100%(2)2 out of 2 people found this document helpful
This preview shows page 1 - 4 out of 10 pages.
Deployment in APTs is fully automated.TrueFalseWhich of the following are the three phases of Incident response maturity assessment?
Threat HuntingSABSA Framework is commonly represented as _______SABSA matrix.A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called _________.Which of these is true with respect to passwords?Passwords need to be atleast 8 chars of length
Passwords need to be easyPasswords can be kept openlyNone of the optionsAs an email client, we should not use caution when opening emails and can download any attachments.