Automatingthe generation of NIDS (Network Intrusion Detection System) rulesbased onStructured Threat Information eXpression (STIX) messagesis apractical use of automationin security operations.
Option B (Privileged access requests)should involve human oversight due to thehigh risk of unauthorized access.
Option C (PKI identity verification)requires manualdocument verificationandhuman approval.
Option D (Malware analysis)often requiressandboxing and behavioral analysis, which benefit from human expertise.
Thus,A is the correct answer, asautomating threat intelligence ingestion and rule creation enhances efficiency in intrusion detection.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit