Reference no: EM133248684
1. Which of the following activities introduces third-party risk?
moving data and applications to the cloud
all of these
integrating a new software platform into the environment
outsourcing security services
2. Which of the following are functions of the Cybersecurity Framework?
prevent
react
identify
detect
remediate
protect
3. Is a packet capture and analysis tool.
Metasploit
Nmap
OpenVAS
Wireshark
4. Select the true statement from the list below.
TTP stands for tools, techniques, and processes.
A TTP is a target within an organization's network.
An IOC can serve as an indicator of a TTP.
An IOC is a tool used to recover from a breach when a host is compromised.