اختبار شهادة محلل الأمن السيبراني CompTIA CySA+

السؤال 682 من 1040

كل الأسئلة

A Chief Information Security Officer (CISO) is concerned that a specific threat actor who is known to target the company's business type may be able to breach the network and remain inside of it for an extended period of time. Which of the following techniques should be performed to meet the CISO's goals?

الخيارات

  • A Vulnerability scanning
  • B Adversary emulation
  • C Passive discovery
  • D Bug bounty

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.