1/9
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
highlighting ways to identify and automate responses to common threats such as malware detection, infected devices, suspicious network activities, or irregular log-in attempts is part of a
security playbook
identifying inbound and outbound network traffic and including information on trends, statistics, and counts are parts of a
security playbook
providing accessibility to statistics and metrics is a part of a
security playbook
determining correlation between events across different data sources is a part of a
security playbook
identifying cybersecurity risks to systems, assets, data, and capabilities is one of the ways organizations can
prevent cybersecurity incidents
implementing policies, access controls, and security awareness training for personnel is one of the ways organizations can
prevent cybersecurity incidents
a flexible response plan to mitigate the impact of a breach is one of the ways organizations can
prevent cybersecurity incidents
implementing the right security measures after a breach is one of the ways organizations can
prevent cybersecurity incidents
security information and event management systems and data loss prevention systems are
tools for incident prevention and response
2 tools by Cisco that enforce user access to a network through role-based access controls policies
Cisco’s Identity Services Engine and TrustSec