ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 273 - CAS-004 discussion

Report
Export

A security manager has written an incident response playbook for insider attacks and is ready to begin testing it. Which of the following should the manager conduct to test the playbook?

A.
Automated vulnerability scanning
Answers
A.
Automated vulnerability scanning
B.
Centralized logging, data analytics, and visualization
Answers
B.
Centralized logging, data analytics, and visualization
C.
Threat hunting
Answers
C.
Threat hunting
D.
Threat emulation
Answers
D.
Threat emulation
Suggested answer: D

Explanation:

Threat emulation is the method that should be used to test an incident response playbook for insider attacks. Threat emulation is a technique that simulates real-world attacks using realistic scenarios, tactics, techniques, and procedures (TTPs) of threat actors. Threat emulation can help evaluate the effectiveness of an incident response plan by testing how well it can detect, respond to, contain, eradicate, recover from, and learn from an attack.

asked 02/10/2024
Maria Gervasi
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first