Which event is user interaction?
D
Which security principle requires more than one person is required to perform a critical task?
C
How is attacking a vulnerability categorized?
C
What is a benefit of agent-based protection when compared to agentless protection?
B
Which principle is being followed when an analyst gathers information relevant to a security incident to determine the appropriate course of action?
A
What is a difference between SIEM and SOAR?
B
Reference:
https://www.cisco.com/c/en/us/products/security/what-is-a-security-platform.html
What is vulnerability management?
A
Reference:
https://www.brinqa.com/vulnerability-management-primer-part-2-challenges/
What is a difference between signature-based and behavior-based detection?
D
Reference:
https://accedian.com/blog/what-is-the-difference-between-signature-based-and-behavior-based-ids/
When communicating via TLS, the client initiates the handshake to the server and the server responds back with its certificate for identification.
Which information is available on the server certificate?
D
How does an SSL certificate impact security between the client and the server?
D