subject

The chief information security officer (ciso) has asked the security team to determine whether the organization is susceptible to a zero-day exploit utilized in the banking industry and whether

attribution is possible. the ciso has asked what process would be utilized to gather the information, and then wants to apply signatureless controls to stop these kinds of attacks in the future. which of the following are the most appropriate ordered steps to take to meet the ciso’s request?

a. 1. perform the ongoing research of the best practices 2. determine current vulnerabilities and

threats 3. apply big data techniques 4. use antivirus control

b. 1. apply artificial intelligence algorithms for detection 2. inform the cert team 3. research threat intelligence and potential adversaries 4. utilize threat intelligence to apply big data techniques

c. 1. obtain the latest iocs from the open source repositories 2. perform a sweep across the network to identify positive matches 3. sandbox any suspicious files 4. notify the cert team to apply a future proof threat model

d. 1. analyze the current threat intelligence 2. utilize information sharing to obtain the latest industry iocs 3. perform a sweep across the network to identify positive matches 4. apply machine learning algorithms

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 14:30
If the polar bear were taken out of the food chain what would happen to the seal population the seal population would diminish the seal population would grow dramatically the seal population would stay the same the seal population would decrease slightly
Answers: 1
question
Computers and Technology, 23.06.2019 12:30
What is the difference between the internet and the world wide web?
Answers: 1
question
Computers and Technology, 23.06.2019 16:30
If i wanted to include a built-in calendar in a document, what option could i select? draw table insert table insert chart quick tables
Answers: 1
question
Computers and Technology, 23.06.2019 18:50
Ais a picture icon that is a direct link to a file or folder
Answers: 1
You know the right answer?
The chief information security officer (ciso) has asked the security team to determine whether the o...
Questions
question
Mathematics, 27.09.2019 06:20
Questions on the website: 13722360