Questions

  1. What's the right order of the security incident response phases?
    1. Detection -> Preparation -> Containment -> Post-Incident Analysis
    2. Containment -> Detection -> Preparation -> Post-Incident Analysis
    3. Preparation -> Detection -> Containment -> Post-Incident Analysis
    4. Preparation -> Containment -> Detection -> Post-Incident Analysis
  2. What best describes a bounty program?
    1. It's an incentive program for security researchers to submit security issues
    2. It's a security awareness training program
    3. It's an in-house security penetration exercise
    4. It's a security design camp
  3. What's the purpose of attack simulations?
    1. To test the weakness of endpoint detection
    2. To test the detection capability of network security
    3. To test the logging and alerting ...

Get Hands-On Security in DevOps now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.