Which type of evidence supports a theory or an assumption that results from initial evidence?
Question 172
Which two elements are assets in the role of attribution in an investigation? (Choose two.)
Question 173
What is personally identifiable information that must be safeguarded from unauthorized access?
Question 174
In a SOC environment, what is a vulnerability management metric?
Question 175
A security expert is working on a copy of the evidence, an ISO file that is saved in CDFS format. Which type of evidence is this file?
Question 176
Which two elements of the incident response process are stated in NIST Special Publication 800-61 r2? (Choose two.)
Question 177
DRAG DROP -Drag and drop the definition from the left onto the phase on the right to classify intrusion events according to the Cyber Kill Chain model. Select and Place:
Question 178
Refer to the exhibit. What does this output indicate?
Question 179
DRAG DROP -Drag and drop the elements from the left into the correct order for incident handling on the right. Select and Place:
Question 180
Which metric should be used when evaluating the effectiveness and scope of a Security Operations Center?