A security engineer is responsible for monitoring company software, firmware, system OS, and applications for known vulnerabilities. How should they stay current on exploits and information security?
What are the four tiers of integration within the NIST Cybersecurity Framework?
The CSIRT team is following the existing recovery plans on non-production systems in a PRE-BREACH
scenario. This action is being executed in which function?
An organization has a policy to respond “ASAP” to security incidents. The security team is having a difficult time prioritizing events because they are responding to all of them, in order of receipt.
Which part of the IRP does the team need to implement or update?
Assume that a DDoS attack has been occurring for 72 minutes. What determines who talks to external
stakeholders?
What is the primary objective of establishing governance and risk management processes for an organization?
A company implemented an intrusion detection system. They notice the system generates a very large number of false alarms.
What steps should the company take to rectify this situation?
What type of system processes information, the loss of which would have a debilitating impact to an
organization?