Which classification of IDS/IPS uses a database of known vulnerabilities and attack profiles to identify intrusion attempts?
A high-profile company executive receives an urgent email containing a malicious link. The sender appears to be from the IT department of the company, and the email requests an update of the executive's login credentials for a system update.
Which type of phishing attack does this represent?
Which of the Cloud-Delivered Security Services (CDSS) will detect zero-day malware by using inline cloud machine learning (ML) and sandboxing?
What is the recommended method for collecting security logs from multiple endpoints?
What is required for a SIEM to operate correctly to ensure a translated flow from the system of interest to the SIEM data lake?
Which attacker profile acts independently or as part of an unlawful organization?