According to NIST what option is unnecessary for containment strategy?
A. The delayed containment
B. Monitoring with methods other than sandboxing
C. Other option
According to NIST what option is unnecessary for containment strategy?
A. The delayed containment
B. Monitoring with methods other than sandboxing
C. Other option
Hi everyone i have new questions i managed to compile this May 2019 i only managed to make a documentation of them in word and pdf doc , with a confirmed pass now at 12:33pm 27/05/2019 , pass was 941/1000 you can find them here under my drive https://1drv.ms/f/s!Ak5_F7OE2aOYziFyRX8SEYpfL9Hb
Thanks alot SageDaReaper.
i do have 9 months subscription on passleader 210-250. please let me know just incase you need it.
i will attempt 210-255 next week and feed you back.
Hey SageDaReaper,
Successfully thrashed 210-255. Although my toughest exam yet scaled through narrowly. many thanks for the material. got about 50ish questions from it. there are about 15 new questions that was not treated in the cert guide. one is DD arrange cyber kill chain in its order. got cissp materials please?
thanks again
Your one drive link is empty. Could you please put it up again.
please share again
Can you please share the file again?
the test will tell you how many options you should pick . For example if there is one single answer you wont be able to pick two on the other hand if multiple answer are requested the system will tell you (choose two)
All these to say that if the qeuestion says what “is” it should be a single answer. I am un-confortable with the grammar here 🙂
In certain cases, some organizations redirect the attacker to a sandbox (a form of containment) so that
they can monitor the attacker’s activity, usually to gather additional evidence. The incident response team
should discuss this strategy with its legal department to determine if it is feasible. Ways of monitoring an
COMPUTER SECURITY INCIDENT HANDLING GUIDE
36
attacker’s activity other than sandboxing should not be used; if an organization knows that a system has
been compromised and allows the compromise to continue, it may be liable if the attacker uses the
compromised system to attack other systems. The delayed containment strategy is dangerous because an
attacker could escalate unauthorized access or compromise other systems.