hello quizlet
Home
Subjects
Expert solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
CySA+ - 3.4 Compare and contrast automation concepts and technologies.
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
Terms in this set (20)
An engineer utilizes the Secure Content Application Protocol (SCAP) while using a vulnerability scanning product. Which SCAP identifier refers to software development flaws?
Common Weakness Enumeration (CWE)
Which solution scans a script file on a user's computer as part of threat management?
Automated malware signature creation
Which solution provides a method for integrating systems functionality?
Application programming interface (API)
A security engineer subscribes to a security bulletin feed. Knowledge from this feed combines with actual log data to identify a threat landscape in the company. What solution does the engineer use in this approach?
Security Content Automation Protocol (SCAP)
Developers at an organization develop a cloud-based application to model threat actions. Evaluate the given procedures and determine which the developers utilize.
Machine learning
A developer applies security fixes to an application several times a week. Which approach does the developer practice to commit and test updates?
Continuous integration
Which of the given utilizes a configuration baseline to determine whether a system meets compliance requirements?
Security Content Automation Protocol (SCAP)
Which of the given refers to port security? Select all that apply
Allowing host communications
Blocking unauthorized applications
Security analysts gather intelligence and utilize machine learning to improve security. Which approach do the analysts use?
Better automate alerting and response processes
Which approach might experts use to enhance analytics behind an alert to raise the confidence level of the information?
Data enrichment
Which method might a technician use to reduce false positive alerts and false negative omissions when analyzing security data?
Threat feed combination
Which approach does an engineer utilize to combine and coordinate many tasks?
Security Orchestration
Engineers require a look into the steps various malicious signatures may utilize to breach a system. Which approach is useful for this goal?
Machine learning
A programmer practices continuous integration (CI) with a new application. In which environment does the programmer implement CI?
Testing
A security analyst receives a notification that a network-wide malware scan initiated through a set of scripts as a result of an alert from a server system. Which approach is responsible for initiating this activity?
Action of coordinating multiple automations
Which solution uses algorithms to parse input data and then develop strategies for using that data?
Machine learning
Which method utilizes executable scanning to identify malware?
Automated malware signature creation
Security analysts configure machine learning to identify baseline behavior and anomalous behavior from large datasets. Which approach do the analysts use?
Better automate alerting and response processes
An organization plans to deploy cloud-based virtual servers. In doing so, there is a creation of a configuration baseline for compliance purposes. Which action does the organization practice?
Security Content Automation Protocol (SCAP)
...
...
Sets found in the same folder
CySA+ - 3.1 Given a scenario, analyze data as part…
24 terms
CySA+ - 3.2 Given a scenario, implement configurat…
21 terms
CySA+ - 3.3 Explain the importance of proactive th…
18 terms
CySA+ - 4.2 Given a scenario, apply the appropriat…
30 terms
Other sets by this creator
CySA+ - 5.3 Explain the importance of frameworks,…
25 terms
CySA+ - 5.2 Given a scenario, apply security conce…
16 terms
CySA+ - 5.1 Understand the importance of data priv…
24 terms
CySA+ - 4.4 Given a scenario, utilize basic digita…
15 terms
Verified questions
biology
Complete the linear concept maps as you read about the types of muscle tissue.
chemistry
Why does beta emission raise the atomic number of the product while positron emission lowers the atomic number?
chemistry
The following questions apply to the five compounds in the previous problem. (a) Which compound is meso? (b) Would an equal mixture of compounds b and c be optically active? (c) Would an equal mixture of compounds d and e be optically active?
chemistry
A molecule in which $s p^2$ hybrid orbitals are used by the central atom in forming covalent bonds is $$ \mathrm{SO}_2 $$
Other Quizlet sets
Law Test Title
93 terms
Xcel Chapter 7- Group Life
10 terms
Chapter 15 Physics
61 terms