An analyst would like to visualize threat objects across their environment and chronological risk events for a Risk Object in Incident Review. Where would they find this?
Answer : D
Outlier detection is an analysis method that groups together data points into high density clusters. Data points that fall outside of these high density clusters are considered to be what?
Answer : C
The following list contains examples of Tactics, Techniques, and Procedures (TTPs):
* Exploiting a remote service
* Extend movement
* Use EternalBlue to exploit a remote SMB server
In which order are they listed below?
Answer : C
Rotating encryption keys after a security incident is most closely linked to which security concept?
Answer : A
Which of the following is considered Personal Data under GDPR?
Answer : B
The Lockheed Martin Cyber Kill Chain breaks an attack lifecycle into several stages. A threat actor modified the registry on a compromised Windows system to ensure that their malware would automatically run at boot time. Into which phase of the Kill Chain would this fall?
Answer : D
Which metric would track improvements in analyst efficiency after dashboard customization?
Answer : B