subject

The chief information security officer (ciso) has asked the security team to determine whether the organization is susceptible to a zero-day exploit utilized in the banking industry and whether

attribution is possible. the ciso has asked what process would be utilized to gather the information, and then wants to apply signatureless controls to stop these kinds of attacks in the future. which of the following are the most appropriate ordered steps to take to meet the ciso’s request?

a. 1. perform the ongoing research of the best practices 2. determine current vulnerabilities and

threats 3. apply big data techniques 4. use antivirus control

b. 1. apply artificial intelligence algorithms for detection 2. inform the cert team 3. research threat intelligence and potential adversaries 4. utilize threat intelligence to apply big data techniques

c. 1. obtain the latest iocs from the open source repositories 2. perform a sweep across the network to identify positive matches 3. sandbox any suspicious files 4. notify the cert team to apply a future proof threat model

d. 1. analyze the current threat intelligence 2. utilize information sharing to obtain the latest industry iocs 3. perform a sweep across the network to identify positive matches 4. apply machine learning algorithms

ansver
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 21.06.2019 18:00, adrianaglass12
Which virus-infecting components are email messages prone to carry? one of the problems associated with the use of email communication is that email messages are prone to carry virus-infecting .
Answers: 3
image
Computers and Technology, 23.06.2019 01:30, winstonbendariovvygn
1. which of the following is a search engine? a) mozilla firefox b)internet explorer c)google d)safari 2. which of the following statements is true? a) all search engines will provide the same results when you enter the same query. b) all search engines use the same amount of advertisements. c) some search engines are also browsers. d) search engines often provide different results, even when you enter the same query.
Answers: 2
image
Computers and Technology, 23.06.2019 20:00, emmaraeschool
Me ajude por favor , coloquei uma senha e não consigo tira-la no chorme
Answers: 2
image
Computers and Technology, 23.06.2019 21:40, jeovontamarley
language consists of basic components, and they are called a. 3; mental images, concepts, and speech b. 2; language acquisition and linguistic relativity c. 3; heuristics, algorithms, and analogies d. 4; phonemes, morphemes, syntax, and semantics e. 2; words and grammar
Answers: 3
You know the right answer?
The chief information security officer (ciso) has asked the security team to determine whether the o...

Questions in other subjects:

Konu
Law, 22.02.2021 22:00
Konu
Mathematics, 22.02.2021 22:00
Konu
Spanish, 22.02.2021 22:00