A security incident occurred with the potential of impacting business services. Who performs the attack?
Question 42
How does a certificate authority impact security?
Question 43
Which data type is necessary to get information about source/destination ports?
Question 44
Which event is a vishing attack?
Question 45
DRAG DROP - Drag and drop the security concept from the left onto the example of that concept on the right. Select and Place:
Question 46
What is a difference between SIEM and SOAR?
Question 47
What is vulnerability management?
Question 48
What is a difference between signature-based and behavior-based detection?
Question 49
When communicating via TLS, the client initiates the handshake to the server and the server responds back with its certificate for identification. Which information is available on the server certificate?
Question 50
How does an SSL certificate impact security between the client and the server?