Which DevSecOps implementation process gives a weekly or daily update instead of monthly or quarterly in the applications?
Which DevSecOps implementation process gives a weekly or daily update instead of monthly or quarterly in the applications?A . orchestrationB . CI/CD pipelineC . containerD . securityView AnswerAnswer: B
Which two capabilities does TAXII support? (Choose two)
Which two capabilities does TAXII support? (Choose two)A . BindingB . ExchangeC . MitigatingD . Pull messagingE . CorrelationView AnswerAnswer: AD
What is the difference between a vulnerability and an exploit?
What is the difference between a vulnerability and an exploit?A . A vulnerability is a hypothetical event for an attacker to exploit.B . A vulnerability is a weakness that can be exploited by an attacker.C . An exploit is a weakness that can cause a vulnerability in the network.D ....
What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?
What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?A . Telemetry uses a pull, method which makes it more reliable than SNMC . Telemetry uses push and pull, which makes it more scalable than SNME . Telemetry uses a push method which makes...
Which two descriptions of AES encryption are true? (Choose two)
Which two descriptions of AES encryption are true? (Choose two)A . AES is more secure than 3DEC . AES can use a 168-bit key for encryption.D . AES can use a 256-bit key for encryption.E . AES encrypts and decrypts a key three times in sequence.F . AES is less...
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . SMTPB . pxGridC . STIXD . XMPPView AnswerAnswer: C
Which functions of an SDN architecture require southbound APIs to enable communication?
Which functions of an SDN architecture require southbound APIs to enable communication?A . management console and the cloudB . management console and the SDN controllerC . SDN controller and the cloudD . SDN controller and the network elementsView AnswerAnswer: D
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . rootkit exploitB . SmurfC . distributed denial of serviceD . cross-site scriptingView AnswerAnswer: D
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?A . 3DESB . DESC . RSAD . AESView AnswerAnswer: C
Which two capabilities does TAXII support? (Choose two)
Which two capabilities does TAXII support? (Choose two)A . BindingB . ExchangeC . MitigatingD . Pull messagingE . CorrelationView AnswerAnswer: AD