List of questions
Related questions
Question 139 - CS0-003 discussion
A Chief Information Security Officer (CISO) is concerned that a specific threat actor who is known to target the company's business type may be able to breach the network and remain inside of it for an extended period of time.
Which of the following techniques should be performed to meet the CISO's goals?
A.
Vulnerability scanning
B.
Adversary emulation
C.
Passive discovery
D.
Bug bounty
Your answer:
0 comments
Sorted by
Leave a comment first