- What's the right order of the security incident response phases?
- Detection -> Preparation -> Containment -> Post-Incident Analysis
- Containment -> Detection -> Preparation -> Post-Incident Analysis
- Preparation -> Detection -> Containment -> Post-Incident Analysis
- Preparation -> Containment -> Detection -> Post-Incident Analysis
- What best describes a bounty program?
- It's an incentive program for security researchers to submit security issues
- It's a security awareness training program
- It's an in-house security penetration exercise
- It's a security design camp
- What's the purpose of attack simulations?
- To test the weakness of endpoint detection
- To test the detection capability of network security
- To test the logging and alerting ...
Questions
Get Hands-On Security in DevOps now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.