Computers and Technology

The chief information security officer (ciso) has asked the security team to determine whether the organization is susceptible to a zero-day exploit utilized in the banking industry and whether

attribution is possible. the ciso has asked what process would be utilized to gather the information, and then wants to apply signatureless controls to stop these kinds of attacks in the future. which of the following are the most appropriate ordered steps to take to meet the ciso’s request?

a. 1. perform the ongoing research of the best practices 2. determine current vulnerabilities and

threats 3. apply big data techniques 4. use antivirus control

b. 1. apply artificial intelligence algorithms for detection 2. inform the cert team 3. research threat intelligence and potential adversaries 4. utilize threat intelligence to apply big data techniques

c. 1. obtain the latest iocs from the open source repositories 2. perform a sweep across the network to identify positive matches 3. sandbox any suspicious files 4. notify the cert team to apply a future proof threat model

d. 1. analyze the current threat intelligence 2. utilize information sharing to obtain the latest industry iocs 3. perform a sweep across the network to identify positive matches 4. apply machine learning algorithms

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 15:00, misslux
This is not a factor that you should use to determine the content of your presentation. your audience your goals your purpose your technology
Answers: 1
image
Computers and Technology, 23.06.2019 02:30, reyne36
Rafael needs to add a title row to a table that he has inserted in word. what should he do? use the alignment options. use the merge and center option for all the cells in the top row. use the merge and center option on the first two cells in the top row. none of the above
Answers: 3
image
Computers and Technology, 23.06.2019 05:00, mikeysoulemison
Jason works as an accountant in a department store. he needs to keep a daily record of all the invoices issued by the store. which file naming convention would him the most?
Answers: 2
image
Computers and Technology, 23.06.2019 20:00, shaheedbrown06
What software programs are used to to create professional publication? a.) graphics programs b.) word processors c.) page layout programs d.) spreadsheet programs
Answers: 2
Do you know the correct answer?
The chief information security officer (ciso) has asked the security team to determine whether the o...

Questions in other subjects: