Q&A2

.JPG

School

Temple University *

*We aren’t endorsed by this school

Course

5214

Subject

Sociology

Date

Jun 24, 2024

Type

JPG

Pages

1

Uploaded by GrandRain12367

A waAEmATE wAsa wAAL T A ATANT WA T WA VAAAS AsessaliTiassas s Tuva's supervisor wants to share a recent audit outside the organization. Tuva warns him that this type of audit can only be read by those within the organization. What audit does Tuva's supervisor want to distribute? SSAE SOC 2 Type Il What are documents that are authored by technology bodies employing specialists, engineers. and scientists who are experts in those areas? Requests for comments (RFCs) What is another name for footprinting? Active reconnaissance What penetration testing level name is given to testers who have no knowledge of the network and no special privileges? Black box When researching how an attack recently took place. Nova discovered that the Lateral movement threat actor, after penetrating the system. started looking to move through the network with their elevated position. What is the name of this technique? Which group is responsible for the Cloud Controls Matrix? CSA Which is the final rule of engagement that would be conducted in a pen test? Reporting Which ISO contains controls for managing and controlling risk? ISO 3100 Which of the following are developed by established professional organizations | Regulations or government agencies using the expertise of seasoned security professionals? Which of the following can automate an incident response? SOAR Which of the following is a standard for the handling of customer card PCI DSS information? Which of the following is NOT a characteristic of a penetration test? Automated Which of the following is not a general information source that can provide Twitter valuable in-depth information on cybersecurity? Which of the following is NOT an advantage of crowdsourced penetration testing? Less expensive Which of the following is NOT something that a SIEM can perform? Incident response Which premise is the foundation of threat hunting? Threat actors have already
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help