?
Answer : C
Which feature defines a firewall as being next-generation?
Answer : A
What are two characteristics of data loss prevention (DLP)? (Choose two.)
Answer : CD
What is a result of the Actions on the Objective phase in the cyber attack lifecycle?
Answer : C
In which cloud service model does a company use hardware resources from a cloud service provider?
Answer : D
What is the purpose of continuous deployment in the CI/CD lifecycle?
Answer : D
Which type of attack involves employees using their credentials to copy proprietary software onto an external drive?
Answer : A
Which protocol uses encryption to secure its communications?
Answer : B
What is an initial action when investigating a security incident?
Answer : A
Which duties are part of a triage analyst role in security operations?
Answer : D
What is a benefit of SD-WAN versus traditional WANs?
Answer : C
What is the fundamental role of a proxy server in internet communication?
Answer : C
Which function is a part of security operations?
Answer : C
Which activity is a core component of the Improve function is security operations?
Answer : C
Have any questions or issues ? Please dont hesitate to contact us