اختبار شهادة محلل الأمن السيبراني CompTIA CySA+

السؤال 506 من 1040

كل الأسئلة

Which of the following security operations tasks are ideal for automation?

الخيارات

  • A Suspicious file analysis: Look for suspicious-looking graphics in a folder. Create subfolders in the original folder based on category of graphics found. Move the suspicious graphics to the appropriate subfolder.
  • B Firewall IoC block actions: Examine the firewall logs for IoCs from the most recently published zero-day exploit. Take mitigating actions in the firewall to block the behavior found in the logs. Follow up on any false positives that were caused by the block rules.
  • C Security application user errors: Search the error logs for signs of users having trouble with the security application. Look up the user's phone number. Call the user to help with any questions about using the application.
  • D Email header analysis: Check the email header for a phishing confidence metric greater than or equal to five. Add the domain of sender to the block list. Move the email to quarantine.

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.