ExamGecko
Question list
Search
Search

Related questions











Question 36 - CRISC discussion

Report
Export

The analysis of which of the following will BEST help validate whether suspicious network activity is malicious?

A.
Logs and system events
Answers
A.
Logs and system events
B.
Intrusion detection system (IDS) rules
Answers
B.
Intrusion detection system (IDS) rules
C.
Vulnerability assessment reports
Answers
C.
Vulnerability assessment reports
D.
Penetration test reports
Answers
D.
Penetration test reports
Suggested answer: D
asked 18/09/2024
Myratgeldi Bekdurdyyev
46 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first