What is vulnerability management? A. A process to identify and remediate existing weaknesses. B. A process to recover from service interruptions and restore business-critical applications. C. A security practice of performing actions rather than acknowledging the threats. D. A security…

What is a difference between SIEM and SOAR? A. SIEM predicts and prevents security alerts, while SOAR checks attack patterns and applies the mitigation. B. SIEM’s primary function is to collect and detect anomalies, while SOAR is more focused on…

Which event is a vishing attack? A. obtaining disposed documents from an organization B. using a vulnerability scanner on a corporate network C. impersonating a tech support agent during a phone call D. setting up a rogue access point near…

How does a certificate authority impact security? A. It authenticates domain identity when requesting an SSL certificate. B. It validates client identity when communicating with the server. C. It authenticates client identity when requesting an SSL certificate. D. It validates…

DRAG DROP Drag and drop the elements from the left into the correct order for incident handling on the right. Select and Place:

DRAG DROP Drag and drop the definition from the left onto the phase on the right to classify intrusion events according to the Cyber Kill Chain model. Select and Place:

DRAG DROP Drag and drop the uses on the left onto the type of security system on the right. Select and Place: