Which tool's analysis data gives security operations teams insight into their environment's risks from exposed services?
Which component of the AAA framework regulates user access and permissions to resources?
Which type of system collects data and uses correlation rules to trigger alarms?
What are two advantages of security orchestration, automation, and response (SOAR)? (Choose two.)
Which feature is part of an intrusion prevention system (IPS)?
Which statement describes the process of application allow listing?
Which two descriptions apply to an XDR solution? (Choose two.)
Which component of cloud security is used to identify misconfigurations during the development process?
Which two services does a managed detection and response (MDR) solution provide? (Choose two.)
Which activity is a technique in the MITRE ATT&CK framework?