00:00

QUESTION 6

Which of the following steps of incident handling and response process focus on limiting the scope and extent of an incident?

Correct Answer: A

QUESTION 7

Identify the attack in which the attacker exploits a target system through publicly known but still unpatched vulnerabilities.

Correct Answer: C

QUESTION 8

Which of the following attacks causes sudden changes in file extensions or increase in file renames at rapid speed?

Correct Answer: A

QUESTION 9

Which of the following data source can be used to detect the traffic associated with Bad Bot User-Agents?

Correct Answer: B

QUESTION 10

The threat intelligence, which will help you, understand adversary intent and make informed decision to ensure appropriate security in alignment with risk.
What kind of threat intelligence described above?

Correct Answer: B