Question 1
What is a benefit of agent-based protection when compared to agentless protection?
Question 2
Which metric is used to capture the level of access needed to launch a successful attack?
Question 3
Which two elements of the incident response process are stated in NIST SP 800-61 r2? (Choose two.)
Question 4
What is the difference between vulnerability and risk?
Question 5
The SOC team has confirmed a potential indicator of compromise on an endpoint. The team has narrowed the executable file's type to a new trojan family. According to the NIST Computer Security Incident Handling Guide, what is the next step in handling this event?