List of questions
Related questions
Question 245 - CAS-004 discussion
A security architect is designing a solution for a new customer who requires significant security capabilities in its environment. The customer has provided the architect with the following set of requirements:
* Capable of early detection of advanced persistent threats.
* Must be transparent to users and cause no performance degradation.
+ Allow integration with production and development networks seamlessly.
+ Enable the security team to hunt and investigate live exploitation techniques.
Which of the following technologies BEST meets the customer's requirements for security capabilities?
A.
Threat Intelligence
B.
Deception software
C.
Centralized logging
D.
Sandbox detonation
Your answer:
0 comments
Sorted by
Leave a comment first