DES-9131 無料問題集「EMC Specialist - Infrastructure Security」

Refer to the exhibit.

Your organization's security team has been working with various business units to understand their business requirements, risk tolerance, and resources used to create a Framework Profile.
Based on the Profile provided, what entries correspond to labels A, B, and C?

Assume that a DDoS attack has been occurring for 72 minutes. What determines who talks to external stakeholders?

An incident has occurred. You restore backups onto mission/business critical assets. After restoration of the backups your services are still inaccessible on numerous assets.
What could be the cause of the issue?

What are the five functions of the NIST Framework Core?

解説: (JPNTest メンバーにのみ表示されます)
The network security team in your company has discovered a threat that leaked partial data on a compromised file server that handles sensitive information. Containment must be initiated and addresses by the CSIRT.
Service disruption is not a concern because this server is used only to store files and does not hold any critical workload. Your company security policy required that all forensic information must be preserved.
Which actions should you take to stop data leakage and comply with requirements of the company security policy?

A security engineer is responsible for monitoring company software, firmware, system OS, and applications for known vulnerabilities. How should they stay current on exploits and information security?

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡