Which action matches the weaponization step of the Cyber Kill Chain model?
Which metric should be used when evaluating the effectiveness and scope of a Security Operations Center?
A SOC analyst detected connections to known C&C and port scanning activity to main HR database servers from one of the HR endpoints via Cisco StealthWatch. What are the two next steps of the SOC team according to the NISTSP800-61 incident handling process? (Choose two)
Which statement describes patch management?