Which two processes are critical to a security information and event management (SIEM) platform? (Choose two.)
Which technology grants enhanced visibility and threat prevention locally on a device?
Which two services does a managed detection and response (MDR) solution provide? (Choose two.)
Which MITRE ATT&CK tactic grants increased permissions to a user account for internal servers of a corporate network?
Which type of attack includes exfiltration of data as a primary objective?
Which next-generation firewall (NGFW) deployment option provides full application visibility into Kubernetes environments?
Which component of the AAA framework regulates user access and permissions to resources?
Which action is unique to the security orchestration, automation, and response (SOAR) platforms?
What is required for an effective Attack Surface Management (ASM) process?
Which type of firewall should be implemented when a company headquarters is required to have redundant power and high processing power?
Which technology helps Security Operations Center (SOC) teams identify heap spray attacks on company-owned laptops?
Which technology secures software-as-a-service (SaaS) applications and network data, and also enforces compliance policies for application access?
Which type of attack involves sending data packets disguised as queries to a remote server, which then sends the data back to the attacker?
Which type of portable architecture can package software with dependencies in an isolated unit?