اختبار شهادة محلل الأمن السيبراني CompTIA CySA+

السؤال 876 من 1040

كل الأسئلة

A security team has recently recovered from an incident in which malware bypassed the endpoint protection and exploited a missing software patch. To prevent reoccurrence, the Chief Information Security Officer asks the team to create a control validation strategy. Which of the following approaches will be most effective in meeting this requirement?

الخيارات

  • A Configuring the vulnerability scanner to use agent-based scans
  • B Integrating security orchestration, automation, and response capability with security information and event management
  • C Implementing a breach and attack simulation solution
  • D Establishing security awareness training with weekly key performance indicators

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.