Question 1

What is a benefit of agent-based protection when compared to agentless protection?
  • Question 2

    Which metric is used to capture the level of access needed to launch a successful attack?
  • Question 3

    Which two elements of the incident response process are stated in NIST SP 800-61 r2? (Choose two.)
  • Question 4

    What is the difference between vulnerability and risk?
  • Question 5

    The SOC team has confirmed a potential indicator of compromise on an endpoint. The team has narrowed the executable file's type to a new trojan family. According to the NIST Computer Security Incident Handling Guide, what is the next step in handling this event?